WorldWideScience

Sample records for hidden object removal

  1. PERBANDINGAN ALGORITMA HIDDEN SPACE REMOVAL: Z-UFFER DAN SCANLINE DILIHAT DARI PENGGUNAAN MEMORI DAN KECEPATAN

    Directory of Open Access Journals (Sweden)

    Djoni Haryadi Setiabudi

    2001-01-01

    Full Text Available Hidden surface removal is an algorithm used to hide part of the object which is blocked by the object in front of it. If there are two plane crossed each other displayed without Hidden surface removal algorithm, the crossing section is invisible, because one object will block another object without crossing. The crossing sections can be displayed using Hidden surface removal algorithm. Z buffer algorithm implements Hidden Surface Removal by entering color and depth of the visible plane into the buffer, then displays the result on the screen. Scan Line algorithm will scanning the screen row by row of each object surface in three dimension and then displays on the screen after each row scanning. Both of the algorithms will be compared based on the memory usage dan time needed to execute. The experiment shows that Scanline algorithm uses less memory compared with Z-Buffer algoritm. Furthermore, based on the speed, the Scanline is better than the Z-Buffer if the object is collected on the y row, but the Z-Buffer is better than the Scanline if the object scattered and used all rows on the drawing plane and has more surface do displayed. Abstract in Bahasa Indonesia : Hidden surface removal adalah suatu algoritma yang digunakan untuk menghilangkan penampilan bagian yang tertutup oleh objek yang didepannya. Apabila ada dua bidang yang berpotongan, apabila ditampilkan biasa tanpa menggunakan algoritma Hidden surface removal maka bagian yang berpotongan itu akan tidak kelihatan, oleh karena bidang yang satu ditutupi oleh bagian yang lain tanpa memotong. Oleh karena itu untuk menampilkan bidang perpotongan, diperlukan Algoritma Hidden surface removal. Algoritma Z buffer melaksanakan proses Hidden Surface Removal dengan memasukkan warna dan kedalaman bidang permukaan yang tampak ke dalam buffer, dan kemudian setelah selesai hasilnya ditampilkan ke layar. Algoritma Scan Line melakukan scanning untuk setiap baris dari layar bidang gambar untuk setiap

  2. Home-Explorer: Ontology-Based Physical Artifact Search and Hidden Object Detection System

    Directory of Open Access Journals (Sweden)

    Bin Guo

    2008-01-01

    Full Text Available A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses sensors attached to the everyday artifacts (called smart objects in the real world. This paper makes two main contributions: First, it addresses, the robustness of the embedded sensors, which is seldom discussed in previous smart artifact research. Because sensors may sometimes be broken or fail to work under certain conditions, smart objects become hidden ones. However, current systems provide no mechanism to detect and manage objects when this problem occurs. Second, there is no common context infrastructure for building smart artifact systems, which makes it difficult for separately developed applications to interact with each other and uneasy for them to share and reuse knowledge. Unlike previous systems, Home-Explorer builds on an ontology-based knowledge infrastructure named Sixth-Sense, which makes it easy for the system to interact with other applications or agents also based on this ontology. The hidden object problem is also reflected in our ontology, which enables Home-Explorer to deal with both smart objects and hidden objects. A set of rules for deducing an object's status or location information and for locating hidden objects are described and evaluated.

  3. Efficient view based 3-D object retrieval using Hidden Markov Model

    Science.gov (United States)

    Jain, Yogendra Kumar; Singh, Roshan Kumar

    2013-12-01

    Recent research effort has been dedicated to view based 3-D object retrieval, because of highly discriminative property of 3-D object and has multi view representation. The state-of-art method is highly depending on their own camera array setting for capturing views of 3-D object and use complex Zernike descriptor, HAC for representative view selection which limit their practical application and make it inefficient for retrieval. Therefore, an efficient and effective algorithm is required for 3-D Object Retrieval. In order to move toward a general framework for efficient 3-D object retrieval which is independent of camera array setting and avoidance of representative view selection, we propose an Efficient View Based 3-D Object Retrieval (EVBOR) method using Hidden Markov Model (HMM). In this framework, each object is represented by independent set of view, which means views are captured from any direction without any camera array restriction. In this, views are clustered (including query view) to generate the view cluster, which is then used to build the query model with HMM. In our proposed method, HMM is used in twofold: in the training (i.e. HMM estimate) and in the retrieval (i.e. HMM decode). The query model is trained by using these view clusters. The EVBOR query model is worked on the basis of query model combining with HMM. The proposed approach remove statically camera array setting for view capturing and can be apply for any 3-D object database to retrieve 3-D object efficiently and effectively. Experimental results demonstrate that the proposed scheme has shown better performance than existing methods. [Figure not available: see fulltext.

  4. Three-dimensional imaging of hidden objects using positron emission backscatter

    International Nuclear Information System (INIS)

    Lee, Dongwon; Cowee, Misa; Fenimore, Ed; Galassi, Mark; Looker, Quinn; Mcneil, Wendy V.; Stonehill, Laura; Wallace, Mark

    2009-01-01

    Positron emission backscatter imaging is a technique for interrogation and three-dimensional (3-D) reconstruction of hidden objects when we only have access to the objects from one side. Using time-of-flight differences in detected direct and backscattered positron-emitted photons, we construct 3-D images of target objects. Recently at Los Alamos National Laboratory, a fully three-dimensional imaging system has been built and the experimental results are discussed in this paper. Quantitative analysis of images reconstructed in both two- and three-dimensions are also presented.

  5. Something Old, Something New: A Developmental Transition from Familiarity to Novelty Preferences with Hidden Objects

    Science.gov (United States)

    Shinskey, Jeanne L.; Munakata, Yuko

    2010-01-01

    Novelty seeking is viewed as adaptive, and novelty preferences in infancy predict cognitive performance into adulthood. Yet 7-month-olds prefer familiar stimuli to novel ones when searching for hidden objects, in contrast to their strong novelty preferences with visible objects (Shinskey & Munakata, 2005). According to a graded representations…

  6. Factors affecting infants' manual search for occluded objects and the genesis of object permanence.

    Science.gov (United States)

    Moore, M Keith; Meltzoff, Andrew N

    2008-04-01

    Two experiments systematically examined factors that influence infants' manual search for hidden objects (N=96). Experiment 1 used a new procedure to assess infants' search for partially versus totally occluded objects. Results showed that 8.75-month-old infants solved partial occlusions by removing the occluder and uncovering the object, but these same infants failed to use this skill on total occlusions. Experiment 2 used sound-producing objects to provide a perceptual clue to the objects' hidden location. Sound clues significantly increased the success rate on total occlusions for 10-month-olds, but not for 8.75-month-olds. An identity development account is offered for why infants succeed on partial occlusions earlier than total occlusions and why sound helps only the older infants. We propose a mechanism for how infants use object identity as a basis for developing a notion of permanence. Implications are drawn for understanding the dissociation between looking time and search assessments of object permanence.

  7. Factors Affecting Infants’ Manual Search for Occluded Objects and the Genesis of Object Permanence

    Science.gov (United States)

    Moore, M. Keith; Meltzoff, Andrew N.

    2009-01-01

    Two experiments systematically examined factors that influence infants’ manual search for hidden objects (N = 96). Experiment 1 used a new procedure to assess infants’ search for partially versus totally occluded objects. Results showed that 8.75-month-old infants solved partial occlusions by removing the occluder and uncovering the object, but these same infants failed to use this skill on total occlusions. Experiment 2 used sound-producing objects to provide a perceptual clue to the objects’ hidden location. Sound clues significantly increased the success rate on total occlusions for 10-month-olds, but not for 8.75-month-olds. An identity development account is offered for why infants succeed on partial occlusions earlier than total occlusions and why sound helps only the older infants. We propose a mechanism for how infants use object identity as a basis for developing a notion of permanence. Implications are drawn for understanding the dissociation between looking-time and search assessments of object permanence. PMID:18036668

  8. Object Permanence After a 24-Hr Delay and Leaving the Locale of Disappearance: The Role of Memory, Space, and Identity

    Science.gov (United States)

    Moore, M. Keith; Meltzoff, Andrew N.

    2004-01-01

    Fourteen-month-old infants saw an object hidden inside a container and were removed from the disappearance locale for 24 hr. Upon their return, they searched correctly for the hidden object, demonstrating object permanence and long-term memory. Control infants who saw no disappearance did not search. In Experiment 2, infants returned to see the…

  9. Embodied memory allows accurate and stable perception of hidden objects despite orientation change.

    Science.gov (United States)

    Pan, Jing Samantha; Bingham, Ned; Bingham, Geoffrey P

    2017-07-01

    Rotating a scene in a frontoparallel plane (rolling) yields a change in orientation of constituent images. When using only information provided by static images to perceive a scene after orientation change, identification performance typically decreases (Rock & Heimer, 1957). However, rolling generates optic flow information that relates the discrete, static images (before and after the change) and forms an embodied memory that aids recognition. The embodied memory hypothesis predicts that upon detecting a continuous spatial transformation of image structure, or in other words, seeing the continuous rolling process and objects undergoing rolling observers should accurately perceive objects during and after motion. Thus, in this case, orientation change should not affect performance. We tested this hypothesis in three experiments and found that (a) using combined optic flow and image structure, participants identified locations of previously perceived but currently occluded targets with great accuracy and stability (Experiment 1); (b) using combined optic flow and image structure information, participants identified hidden targets equally well with or without 30° orientation changes (Experiment 2); and (c) when the rolling was unseen, identification of hidden targets after orientation change became worse (Experiment 3). Furthermore, when rolling was unseen, although target identification was better when participants were told about the orientation change than when they were not told, performance was still worse than when there was no orientation change. Therefore, combined optic flow and image structure information, not mere knowledge about the rolling, enables accurate and stable perception despite orientation change. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  10. Object Permanence After a 24-Hr Delay and Leaving the Locale of Disappearance: The Role of Memory, Space, and Identity

    OpenAIRE

    Moore, M. Keith; Meltzoff, Andrew N.

    2004-01-01

    Fourteen-month-old infants saw an object hidden inside a container and were removed from the disappearance locale for 24 hr. Upon their return, they searched correctly for the hidden object, demonstrating object permanence and long-term memory. Control infants who saw no disappearance did not search. In Experiment 2, infants returned to see the container either in the same or a different room. Performance by room-change infants dropped to baseline levels, suggesting that infant search for hid...

  11. Incremental discovery of hidden structure: Applications in theory of elementary particles

    International Nuclear Information System (INIS)

    Zytkow, J.M.; Fischer, P.J.

    1996-01-01

    Discovering hidden structure is a challenging, universal research task in Physics, Chemistry, Biology, and other disciplines. Not only must the elements of hidden structure be postulated by the discoverer, but they can only be verified by indirect evidence, at the level of observable objects. In this paper we describe a framework for hidden structure discovery, built on a constructive definition of hidden structure. This definition leads to operators that build models of hidden structure step by step, postulating hidden objects, their combinations and properties, reactions described in terms of hidden objects, and mapping between the hidden and the observed structure. We introduce the operator dependency diagram, which shows the order of operator application and model evaluation. Different observational knowledge supports different evaluation criteria, which lead to different search systems with verifiable sequences of operator applications. Isomorph-free structure generation is another issue critical for efficiency of search. We apply our framework in the system GELL-MANN, that hypothesizes hidden structure for elementary particles and we present the results of a large scale search for quark models

  12. Well device for removing small objects

    Energy Technology Data Exchange (ETDEWEB)

    Rastorguyev, M.A.; Mubashirov, S.G.; Nikolayev, G.I.; Prokopov, O.I.

    1982-01-01

    A well device is proposed for removing small objects. It contains a hollow housing with worm and crown installed with the possibility of rotation in relation to the housing. It is distinguished by the fact that in order to increase reliability of holding the trapped objects, on the lower end of the housing there is a disc which forms with the housing a chamber for the trapped objects. In this case the disc is made with sector slit, one of whose sidewalls is superposed with the worm blade rigidly connected to the disc, while along the other side wall a plate is vertically attached.

  13. Find the Hidden Object. Understanding Play in Psychological Assessments.

    Science.gov (United States)

    Fasulo, Alessandra; Shukla, Janhavi; Bennett, Stephanie

    2017-01-01

    Standardized psychological assessments are extensively used by practitioners to determine rate and level of development in different domains of ability in both typical and atypical children. The younger the children, the more likely the trials will resemble play activities. However, mode of administration, timing and use of objects involved are constrained. The purpose of this study is to explore what kind of play is play in psychological assessments, what are the expectations about children's performance and what are the abilities supporting the test activities. Conversation Analysis (CA) was applied to the videorecording of an interaction between a child and a practitioner during the administration of the Bayley Scale of Infant and Toddler Development, III edition. The analysis focuses on a 2'07″ long sequence relative to the administration of the test item "Find the hidden object" to a 23 months old child with Down syndrome. The analysis of the sequence shows that the assessor promotes the child's engagement by couching the actions required to administer the item in utterances with marked child-directed features. The analysis also shows that the objects constituting the test item did not suggest to the child a unique course of action, leading to the assessor's modeling of the successful sequence. We argue that when a play frame is activated by an interactional partner, the relational aspect of the activity is foregrounded and the co-player becomes a source of cues for ways in which playing can develop. We discuss the assessment interaction as orienting the child toward a right-or-wrong interpretation, leaving the realm of play, which is inherently exploratory and inventive, to enter that of instructional activities. Finally, we argue that the sequential analysis of the interaction and of the mutual sense-making procedures that partners put in place during the administration of an assessment could be used in the design and evaluation of tests for a finer

  14. Foreign object detection and removal to improve automated analysis of chest radiographs

    International Nuclear Information System (INIS)

    Hogeweg, Laurens; Sánchez, Clara I.; Melendez, Jaime; Maduskar, Pragnya; Ginneken, Bram van; Story, Alistair; Hayward, Andrew

    2013-01-01

    Purpose: Chest radiographs commonly contain projections of foreign objects, such as buttons, brassier clips, jewellery, or pacemakers and wires. The presence of these structures can substantially affect the output of computer analysis of these images. An automated method is presented to detect, segment, and remove foreign objects from chest radiographs.Methods: Detection is performed using supervised pixel classification with a kNN classifier, resulting in a probability estimate per pixel to belong to a projected foreign object. Segmentation is performed by grouping and post-processing pixels with a probability above a certain threshold. Next, the objects are replaced by texture inpainting.Results: The method is evaluated in experiments on 257 chest radiographs. The detection at pixel level is evaluated with receiver operating characteristic analysis on pixels within the unobscured lung fields and an A z value of 0.949 is achieved. Free response operator characteristic analysis is performed at the object level, and 95.6% of objects are detected with on average 0.25 false positive detections per image. To investigate the effect of removing the detected objects through inpainting, a texture analysis system for tuberculosis detection is applied to images with and without pathology and with and without foreign object removal. Unprocessed, the texture analysis abnormality score of normal images with foreign objects is comparable to those with pathology. After removing foreign objects, the texture score of normal images with and without foreign objects is similar, while abnormal images, whether they contain foreign objects or not, achieve on average higher scores.Conclusions: The authors conclude that removal of foreign objects from chest radiographs is feasible and beneficial for automated image analysis

  15. A hidden bias in a common calorimeter calibration scheme

    International Nuclear Information System (INIS)

    Lincoln, Don; Morrow, Greg; Kasper, Peter

    1994-01-01

    In this paper, a common calorimeter calibration scheme is explored and a hidden bias found. Since this bias mimics a non-linearity in response in the calorimeter, it must be understood and removed from the calibration before true non-linearities are investigated. The effect and its removal are explored and understood through straightforward calculus and algebra. ((orig.))

  16. Sludge Removal and Retrieval of Foreign Object in SG of Kori Nuclear Power Plant, Unit 4

    International Nuclear Information System (INIS)

    Jeong, Wootae; Kim, Sangtae; Kim, Youngkug; Kang, Seokchul

    2014-01-01

    Sludge deposit was removed and foreign objects were inspected and retrieved on secondary side tube sheet of the SG during January 23 and February 22, April 15 and 27 in 2013. FOLAS-I lancing system, video probe and retrieval tools were used for lancing and foreign object removal respectively. Operators of the lancing system participated in mock-up training before doing the service to minimize operation time and radiation dose. Foreign objects were searched on top of 7 th TSP (tube support plate), on annulus and in tube bundle. Four objects were found and removed on annulus and in tube bundle. During the 21 st OH of Kori NPP unit 4, we removed 345.9 kilo gram of sludge and four foreign objects from three steam generators. Foreign objects which were removed from inside of SG showed us that relatively large object such as the hooked bolt might exists in steam generators. We can conclude that identifying and removing foreign object is very important to avoid possible tube failure. Removing circular metal of 152.4 gram also was successfully removed

  17. Hidden Liquidity

    OpenAIRE

    Cebiroglu, Gökhan; Horst, Ulrich

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, hi...

  18. An Approach of Dynamic Object Removing for Indoor Mapping Based on UGV SLAM

    Directory of Open Access Journals (Sweden)

    Jian Tang

    2015-07-01

    Full Text Available The study of indoor mapping for Location Based Service (LBS becomes more and more popular in recent years. LiDAR SLAM based mapping method seems to be a promising indoor mapping solution. However, there are some dynamic objects such as pedestrians, indoor vehicles, etc. existing in the raw LiDAR range data. They have to be removal for mapping purpose. In this paper, a new approach of dynamic object removing called Likelihood Grid Voting (LGV is presented. It is a model free method and takes full advantage of the high scanning rate of LiDAR, which is moving at a relative low speed in indoor environment. In this method, a counting grid is allocated for recording the occupation of map position by laser scans. The lower counter value of this position can be recognized as dynamic objects and the point cloud will be removed from map. This work is a part of algorithms in our self- developed Unmanned Ground Vehicles (UGV simultaneous localization and Mapping (SLAM system- NAVIS. Field tests are carried in an indoor parking place with NAVIS to evaluate the effectiveness of the proposed method. The result shows that all the small size objects like pedestrians can be detected and removed quickly; large size of objects like cars can be detected and removed partly.

  19. Hidden School Dropout among Immigrant Students: A Cross-Sectional Study

    Science.gov (United States)

    Makarova, Elena; Herzog, Walter

    2013-01-01

    Actual school dropout among immigrant youth has been addressed in a number of studies, but research on hidden school dropout among immigrant students is rare. Thus, the objective of this paper is to analyze hidden school dropout among primary school students with an immigrant background. The analyses were performed using survey data of 1186…

  20. A hidden history

    OpenAIRE

    Peppers, Emily

    2008-01-01

    The Cultural Collections Audit project began at the University of Edinburgh in 2004, searching for hidden treasures in its 'distributed heritage collections' across the university. The objects and collections recorded in the Audit ranged widely from fine art and furniture to historical scientific and teaching equipment and personalia relating to key figures in the university's long tradition of academic excellence. This information was gathered in order to create a central database of informa...

  1. Sociology of Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Alireza Moradi

    2017-06-01

    Full Text Available This paper reviews the concept of hidden curriculum in the sociological theories and wants to explain sociological aspects of formation of hidden curriculum. The main question concentrates on the theoretical approaches in which hidden curriculum is explained sociologically.For this purpose it was applied qualitative research methodology. The relevant data include various sociological concepts and theories of hidden curriculum collected by the documentary method. The study showed a set of rules, procedures, relationships and social structure of education have decisive role in the formation of hidden curriculum. A hidden curriculum reinforces by existed inequalities among learners (based on their social classes or statues. There is, in fact, a balance between the learner's "knowledge receptions" with their "inequality proportion".The hidden curriculum studies from different major sociological theories such as Functionalism, Marxism and critical theory, Symbolic internationalism and Feminism. According to the functionalist perspective a hidden curriculum has a social function because it transmits social values. Marxists and critical thinkers correlate between hidden curriculum and the totality of social structure. They depicts that curriculum prepares learners for the exploitation in the work markets. Symbolic internationalism rejects absolute hegemony of hidden curriculum on education and looks to the socialization as a result of interaction between learner and instructor. Feminism theory also considers hidden curriculum as a vehicle which legitimates gender stereotypes.

  2. Hidden Broad-line Regions in Seyfert 2 Galaxies: From the Spectropolarimetric Perspective

    International Nuclear Information System (INIS)

    Du, Pu; Wang, Jian-Min; Zhang, Zhi-Xiang

    2017-01-01

    The hidden broad-line regions (BLRs) in Seyfert 2 galaxies, which display broad emission lines (BELs) in their polarized spectra, are a key piece of evidence in support of the unified model for active galactic nuclei (AGNs). However, the detailed kinematics and geometry of hidden BLRs are still not fully understood. The virial factor obtained from reverberation mapping of type 1 AGNs may be a useful diagnostic of the nature of hidden BLRs in type 2 objects. In order to understand the hidden BLRs, we compile six type 2 objects from the literature with polarized BELs and dynamical measurements of black hole masses. All of them contain pseudobulges. We estimate their virial factors, and find the average value is 0.60 and the standard deviation is 0.69, which agree well with the value of type 1 AGNs with pseudobulges. This study demonstrates that (1) the geometry and kinematics of BLR are similar in type 1 and type 2 AGNs of the same bulge type (pseudobulges), and (2) the small values of virial factors in Seyfert 2 galaxies suggest that, similar to type 1 AGNs, BLRs tend to be very thick disks in type 2 objects.

  3. Hidden measurements, hidden variables and the volume representation of transition probabilities

    OpenAIRE

    Oliynyk, Todd A.

    2005-01-01

    We construct, for any finite dimension $n$, a new hidden measurement model for quantum mechanics based on representing quantum transition probabilities by the volume of regions in projective Hilbert space. For $n=2$ our model is equivalent to the Aerts sphere model and serves as a generalization of it for dimensions $n \\geq 3$. We also show how to construct a hidden variables scheme based on hidden measurements and we discuss how joint distributions arise in our hidden variables scheme and th...

  4. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  5. Chimpanzees (Pan troglodytes) use markers to monitor the movement of a hidden item.

    Science.gov (United States)

    Beran, Michael J; Beran, Mary M; Menzel, Charles R

    2005-10-01

    Four chimpanzees (Pan troglodytes) monitored the movement of hidden items in arrays of opaque cups. A chocolate candy was hidden in an array of four cups and temporarily presented paper markers indicated the location of the candy (which otherwise was not visible). These markers were either non-symbolic or symbolic (lexigram) stimuli that in other contexts acted as a label for the hidden candy, and the array was either rotated 180 degrees after the marker was removed or the array remained in the same location. For three of four chimpanzees, performance was better than chance in all conditions and there was no effect of the type of marker. These experiments indicate that chimpanzees can track the movement of a hidden item in an array of identical cups even when they never see the item itself, but only see a temporarily presented marker for the location of that item. However, there was no benefit to the use of symbolic as opposed to non-symbolic stimuli in this performance.

  6. Expansible apparatus for removing the surface layer from a concrete object

    International Nuclear Information System (INIS)

    Allen, C.H.

    1979-01-01

    A method and apparatus for removing the surface layer from a concrete object are described. The method consists of providing a hole having a circular wall in the surface layer of the object, the hole being at least as deep as the thickness of the surface layer to be removed, and applying an outward wedging pressure on the wall of the hole sufficient to spall the surface layer around the hole. By the proper spacing of an appropriate number of holes, it is possible to remove the entire surface layer. The apparatus consists of an elongated tubular-shaped body having a relatively short handle with a solid wall at one end. The wall of the remainder of the body contains a plurality of evenly spaced longitudinal cuts to form a relatively long expandable section. The outer end of the expandable section has an expandable, wedge-shaped spalling edge extending from the outer surface of the wall, perpendicular to the longitudinal axis of the body, and expanding means in the body for outwardly expanding the expandable section and forcing the spalling edge into the wall of a hole with sufficient outward pressure to spall away the surface layer of concrete. The method and apparatus are particularly suitable for removing surface layers of concrete which are radioactively contaminated

  7. Electroweak-charged bound states as LHC probes of hidden forces

    Science.gov (United States)

    Li, Lingfeng; Salvioni, Ennio; Tsai, Yuhsin; Zheng, Rui

    2018-01-01

    We explore the LHC reach on beyond-the-standard model (BSM) particles X associated with a new strong force in a hidden sector. We focus on the motivated scenario where the SM and hidden sectors are connected by fermionic mediators ψ+,0 that carry SM electroweak charges. The most promising signal is the Drell-Yan production of a ψ±ψ¯ 0 pair, which forms an electrically charged vector bound state ϒ± due to the hidden force and later undergoes resonant annihilation into W±X . We analyze this final state in detail in the cases where X is a real scalar ϕ that decays to b b ¯, or a dark photon γd that decays to dileptons. For prompt X decays, we show that the corresponding signatures can be efficiently probed by extending the existing ATLAS and CMS diboson searches to include heavy resonance decays into BSM particles. For long-lived X , we propose new searches where the requirement of a prompt hard lepton originating from the W boson ensures triggering and essentially removes any SM backgrounds. To illustrate the potential of our results, we interpret them within two explicit models that contain strong hidden forces and electroweak-charged mediators, namely λ -supersymmetry (SUSY) and non-SUSY ultraviolet extensions of the twin Higgs model. The resonant nature of the signals allows for the reconstruction of the mass of both ϒ± and X , thus providing a wealth of information about the hidden sector.

  8. Higher-dimensional black holes: hidden symmetries and separation of variables

    International Nuclear Information System (INIS)

    Frolov, Valeri P; Kubiznak, David

    2008-01-01

    In this paper, we discuss hidden symmetries in rotating black hole spacetimes. We start with an extended introduction which mainly summarizes results on hidden symmetries in four dimensions and introduces Killing and Killing-Yano tensors, objects responsible for hidden symmetries. We also demonstrate how starting with a principal CKY tensor (that is a closed non-degenerate conformal Killing-Yano 2-form) in 4D flat spacetime one can 'generate' the 4D Kerr-NUT-(A)dS solution and its hidden symmetries. After this we consider higher-dimensional Kerr-NUT-(A)dS metrics and demonstrate that they possess a principal CKY tensor which allows one to generate the whole tower of Killing-Yano and Killing tensors. These symmetries imply complete integrability of geodesic equations and complete separation of variables for the Hamilton-Jacobi, Klein-Gordon and Dirac equations in the general Kerr-NUT-(A)dS metrics

  9. Case Report - Erectile dysfunction due to a 'hidden' penis after pelvic trauma

    NARCIS (Netherlands)

    Simonis, LAJ; Borovets, S; van Driel, MF; Ten Duis, HJ; Mensink, HJA

    We describe a twenty-six year old patient who presented us with a dorsally retracted 'hidden' penis, which was entrapped in scar tissue and prevesical fat, 20 y after a pelvic fracture with symphysiolysis. Penile 'lengthening' was performed by V-Y plasty, removal of fatty tissue, dissection of the

  10. State-space dimensionality in short-memory hidden-variable theories

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    Recently we have presented a hidden-variable model of measurements for a qubit where the hidden-variable state-space dimension is one-half the quantum-state manifold dimension. The absence of a short memory (Markov) dynamics is the price paid for this dimensional reduction. The conflict between having the Markov property and achieving the dimensional reduction was proved by Montina [A. Montina, Phys. Rev. A 77, 022104 (2008)] using an additional hypothesis of trajectory relaxation. Here we analyze in more detail this hypothesis introducing the concept of invertible process and report a proof that makes clearer the role played by the topology of the hidden-variable space. This is accomplished by requiring suitable properties of regularity of the conditional probability governing the dynamics. In the case of minimal dimension the set of continuous hidden variables is identified with an object living an N-dimensional Hilbert space whose dynamics is described by the Schroedinger equation. A method for generating the economical non-Markovian model for the qubit is also presented.

  11. Removal of Secondary Side Deposit and Foreign Objects in SG of Yonggwang Nuclear Power Plant, Unit 2

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Wootae [KHNP-CRI, Daejeon (Korea, Republic of); Yun, Sangjung; Choi, Yongseok; Kim, Taehwa; Seo, Hongchang [Byucksan Digital Valley II, Seoul (Korea, Republic of)

    2014-05-15

    Mock-up test and training before the service were made to minimize operation time and radiation dose. 8 bag filters and 49 cartridge filters were consumed for filtering of soft and hard sludge in SG A, B, and C. Total 21.05 kilograms of sludge was removed. Five foreign objects were found and removed in tube bundle of SG A, in annulus and tube bundle of SG B, and in tube bundle of SG C. During the 20{sup th} OH of Yonggwang NPP unit 2, we removed 21.05 kilograms of sludge and five foreign objects from three steam generators. Gradual increase in weight of sludge removed is assumed to show us that more sludge is created as operation time of steam generator increases. Low level chemical cleaning at 19{sup th} OH removed 517 kilograms of sludge which was dominant of all the sludge removal weight. We could assume, from this fact, that high level chemical cleaning could remove significant amount of sludge compared to mechanical lancing method. Five foreign objects which were removed from inside of SG showed us that more thorough inside cleaning and inspection is necessary during fabrication of steam generator.

  12. Black holes, hidden symmetries, and complete integrability.

    Science.gov (United States)

    Frolov, Valeri P; Krtouš, Pavel; Kubizňák, David

    2017-01-01

    The study of higher-dimensional black holes is a subject which has recently attracted vast interest. Perhaps one of the most surprising discoveries is a realization that the properties of higher-dimensional black holes with the spherical horizon topology and described by the Kerr-NUT-(A)dS metrics are very similar to the properties of the well known four-dimensional Kerr metric. This remarkable result stems from the existence of a single object called the principal tensor. In our review we discuss explicit and hidden symmetries of higher-dimensional Kerr-NUT-(A)dS black hole spacetimes. We start with discussion of the Killing and Killing-Yano objects representing explicit and hidden symmetries. We demonstrate that the principal tensor can be used as a "seed object" which generates all these symmetries. It determines the form of the geometry, as well as guarantees its remarkable properties, such as special algebraic type of the spacetime, complete integrability of geodesic motion, and separability of the Hamilton-Jacobi, Klein-Gordon, and Dirac equations. The review also contains a discussion of different applications of the developed formalism and its possible generalizations.

  13. The Relationship among Localization Skill, Existence Constancy and Object Permanence.

    Science.gov (United States)

    Townes-Rosenwein, Linda

    Two component skills of object permanence were studied: existence constancy -- the infants' ability to expect that an object continues to exist after it is hidden, and localization skill -- infants' ability to search in the correct place for a hidden object. Contradictions within the literature may occur because of task lability caused by failure…

  14. Hidden gauge symmetry

    International Nuclear Information System (INIS)

    O'Raifeartaigh, L.

    1979-01-01

    This review describes the principles of hidden gauge symmetry and of its application to the fundamental interactions. The emphasis is on the structure of the theory rather than on the technical details and, in order to emphasise the structure, gauge symmetry and hidden symmetry are first treated as independent phenomena before being combined into a single (hidden gauge symmetric) theory. The main application of the theory is to the weak and electromagnetic interactions of the elementary particles, and although models are used for comparison with experiment and for illustration, emphasis is placed on those features of the application which are model-independent. (author)

  15. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  16. Hidden charged dark matter

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kaplinghat, Manoj; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    Can dark matter be stabilized by charge conservation, just as the electron is in the standard model? We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact (\\rm U)(1) gauge symmetry of the hidden sector. Such candidates are predicted in WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many novel properties not shared by neutral dark matter: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may reduce its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ∼ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially impacting properties of the Bullet Cluster and the observed morphology of galactic halos. We analyze all of these effects in a WIMPless model in which the hidden sector is a simplified version of the minimal supersymmetric standard model and the dark matter is a hidden sector stau. We find that charged hidden dark matter is viable and consistent with the correct relic density for reasonable model parameters and dark matter masses in the range 1 GeV ∼ X ∼< 10 TeV. At the same time, in the preferred range of parameters, this model predicts cores in the dark matter halos of small galaxies and other halo properties that may be within the reach of future observations. These models therefore provide a viable and well-motivated framework for collisional dark matter with Sommerfeld enhancement, with novel implications for astrophysics and dark matter searches

  17. Localization of hidden Chua's attractors

    International Nuclear Information System (INIS)

    Leonov, G.A.; Kuznetsov, N.V.; Vagaitsev, V.I.

    2011-01-01

    The classical attractors of Lorenz, Rossler, Chua, Chen, and other widely-known attractors are those excited from unstable equilibria. From computational point of view this allows one to use numerical method, in which after transient process a trajectory, started from a point of unstable manifold in the neighborhood of equilibrium, reaches an attractor and identifies it. However there are attractors of another type: hidden attractors, a basin of attraction of which does not contain neighborhoods of equilibria. In the present Letter for localization of hidden attractors of Chua's circuit it is suggested to use a special analytical-numerical algorithm. -- Highlights: → There are hidden attractors: basin doesn't contain neighborhoods of equilibria. → Hidden attractors cannot be reached by trajectory from neighborhoods of equilibria. → We suggested special procedure for localization of hidden attractors. → We discovered hidden attractor in Chua's system, L. Chua in his work didn't expect this.

  18. Segmentation of laser range radar images using hidden Markov field models

    International Nuclear Information System (INIS)

    Pucar, P.

    1993-01-01

    Segmentation of images in the context of model based stochastic techniques is connected with high, very often unpracticle computational complexity. The objective with this thesis is to take the models used in model based image processing, simplify and use them in suboptimal, but not computationally demanding algorithms. Algorithms that are essentially one-dimensional, and their extensions to two dimensions are given. The model used in this thesis is the well known hidden Markov model. Estimation of the number of hidden states from observed data is a problem that is addressed. The state order estimation problem is of general interest and is not specifically connected to image processing. An investigation of three state order estimation techniques for hidden Markov models is given. 76 refs

  19. Sound effects: Multimodal input helps infants find displaced objects.

    Science.gov (United States)

    Shinskey, Jeanne L

    2017-09-01

    Before 9 months, infants use sound to retrieve a stationary object hidden by darkness but not one hidden by occlusion, suggesting auditory input is more salient in the absence of visual input. This article addresses how audiovisual input affects 10-month-olds' search for displaced objects. In AB tasks, infants who previously retrieved an object at A subsequently fail to find it after it is displaced to B, especially following a delay between hiding and retrieval. Experiment 1 manipulated auditory input by keeping the hidden object audible versus silent, and visual input by presenting the delay in the light versus dark. Infants succeeded more at B with audible than silent objects and, unexpectedly, more after delays in the light than dark. Experiment 2 presented both the delay and search phases in darkness. The unexpected light-dark difference disappeared. Across experiments, the presence of auditory input helped infants find displaced objects, whereas the absence of visual input did not. Sound might help by strengthening object representation, reducing memory load, or focusing attention. This work provides new evidence on when bimodal input aids object processing, corroborates claims that audiovisual processing improves over the first year of life, and contributes to multisensory approaches to studying cognition. Statement of contribution What is already known on this subject Before 9 months, infants use sound to retrieve a stationary object hidden by darkness but not one hidden by occlusion. This suggests they find auditory input more salient in the absence of visual input in simple search tasks. After 9 months, infants' object processing appears more sensitive to multimodal (e.g., audiovisual) input. What does this study add? This study tested how audiovisual input affects 10-month-olds' search for an object displaced in an AB task. Sound helped infants find displaced objects in both the presence and absence of visual input. Object processing becomes more

  20. Hidden Liquidity: Determinants and Impact

    OpenAIRE

    Gökhan Cebiroglu; Ulrich Horst

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, ...

  1. Bayesian structural inference for hidden processes

    Science.gov (United States)

    Strelioff, Christopher C.; Crutchfield, James P.

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ɛ-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ɛ-machines, irrespective of estimated transition probabilities. Properties of ɛ-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  2. What do dogs know about hidden objects?

    Science.gov (United States)

    Miller, Holly C; Rayburn-Reeves, Rebecca; Zentall, Thomas R

    2009-07-01

    Previous research has found that dogs will search accurately for an invisibly displaced object when the task is simplified and contextual ambiguity is eliminated [Doré, F.Y., Fiset, S., Goulet, S., Dumas, M.-C., Gagnon, S., 1996. Search behavior in cats and dogs: interspecific differences in working memory and spatial cognition. Animal Learning & Behavior 24, 142-149; Miller, H., Gipson, C., Vaughan, A., Rayburn-Reeves, R., Zentall, T.R., 2009. Object permanence in dogs: invisible displacement in a rotation task. Psychonomic Bulletin & Review 16 (1), 150-155]. For example, when an object is placed inside an occluder, one of which was attached to each end of a beam that could be rotated 90 degrees , dogs search inside of the appropriate occluder. The current research confirmed this finding and tested the possibility that the dogs were using a perceptual/conditioning mechanism (i.e., their gaze was drawn to the occluder as the object was placed inside and they continued looking at it as it rotated). The test was done by introducing a delay between the displacement of the object and the initiation of the dogs' search. In Experiment 1, during the delay, a barrier was placed between the dog and the apparatus. In Experiment 2, the lights were turned off during the delay. The search accuracy for some dogs was strongly affected by the delay, however, search accuracy for other dogs was not affected. These results suggest that although a perceptual/conditioning mechanism may be involved for some dogs, it cannot account for the performance of others. It is likely that these other dogs showed true object permanence.

  3. Dense Plasma Focus: physics and applications (radiation material science, single-shot disclosure of hidden illegal objects, radiation biology and medicine, etc.)

    International Nuclear Information System (INIS)

    Gribkov, V A; Miklaszewski, R; Paduch, M; Zielinska, E; Chernyshova, M; Pisarczyk, T; Sadowski, M J; Pimenov, V N; Demina, E V; Niemela, J; Crespo, M-L; Cicuttin, A; Tomaszewski, K; Skladnik-Sadowska, E; Pytel, K; Zawadka, A; Giannini, G; Longo, F; Talab, A; Ul'yanenko, S E

    2015-01-01

    The paper presents some outcomes obtained during the year of 2013 of the activity in the frame of the International Atomic Energy Agency Co-ordinated research project 'Investigations of Materials under High Repetition and Intense Fusion-Relevant Pulses'. The main results are related to the effects created at the interaction of powerful pulses of different types of radiation (soft and hard X-rays, hot plasma and fast ion streams, neutrons, etc. generated in Dense Plasma Focus (DPF) facilities) with various materials including those that are counted as perspective ones for their use in future thermonuclear reactors. Besides we discuss phenomena observed at the irradiation of biological test objects. We examine possible applications of nanosecond powerful pulses of neutrons to the aims of nuclear medicine and for disclosure of hidden illegal objects. Special attention is devoted to discussions of a possibility to create extremely large and enormously diminutive DPF devices and probabilities of their use in energetics, medicine and modern electronics. (paper)

  4. Dense Plasma Focus: physics and applications (radiation material science, single-shot disclosure of hidden illegal objects, radiation biology and medicine, etc.)

    Science.gov (United States)

    Gribkov, V. A.; Miklaszewski, R.; Paduch, M.; Zielinska, E.; Chernyshova, M.; Pisarczyk, T.; Pimenov, V. N.; Demina, E. V.; Niemela, J.; Crespo, M.-L.; Cicuttin, A.; Tomaszewski, K.; Sadowski, M. J.; Skladnik-Sadowska, E.; Pytel, K.; Zawadka, A.; Giannini, G.; Longo, F.; Talab, A.; Ul'yanenko, S. E.

    2015-03-01

    The paper presents some outcomes obtained during the year of 2013 of the activity in the frame of the International Atomic Energy Agency Co-ordinated research project "Investigations of Materials under High Repetition and Intense Fusion-Relevant Pulses". The main results are related to the effects created at the interaction of powerful pulses of different types of radiation (soft and hard X-rays, hot plasma and fast ion streams, neutrons, etc. generated in Dense Plasma Focus (DPF) facilities) with various materials including those that are counted as perspective ones for their use in future thermonuclear reactors. Besides we discuss phenomena observed at the irradiation of biological test objects. We examine possible applications of nanosecond powerful pulses of neutrons to the aims of nuclear medicine and for disclosure of hidden illegal objects. Special attention is devoted to discussions of a possibility to create extremely large and enormously diminutive DPF devices and probabilities of their use in energetics, medicine and modern electronics.

  5. Removal of brownish-black tarnish on silver–copper alloy objects with sodium glycinate

    Energy Technology Data Exchange (ETDEWEB)

    Cura D’Ars de Figueiredo, João, E-mail: joaoc@ufmg.br; Asevedo, Samara Santos, E-mail: samaranix@hotmail.com; Barbosa, João Henrique Ribeiro, E-mail: joaohrb@yahoo.com.br

    2014-10-30

    Highlights: • The use of glycinate to remove brownish-black tarnish on silver–copper alloy objects is studied. • The method is easy to use and harmless. It is based in the coordination of Ag and Cu in tarnish with glycinate. • The surface of corroded silver objects and products of reaction were studied and glycinate showed to be very selective for Ag(I) and Cu(II). The selectivity for Ag(I) was studied by means of quantum chemical calculations. - Abstract: This article has the principal aim of presenting a new method of chemical cleaning of tarnished silver–copper alloy objects. The chemical cleaning must be harmless to the health, selective to tarnish removal, and easy to use. Sodium glycinate was selected for the study. The reactions of sodium glycinate with tarnish and the silver–copper alloy were evaluated. Products of the reaction, the lixiviated material, and the esthetics of silver–copper alloy coins (used as prototypes) were studied to evaluate if the proposed method can be applied to the cleaning of silver objects. Silver–copper alloys can be deteriorated through a uniform and superficial corrosion process that produces brownish-black tarnish. This tarnish alters the esthetic of the object. The cleaning of artistic and archeological objects requires more caution than regular cleaning, and it must take into account the procedures for the conservation and restoration of cultural heritage. There are different methods for cleaning silver–copper alloy objects, chemical cleaning is one of them. We studied two chemical cleaning methods that use sodium glycinate and sodium acetylglycinate solutions. Silver–copper alloy coins were artificially corroded in a basic thiourea solution and immersed in solutions of sodium glycinate and sodium acetylglycinate. After immersion, optical microscopy and scanning electron microscopy of the surfaces were studied. The sodium glycinate solution was shown to be very efficient in removing the brownish

  6. Removal of brownish-black tarnish on silver–copper alloy objects with sodium glycinate

    International Nuclear Information System (INIS)

    Cura D’Ars de Figueiredo, João; Asevedo, Samara Santos; Barbosa, João Henrique Ribeiro

    2014-01-01

    Highlights: • The use of glycinate to remove brownish-black tarnish on silver–copper alloy objects is studied. • The method is easy to use and harmless. It is based in the coordination of Ag and Cu in tarnish with glycinate. • The surface of corroded silver objects and products of reaction were studied and glycinate showed to be very selective for Ag(I) and Cu(II). The selectivity for Ag(I) was studied by means of quantum chemical calculations. - Abstract: This article has the principal aim of presenting a new method of chemical cleaning of tarnished silver–copper alloy objects. The chemical cleaning must be harmless to the health, selective to tarnish removal, and easy to use. Sodium glycinate was selected for the study. The reactions of sodium glycinate with tarnish and the silver–copper alloy were evaluated. Products of the reaction, the lixiviated material, and the esthetics of silver–copper alloy coins (used as prototypes) were studied to evaluate if the proposed method can be applied to the cleaning of silver objects. Silver–copper alloys can be deteriorated through a uniform and superficial corrosion process that produces brownish-black tarnish. This tarnish alters the esthetic of the object. The cleaning of artistic and archeological objects requires more caution than regular cleaning, and it must take into account the procedures for the conservation and restoration of cultural heritage. There are different methods for cleaning silver–copper alloy objects, chemical cleaning is one of them. We studied two chemical cleaning methods that use sodium glycinate and sodium acetylglycinate solutions. Silver–copper alloy coins were artificially corroded in a basic thiourea solution and immersed in solutions of sodium glycinate and sodium acetylglycinate. After immersion, optical microscopy and scanning electron microscopy of the surfaces were studied. The sodium glycinate solution was shown to be very efficient in removing the brownish

  7. Hidden Curriculum: An Analytical Definition

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Andarvazh

    2018-03-01

    Full Text Available Background: The concept of hidden curriculum was first used by Philip Jackson in 1968, and Hafferty brought this concept to the medical education. Many of the subjects that medical students learn are attributed to this curriculum. So far several definitions have been presented for the hidden curriculum, which on the one hand made this concept richer, and on the other hand, led to confusion and ambiguity.This paper tries to provide a clear and comprehensive definition of it.Methods: In this study, concept analysis of McKenna method was used. Using keywords and searching in the databases, 561 English and 26 Persian references related to the concept was found, then by limitingthe research scope, 125 abstracts and by finding more relevant references, 55 articles were fully studied.Results: After analyzing the definitions by McKenna method, the hidden curriculum is defined as follows: The hidden curriculum is a hidden, powerful, intrinsic in organizational structure and culture and sometimes contradictory message, conveyed implicitly and tacitly in the learning environment by structural and human factors and its contents includes cultural habits and customs, norms, values, belief systems, attitudes, skills, desires and behavioral and social expectations can have a positive or negative effect, unplanned, neither planners nor teachers, nor learners are aware of it. The ultimate consequence of the hidden curriculum includes reproducing the existing class structure, socialization, and familiarizing learners for transmission and joining the professional world.Conclusion: Based on the concept analysis, we arrived at an analytical definition of the hidden curriculum that could be useful for further studies in this area.Keywords: CONCEPT ANALYSIS, HIDDEN CURRICULUM, MCKENNA’S METHOD

  8. Hidden particle production at the ILC

    International Nuclear Information System (INIS)

    Fujii, Keisuke; Itoh, Hideo; Okada, Nobuchika; Hano, Hitoshi; Yoshioka, Tamaki

    2008-01-01

    In a class of new physics models, the new physics sector is completely or partly hidden, namely, a singlet under the standard model (SM) gauge group. Hidden fields included in such new physics models communicate with the standard model sector through higher-dimensional operators. If a cutoff lies in the TeV range, such hidden fields can be produced at future colliders. We consider a scalar field as an example of the hidden fields. Collider phenomenology on this hidden scalar is similar to that of the SM Higgs boson, but there are several features quite different from those of the Higgs boson. We investigate productions of the hidden scalar at the International Linear Collider (ILC) and study the feasibility of its measurements, in particular, how well the ILC distinguishes the scalar from the Higgs boson, through realistic Monte Carlo simulations.

  9. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, M.

    2008-07-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  10. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, Markus; Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the standard model Higgs via a renormalizable quartic term - sometimes called the Higgs portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs, we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone.

  11. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main......PRIMARY OBJECTIVE: The purpose of this study was to listen to and learn from children showing high levels of post-traumatic stress symptoms after parental acquired brain injury (ABI), in order to achieve an in-depth understanding of the difficulties the children face in their everyday lives...... finding indicates that the children experienced numerous losses, many of which were often suppressed or neglected by the children to protect the ill parents. CONCLUSIONS: The findings indicated that the children seemed to make a special effort to hide their feelings of loss and grief in order to protect...

  12. Estimating distribution of hidden objects with drones: from tennis balls to manatees.

    Directory of Open Access Journals (Sweden)

    Julien Martin

    Full Text Available Unmanned aerial vehicles (UAV, or drones, have been used widely in military applications, but more recently civilian applications have emerged (e.g., wildlife population monitoring, traffic monitoring, law enforcement, oil and gas pipeline threat detection. UAV can have several advantages over manned aircraft for wildlife surveys, including reduced ecological footprint, increased safety, and the ability to collect high-resolution geo-referenced imagery that can document the presence of species without the use of a human observer. We illustrate how geo-referenced data collected with UAV technology in combination with recently developed statistical models can improve our ability to estimate the distribution of organisms. To demonstrate the efficacy of this methodology, we conducted an experiment in which tennis balls were used as surrogates of organisms to be surveyed. We used a UAV to collect images of an experimental field with a known number of tennis balls, each of which had a certain probability of being hidden. We then applied spatially explicit occupancy models to estimate the number of balls and created precise distribution maps. We conducted three consecutive surveys over the experimental field and estimated the total number of balls to be 328 (95%CI: 312, 348. The true number was 329 balls, but simple counts based on the UAV pictures would have led to a total maximum count of 284. The distribution of the balls in the field followed a simulated environmental gradient. We also were able to accurately estimate the relationship between the gradient and the distribution of balls. Our experiment demonstrates how this technology can be used to create precise distribution maps in which discrete regions of the study area are assigned a probability of presence of an object. Finally, we discuss the applicability and relevance of this experimental study to the case study of Florida manatee distribution at power plants.

  13. Estimating distribution of hidden objects with drones: from tennis balls to manatees.

    Science.gov (United States)

    Martin, Julien; Edwards, Holly H; Burgess, Matthew A; Percival, H Franklin; Fagan, Daniel E; Gardner, Beth E; Ortega-Ortiz, Joel G; Ifju, Peter G; Evers, Brandon S; Rambo, Thomas J

    2012-01-01

    Unmanned aerial vehicles (UAV), or drones, have been used widely in military applications, but more recently civilian applications have emerged (e.g., wildlife population monitoring, traffic monitoring, law enforcement, oil and gas pipeline threat detection). UAV can have several advantages over manned aircraft for wildlife surveys, including reduced ecological footprint, increased safety, and the ability to collect high-resolution geo-referenced imagery that can document the presence of species without the use of a human observer. We illustrate how geo-referenced data collected with UAV technology in combination with recently developed statistical models can improve our ability to estimate the distribution of organisms. To demonstrate the efficacy of this methodology, we conducted an experiment in which tennis balls were used as surrogates of organisms to be surveyed. We used a UAV to collect images of an experimental field with a known number of tennis balls, each of which had a certain probability of being hidden. We then applied spatially explicit occupancy models to estimate the number of balls and created precise distribution maps. We conducted three consecutive surveys over the experimental field and estimated the total number of balls to be 328 (95%CI: 312, 348). The true number was 329 balls, but simple counts based on the UAV pictures would have led to a total maximum count of 284. The distribution of the balls in the field followed a simulated environmental gradient. We also were able to accurately estimate the relationship between the gradient and the distribution of balls. Our experiment demonstrates how this technology can be used to create precise distribution maps in which discrete regions of the study area are assigned a probability of presence of an object. Finally, we discuss the applicability and relevance of this experimental study to the case study of Florida manatee distribution at power plants.

  14. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  15. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  16. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  17. Hidden attraction the history and mystery of magnetism

    CERN Document Server

    Verschuur, Gerrit L

    1993-01-01

    Long one of nature's most fascinating phenomena, magnetism was once the subject of many superstitions. Magnets were thought useful to thieves, effective as a love potion or as a cure for gout or spasms. They could remove sorcery from women and put demons to flight and even reconcile married couples. It was said that a lodestone pickled in the salt of sucking fish had the power to attract gold. Today, these beliefs have been put aside, but magnetism is no less remarkable for our modern understanding of it. In Hidden Attraction, Gerrit L. Verschuur, a noted astronomer and National Book Award nom

  18. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  19. Hidden photons in connection to dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah; Ringwald, Andreas; Goodsell, Mark D.

    2013-06-01

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  20. POVMs and hidden variables

    International Nuclear Information System (INIS)

    Stairs, Allen

    2007-01-01

    Recent results by Paul Busch and Adan Cabello claim to show that by appealing to POVMs, non-contextual hidden variables can be ruled out in two dimensions. While the results of Busch and Cabello are mathematically correct, interpretive problems render them problematic as no hidden variable proofs

  1. Removal of alum from Iron-Age wooden objects by an applied electric field

    DEFF Research Database (Denmark)

    Christensen, Iben Vernegren; Ottosen, Lisbeth M.; Jensen, Poul

    2010-01-01

    In this paper removal of potassium, sulfate and aluminum ions from waterlogged alum treated wood with the use of an applied electric field is described. An electric DC field was applied across the wood for 4-20 days. At the end of the experiments sulfate had moved as expected towards the anode...... was not obtained in the experiments reported here, but the high conductivity and the transport of the measured ions due to the electric field indicates that an applied electric field as a method for removal of alum and other unwanted ions from treated wooden objects warrants further investigation....

  2. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated

  3. Hotspots ampersand other hidden targets: Probability of detection, number, frequency and area

    International Nuclear Information System (INIS)

    Vita, C.L.

    1994-01-01

    Concepts and equations are presented for making probability-based estimates of the detection probability, and the number, frequency, and area of hidden targets, including hotspots, at a given site. Targets include hotspots, which are areas of extreme or particular contamination, and any object or feature that is hidden from direct visual observation--including buried objects and geologic or hydrologic details or anomalies. Being Bayesian, results are fundamentally consistent with observational methods. Results are tools for planning or interpreting exploration programs used in site investigation or characterization, remedial design, construction, or compliance monitoring, including site closure. Used skillfully and creatively, these tools can help streamline and expedite environmental restoration, reducing time and cost, making site exploration cost-effective, and providing acceptable risk at minimum cost. 14 refs., 4 figs

  4. Helioscope bounds on hidden sector photons

    International Nuclear Information System (INIS)

    Redondo, J.

    2008-01-01

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to χ -14 , depending on the hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter χ at low masses (m γ' <1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  5. Removing defocused objects from single focal plane scans of cytological slides

    Directory of Open Access Journals (Sweden)

    David Friedrich

    2016-01-01

    Full Text Available Background: Virtual microscopy and automated processing of cytological slides are more challenging compared to histological slides. Since cytological slides exhibit a three-dimensional surface and the required microscope objectives with high resolution have a low depth of field, these cannot capture all objects of a single field of view in focus. One solution would be to scan multiple focal planes; however, the increase in processing time and storage requirements are often prohibitive for clinical routine. Materials and Methods: In this paper, we show that it is a reasonable trade-off to scan a single focal plane and automatically reject defocused objects from the analysis. To this end, we have developed machine learning solutions for the automated identification of defocused objects. Our approach includes creating novel features, systematically optimizing their parameters, selecting adequate classifier algorithms, and identifying the correct decision boundary between focused and defocused objects. We validated our approach for computer-assisted DNA image cytometry. Results and Conclusions: We reach an overall sensitivity of 96.08% and a specificity of 99.63% for identifying defocused objects. Applied on ninety cytological slides, the developed classifiers automatically removed 2.50% of the objects acquired during scanning, which otherwise would have interfered the examination. Even if not all objects are acquired in focus, computer-assisted DNA image cytometry still identified more diagnostically or prognostically relevant objects compared to manual DNA image cytometry. At the same time, the workload for the expert is reduced dramatically.

  6. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group....

  7. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...

  8. Ferromagnetic Objects Magnetovision Detection System.

    Science.gov (United States)

    Nowicki, Michał; Szewczyk, Roman

    2013-12-02

    This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  9. Water Institutional Reforms in Scotland: Contested Objectives and Hidden Disputes

    Directory of Open Access Journals (Sweden)

    Antonio A.R. Ioris

    2008-10-01

    Full Text Available One fundamental limitation of the contemporary debate over water institutional reforms has been the excessive concentration on scientific assessments and management techniques, with insufficient consideration of the underlying politics of decision-making and socio-economic asymmetries. This article examines the 'sociology of water regulation' to demonstrate how the implementation of the European Water Framework Directive (WFD in Scotland is profoundly influenced by broader political and economic circumstances. The ongoing reforms of regulatory institutions became entangled in the reorganisation of a devolved Scottish Administration in the late 1990s, which has directly influenced the channels of representation and the overall decision-making processes. It is claimed here that, despite a discursive construction around sustainability and public participation, the new institutional landscape has so far failed to improve long-term patterns of water use and conservation. The article also analyses how the exacerbation of the economic dimension of water management has permeated the entire experience, serving as a political filter for the assessment of impacts and formulation of solutions. The ultimate conclusion is that formal changes in the legislation created a positive space for institutional reforms, but the effective improvement of water policy and catchment management has been curtailed by political inertia and the hidden balance of power.

  10. A Convergent Differential Evolution Algorithm with Hidden Adaptation Selection for Engineering Optimization

    Directory of Open Access Journals (Sweden)

    Zhongbo Hu

    2014-01-01

    Full Text Available Many improved differential Evolution (DE algorithms have emerged as a very competitive class of evolutionary computation more than a decade ago. However, few improved DE algorithms guarantee global convergence in theory. This paper developed a convergent DE algorithm in theory, which employs a self-adaptation scheme for the parameters and two operators, that is, uniform mutation and hidden adaptation selection (haS operators. The parameter self-adaptation and uniform mutation operator enhance the diversity of populations and guarantee ergodicity. The haS can automatically remove some inferior individuals in the process of the enhancing population diversity. The haS controls the proposed algorithm to break the loop of current generation with a small probability. The breaking probability is a hidden adaptation and proportional to the changes of the number of inferior individuals. The proposed algorithm is tested on ten engineering optimization problems taken from IEEE CEC2011.

  11. Nest sanitation as the evolutionary background for egg ejection behaviour and the role of motivation for object removal.

    Science.gov (United States)

    Poláček, Miroslav; Griggio, Matteo; Bartíková, Michaela; Hoi, Herbert

    2013-01-01

    Higher interclutch colour variation can evolve under the pressure of brood parasitism to increase the detection of parasitic eggs. Nest sanitation could be a prerequisite for the evolution of anti-parasite defence in terms of egg ejection. In this respect, we used nest sanitation behaviour as a tool to identify: i) motivation and its underlying function and, ii) which features provoke ejection behaviour. Therefore, we experimentally tested whether size, colour or shape may influence ejection behaviour using artificial flat objects. We found a high interclutch variation in egg colouration and egg size in our tree sparrow (Passer montanus) population. Using colour and size we were in fact able to predict clutch affiliation for each egg. Our experiments further revealed the existence of direct anti-parasite behaviours and birds are able to recognise conspecific eggs, since only experimentally-deposited eggs have been removed. Moreover, experiments with different objects revealed that the motivation of tree sparrows to remove experimental objects from their nests was highest during egg laying for objects of varying size, most likely because of parasitism risk at this breeding stage. In contrary, motivation to remove white objects and objects with edges was higher during incubation stage as behavioural patterns connected to hatching started to emerge. The fact that rejection rate of our flat objects was higher than real egg ejection, suggests that egg ejection in tree sparrows and probably more general in small passerines, to be limited by elevated costs to eject eggs with their beaks. The presence of anti-parasite behaviour supports our suggestion that brood parasitism causes variation in egg features, as we have found that tree sparrows can recognise and reject conspecific eggs in their clutch. In conclusion, in tree sparrows it seems that nest sanitation plays a key role in the evolution of the removal of parasitic eggs.

  12. Nest sanitation as the evolutionary background for egg ejection behaviour and the role of motivation for object removal.

    Directory of Open Access Journals (Sweden)

    Miroslav Poláček

    Full Text Available Higher interclutch colour variation can evolve under the pressure of brood parasitism to increase the detection of parasitic eggs. Nest sanitation could be a prerequisite for the evolution of anti-parasite defence in terms of egg ejection. In this respect, we used nest sanitation behaviour as a tool to identify: i motivation and its underlying function and, ii which features provoke ejection behaviour. Therefore, we experimentally tested whether size, colour or shape may influence ejection behaviour using artificial flat objects. We found a high interclutch variation in egg colouration and egg size in our tree sparrow (Passer montanus population. Using colour and size we were in fact able to predict clutch affiliation for each egg. Our experiments further revealed the existence of direct anti-parasite behaviours and birds are able to recognise conspecific eggs, since only experimentally-deposited eggs have been removed. Moreover, experiments with different objects revealed that the motivation of tree sparrows to remove experimental objects from their nests was highest during egg laying for objects of varying size, most likely because of parasitism risk at this breeding stage. In contrary, motivation to remove white objects and objects with edges was higher during incubation stage as behavioural patterns connected to hatching started to emerge. The fact that rejection rate of our flat objects was higher than real egg ejection, suggests that egg ejection in tree sparrows and probably more general in small passerines, to be limited by elevated costs to eject eggs with their beaks. The presence of anti-parasite behaviour supports our suggestion that brood parasitism causes variation in egg features, as we have found that tree sparrows can recognise and reject conspecific eggs in their clutch. In conclusion, in tree sparrows it seems that nest sanitation plays a key role in the evolution of the removal of parasitic eggs.

  13. Hidden Risk Factors for Women

    Science.gov (United States)

    ... A.S.T. Quiz Hidden Stroke Risk Factors for Women Updated:Nov 22,2016 Excerpted from "What Women Need To Know About The Hidden Risk Factors ... 2012) This year, more than 100,000 U.S. women under 65 will have a stroke. Stroke is ...

  14. Hidden-Sector Dynamics and the Supersymmetric Seesaw

    CERN Document Server

    Campbell, Bruce A; Maybury, David W

    2008-01-01

    In light of recent analyses that have shown that nontrivial hidden-sector dynamics in models of supersymmetry breaking can lead to a significant impact on the predicted low-energy supersymmetric spectrum, we extend these studies to consider hidden-sector effects in extensions of the MSSM to include a seesaw model for neutrino masses. A dynamical hidden sector in an interval of mass scales below the seesaw scale would yield renormalization-group running involving both the anomalous dimension from the hidden sector and the seesaw-extended MSSM renormalization group equations (RGEs). These effects interfere in general, altering the generational mixing of the sleptons, and allowing for a substantial change to the expected level of charged-lepton flavour violation in seesaw-extended MSSM models. These results provide further support for recent theoretical observations that knowledge of the hidden sector is required in order to make concrete low-energy predictions, if the hidden sector is strongly coupled. In parti...

  15. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index.

    Directory of Open Access Journals (Sweden)

    Julie C Ruel-Bergeron

    Full Text Available Deficiencies in essential vitamins and minerals-also termed hidden hunger-are pervasive and hold negative consequences for the cognitive and physical development of children.This analysis evaluates the change in hidden hunger over time in the form of one composite indicator-the Hidden Hunger Index (HHI-using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency. Net changes from 1995-2011 and population weighted regional means for various time periods are measured.Globally, hidden hunger improved (-6.7 net change in HHI from 1995-2011. Africa was the only region to see a deterioration in hidden hunger (+1.9 over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0, while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased.This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs. However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda.Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish.

  16. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  17. Hidden variables and locality in quantum theory

    International Nuclear Information System (INIS)

    Shiva, Vandana.

    1978-12-01

    The status of hidden variables in quantum theory has been debated since the 1920s. The author examines the no-hidden-variable theories of von Neumann, Kochen, Specker and Bell, and finds that they all share one basic assumption: averaging over the hidden variables should reproduce the quantum mechanical probabilities. Von Neumann also makes a linearity assumption, Kochen and Specker require the preservation of certain functional relations between magnitudes, and Bell proposes a locality condition. It has been assumed that the extrastatistical requirements are needed to serve as criteria of success for the introduction of hidden variables because the statistical condition is trivially satisfied, and that Bell's result is based on a locality condition that is physically motivated. The author shows that the requirement of weak locality, which is not physically motivated, is enough to give Bell's result. The proof of Bell's inequality works equally well for any pair of commuting magnitudes satisfying a condition called the degeneracy principle. None of the no-hidden-variable proofs apply to a class of hidden variable theories that are not phase-space reconstructions of quantum mechanics. The author discusses one of these theories, the Bohm-Bub theory, and finds that hidden variable theories that re all the quantum statistics, for single and sequential measurements, must introduce a randomization process for the hidden variables after each measurement. The philosophical significance of this theory lies in the role it can play in solving the conceptual puzzles posed by quantum theory

  18. Featured Image: Revealing Hidden Objects with Color

    Science.gov (United States)

    Kohler, Susanna

    2018-02-01

    Stunning color astronomical images can often be the motivation for astronomers to continue slogging through countless data files, calculations, and simulations as we seek to understand the mysteries of the universe. But sometimes the stunning images can, themselves, be the source of scientific discovery. This is the case with the below image of Lynds Dark Nebula 673, located in the Aquila constellation, that was captured with the Mayall 4-meter telescope at Kitt Peak National Observatory by a team of scientists led by Travis Rector (University of Alaska Anchorage). After creating the image with a novel color-composite imaging method that reveals faint H emission (visible in red in both images here), Rector and collaborators identified the presence of a dozen new Herbig-Haro objects small cloud patches that are caused when material is energetically flung out from newly born stars. The image adapted above shows three of the new objects, HH 118789, aligned with two previously known objects, HH 32 and 332 suggesting they are driven by the same source. For more beautiful images and insight into the authors discoveries, check out the article linked below!Full view of Lynds Dark Nebula 673. Click for the larger view this beautiful composite image deserves! [T.A. Rector (University of Alaska Anchorage) and H. Schweiker (WIYN and NOAO/AURA/NSF)]CitationT. A. Rector et al 2018 ApJ 852 13. doi:10.3847/1538-4357/aa9ce1

  19. … To be hidden does not mean to be merely revealed – Part 1 Artistic research on hidden curriculum

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-09-01

    Full Text Available This text revisits the long-term project Hidden Curriculum, initiated by Annette Krauss. The project addresses unquestioned routines, hierarchies of knowledge (part 1, and the role of the body in learning processes (part 2 from the perspective of secondary/high school education (in the research on a hidden curriculum. A deeper analysis of educational studies on the phenomenon of ‘hidden curriculum’ in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire, and Jacques Rancière brings forward important insights generated through the artistic research within hidden curriculum. The aim of this text is to address academic canons, corporeality, and investigate everyday norms through revisiting the framework, results, and processes of the collaborative research into hidden curriculum with secondary high school students.

  20. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index

    Science.gov (United States)

    Stevens, Gretchen A.; Ezzati, Majid; Black, Robert E.; Kraemer, Klaus

    2015-01-01

    Background Deficiencies in essential vitamins and minerals–also termed hidden hunger–are pervasive and hold negative consequences for the cognitive and physical development of children. Methods This analysis evaluates the change in hidden hunger over time in the form of one composite indicator–the Hidden Hunger Index (HHI)–using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency). Net changes from 1995–2011 and population weighted regional means for various time periods are measured. Findings Globally, hidden hunger improved (-6.7 net change in HHI) from 1995–2011. Africa was the only region to see a deterioration in hidden hunger (+1.9) over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0), while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased. Interpretation This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs). However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda. Funding Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish. PMID:26673631

  1. PELACAKAN DAN PENGENALAN WAJAH MENGGUNAKAN METODE EMBEDDED HIDDEN MARKOV MODELS

    Directory of Open Access Journals (Sweden)

    Arie Wirawan Margono

    2004-01-01

    Full Text Available Tracking and recognizing human face becomes one of the important research subjects nowadays, where it is applicable in security system like room access, surveillance, as well as searching for person identity in police database. Because of applying in security case, it is necessary to have robust system for certain conditions such as: background influence, non-frontal face pose of male or female in different age and race. The aim of this research is to develop software which combines human face tracking using CamShift algorithm and face recognition system using Embedded Hidden Markov Models. The software uses video camera (webcam for real-time input, video AVI for dynamic input, and image file for static input. The software uses Object Oriented Programming (OOP coding style with C++ programming language, Microsoft Visual C++ 6.0® compiler, and assisted by some libraries of Intel Image Processing Library (IPL and Intel Open Source Computer Vision (OpenCV. System testing shows that object tracking based on skin complexion using CamShift algorithm comes out well, for tracking of single or even two face objects at once. Human face recognition system using Embedded Hidden Markov Models method has reach accuracy percentage of 82.76%, using 341 human faces in database that consists of 31 individuals with 11 poses and 29 human face testers. Abstract in Bahasa Indonesia : Pelacakan dan pengenalan wajah manusia merupakan salah satu bidang yang cukup berkembang dewasa ini, dimana aplikasi dapat diterapkan dalam bidang keamanan (security system seperti ijin akses masuk ruangan, pengawasan lokasi (surveillance, maupun pencarian identitas individu pada database kepolisian. Karena diterapkan dalam kasus keamanan, dibutuhkan sistem yang handal terhadap beberapa kondisi, seperti: pengaruh latar belakang, pose wajah non-frontal terhadap pria maupun wanita dalam perbedaan usia dan ras. Tujuan penelitiam ini adalah untuk membuat perangkat lunak yang menggabungkan

  2. Compressing the hidden variable space of a qubit

    OpenAIRE

    Montina, Alberto

    2010-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of a single realization is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with the quantum states satisfy reasonable criteria ...

  3. Search for Hidden Particles

    CERN Multimedia

    Solovev, V

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  4. Objectivity

    CERN Document Server

    Daston, Lorraine

    2010-01-01

    Objectivity has a history, and it is full of surprises. In Objectivity, Lorraine Daston and Peter Galison chart the emergence of objectivity in the mid-nineteenth-century sciences--and show how the concept differs from its alternatives, truth-to-nature and trained judgment. This is a story of lofty epistemic ideals fused with workaday practices in the making of scientific images. From the eighteenth through the early twenty-first centuries, the images that reveal the deepest commitments of the empirical sciences--from anatomy to crystallography--are those featured in scientific atlases, the compendia that teach practitioners what is worth looking at and how to look at it. Galison and Daston use atlas images to uncover a hidden history of scientific objectivity and its rivals. Whether an atlas maker idealizes an image to capture the essentials in the name of truth-to-nature or refuses to erase even the most incidental detail in the name of objectivity or highlights patterns in the name of trained judgment is a...

  5. Higgs Portal into Hidden Sectors

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    Several attractive theoretical ideas suggest the existence of one or more 'hidden sectors' consisting of standard model singlet fields, some of which may not be too heavy. There is a profound reason to think that the Higgs sector might provide the first access to these hidden sectors. This scenario could affect Higgs phenomenology in drastic ways.

  6. Hidden in plain sight: the formal, informal, and hidden curricula of a psychiatry clerkship.

    Science.gov (United States)

    Wear, Delese; Skillicorn, Jodie

    2009-04-01

    To examine perceptions of the formal, informal, and hidden curricula in psychiatry as they are observed and experienced by (1) attending physicians who have teaching responsibilities for residents and medical students, (2) residents who are taught by those same physicians and who have teaching responsibilities for medical students, and (3) medical students who are taught by attendings and residents during their psychiatry rotation. From June to November 2007, the authors conducted focus groups with attendings, residents, and students in one midwestern academic setting. The sessions were audiotaped, transcribed, and analyzed for themes surrounding the formal, informal, and hidden curricula. All three groups offered a similar belief that the knowledge, skills, and values of the formal curriculum focused on building relationships. Similarly, all three suggested that elements of the informal and hidden curricula were expressed primarily as the values arising from attendings' role modeling, as the nature and amount of time attendings spend with patients, and as attendings' advice arising from experience and intuition versus "textbook learning." Whereas students and residents offered negative values arising from the informal and hidden curricula, attendings did not, offering instead the more positive values they intended to encourage through the informal and hidden curricula. The process described here has great potential in local settings across all disciplines. Asking teachers and learners in any setting to think about how they experience the educational environment and what sense they make of all curricular efforts can provide a reality check for educators and a values check for learners as they critically reflect on the meanings of what they are learning.

  7. A Novel Method for Decoding Any High-Order Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Fei Ye

    2014-01-01

    Full Text Available This paper proposes a novel method for decoding any high-order hidden Markov model. First, the high-order hidden Markov model is transformed into an equivalent first-order hidden Markov model by Hadar’s transformation. Next, the optimal state sequence of the equivalent first-order hidden Markov model is recognized by the existing Viterbi algorithm of the first-order hidden Markov model. Finally, the optimal state sequence of the high-order hidden Markov model is inferred from the optimal state sequence of the equivalent first-order hidden Markov model. This method provides a unified algorithm framework for decoding hidden Markov models including the first-order hidden Markov model and any high-order hidden Markov model.

  8. Abelian hidden sectors at a GeV

    International Nuclear Information System (INIS)

    Morrissey, David E.; Poland, David; Zurek, Kathryn M.

    2009-01-01

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1) x gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  9. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  10. Phase object retrieval through scattering medium

    Science.gov (United States)

    Zhao, Ming; Zhao, Meijing; Wu, Houde; Xu, Wenhai

    2018-05-01

    Optical imaging through a scattering medium has been an interesting and important research topic, especially in the field of biomedical imaging. However, it is still a challenging task due to strong scattering. This paper proposes to recover the phase object behind the scattering medium from one single-shot speckle intensity image using calibrated transmission matrices (TMs). We construct the forward model as a non-linear mapping, since the intensity image loses the phase information, and then a generalized phase retrieval algorithm is employed to recover the hidden object. Moreover, we show that a phase object can be reconstructed with a small portion of the speckle image captured by the camera. The simulation is performed to demonstrate our scheme and test its performance. Finally, a real experiment is set up, we measure the TMs from the scattering medium, and then use it to reconstruct the hidden object. We show that a phase object of size 32 × 32 is retrieved from 150 × 150 speckle grains, which is only 1/50 of the speckles area. We believe our proposed method can benefit the community of imaging through the scattering medium.

  11. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  12. Compressing the hidden variable space of a qubit

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of single realizations is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with quantum states satisfy reasonable criteria of regularity. Possible generalizations of this shrinking to an N-dimensional Hilbert space are discussed.

  13. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  14. A classification of hidden-variable properties

    International Nuclear Information System (INIS)

    Brandenburger, Adam; Yanofsky, Noson

    2008-01-01

    Hidden variables are extra components added to try to banish counterintuitive features of quantum mechanics. We start with a quantum-mechanical model and describe various properties that can be asked of a hidden-variable model. We present six such properties and a Venn diagram of how they are related. With two existence theorems and three no-go theorems (EPR, Bell and Kochen-Specker), we show which properties of empirically equivalent hidden-variable models are possible and which are not. Formally, our treatment relies only on classical probability models, and physical phenomena are used only to motivate which models to choose

  15. Determinism, independence, and objectivity are incompatible.

    Science.gov (United States)

    Ionicioiu, Radu; Mann, Robert B; Terno, Daniel R

    2015-02-13

    Hidden-variable models aim to reproduce the results of quantum theory and to satisfy our classical intuition. Their refutation is usually based on deriving predictions that are different from those of quantum mechanics. Here instead we study the mutual compatibility of apparently reasonable classical assumptions. We analyze a version of the delayed-choice experiment which ostensibly combines determinism, independence of hidden variables on the conducted experiments, and wave-particle objectivity (the assertion that quantum systems are, at any moment, either particles or waves, but not both). These three ideas are incompatible with any theory, not only with quantum mechanics.

  16. Perspective: Disclosing hidden sources of funding.

    Science.gov (United States)

    Resnik, David B

    2009-09-01

    In this article, the author discusses ethical and policy issues related to the disclosure of hidden sources of funding in research. The author argues that authors have an ethical obligation to disclose hidden sources of funding and that journals should adopt policies to enforce this obligation. Journal policies should require disclosure of hidden sources of funding that authors know about and that have a direct relation to their research. To stimulate this discussion, the author describes a recent case: investigators who conducted a lung cancer screening study had received funding from a private foundation that was supported by a tobacco company, but they did not disclose this relationship to the journal. Investigators and journal editors must be prepared to deal with these issues in a manner that promotes honesty, transparency, fairness, and accountability in research. The development of well-defined, reasonable policies pertaining to hidden sources of funding can be a step in this direction.

  17. Objective guidelines for removing an external fixator after tibial lengthening using pixel value ratio: a pilot study.

    Science.gov (United States)

    Zhao, Li; Fan, Qing; Venkatesh, K P; Park, Man S; Song, Hae Ryong

    2009-12-01

    During limb lengthening over an intramedullary nail, decisions regarding external fixator removal and weightbearing depend on the amount of callus seen at the lengthening area on radiographs. However, this method is subjective and objective evaluation of the amount of callus likely would minimize nail or interlocking screw breakage and refracture after fixator removal. We asked how many cortices with full corticalization of the newly formed bone at the lengthening area are needed to allow fixator removal and full weightbearing and how to radiographically determine the stage of corticalization. We retrospectively reviewed 17 patients (34 lengthenings) who underwent bilateral tibial lengthenings over an intramedullary nail. The average gain in length was 7.2 +/- 3.4 cm. We determined the pixel value ratio (ratio of pixel value of regenerate versus the mean pixel value of adjacent bone) of the lengthened area on radiographs. There were no nail or screw breakage and refracture. Partial weightbearing with crutches was permitted when the pixel value ratio was 1 in two cortices and full weightbearing without crutches was permitted when the pixel value ratio was 1 in three cortices. The pixel value ratio on radiographs can be an objective parameter for callus measurement and may provide guidelines for the timing of external fixator removal. We cannot determine from our limited data the minimum pixel value in how many cortices would suggest safe removal, but we can say our criteria were not associated with subsequent refracture.

  18. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  19. Object permanence in young infants: further evidence.

    Science.gov (United States)

    Baillargeon, R; DeVos, J

    1991-12-01

    Recent evidence suggests that 4.5- and even 3.5-month-old infants realize that objects continue to exist when hidden. The goal of the present experiments was to obtain converging evidence of object permanence in young infants. Experiments were conducted using paradigms previously used to demonstrate object permanence in 5.5-month-old infants and 6.5-month-old infants. In one experiment, 3.5-month-old infants watched a short or a tall carrot slide along a track. The track's center was hidden by a screen with a large window in its upper half. The short carrot was shorter than the window's lower edge and so did not appear in the window when passing behind the screen; the tall carrot was taller than the window's lower edge and hence should have appeared in the window but did not. The infants looked reliably longer at the tall than at the short carrot event, suggesting that they (a) represented the existence, height, and trajectory of each carrot behind the screen and (b) expected the tall carrot to appear in the screen window and were surprised that it did not. Control trials supported this interpretation. In another experiment, 4.0-month-old infants saw a toy car roll along a track that was partly hidden by a screen. A large toy mouse was placed behind the screen, either on top or in back of the track. The female infants looked reliably longer when the mouse stood on top as opposed to in back of the track, suggesting that they (a) represented the existence and trajectory of the car behind the screen, (b) represented the existence and location of the mouse behind the screen, and (c) were surprised to see the car reappear from behind the screen when the mouse stood in its path. A second experiment supported this interpretation. The results of these experiments provide further evidence that infants aged 3.5 months and older are able to represent and to reason about hidden objects.

  20. A market on both ‘sides’ of the law: the use of the hidden web for the sale of new psychoactive substances

    OpenAIRE

    Wadsworth, Elle; Drummond, Colin; Kimergård, Andreas; Deluca, Paolo

    2017-01-01

    ObjectiveThe hidden Web is used for the anonymous sale of drugs, and with the UK Psychoactive Substances Act, 2016, implemented on May 26th 2016; it could increase as a platform for obtaining new psychoactive substances (NPS).This study aims to describe the NPS market on the visible and hidden Web preban, and assess whether the hidden Web is a likely place for the sale of NPS postban.MethodsData collection of 113 online shops took place in October 2015. Data collection of 22 cryptomarkets too...

  1. Hidden supersymmetry and Fermion number fractionalization

    International Nuclear Information System (INIS)

    Akhoury, R.

    1985-01-01

    This paper discusses how a hidden supersymmetry of the underlying field theories can be used to interpret and to calculate fermion number fractionalization in different dimensions. This is made possible by relating it to a corresponding Witten index of the hidden supersymmetry. The closely related anomalies in odd dimensions are also discussed

  2. Recovering a hidden polarization by ghost polarimetry.

    Science.gov (United States)

    Janassek, Patrick; Blumenstein, Sébastien; Elsäßer, Wolfgang

    2018-02-15

    By exploiting polarization correlations of light from a broadband fiber-based amplified spontaneous emission source we succeed in reconstructing a hidden polarization in a ghost polarimetry experiment in close analogy to ghost imaging and ghost spectroscopy. Thereby, an original linear polarization state in the object arm of a Mach-Zehnder interferometer configuration which has been camouflaged by a subsequent depolarizer is recovered by correlating it with light from a reference beam. The variation of a linear polarizer placed inside the reference beam results in a Malus law type second-order intensity correlation with high contrast, thus measuring a ghost polarigram.

  3. Optimization of Artificial Neural Network using Evolutionary Programming for Prediction of Cascading Collapse Occurrence due to the Hidden Failure Effect

    Science.gov (United States)

    Idris, N. H.; Salim, N. A.; Othman, M. M.; Yasin, Z. M.

    2018-03-01

    This paper presents the Evolutionary Programming (EP) which proposed to optimize the training parameters for Artificial Neural Network (ANN) in predicting cascading collapse occurrence due to the effect of protection system hidden failure. The data has been collected from the probability of hidden failure model simulation from the historical data. The training parameters of multilayer-feedforward with backpropagation has been optimized with objective function to minimize the Mean Square Error (MSE). The optimal training parameters consists of the momentum rate, learning rate and number of neurons in first hidden layer and second hidden layer is selected in EP-ANN. The IEEE 14 bus system has been tested as a case study to validate the propose technique. The results show the reliable prediction of performance validated through MSE and Correlation Coefficient (R).

  4. The Hidden Reason Behind Children's Misbehavior.

    Science.gov (United States)

    Nystul, Michael S.

    1986-01-01

    Discusses hidden reason theory based on the assumptions that: (1) the nature of people is positive; (2) a child's most basic psychological need is involvement; and (3) a child has four possible choices in life (good somebody, good nobody, bad somebody, or severely mentally ill.) A three step approach for implementing hidden reason theory is…

  5. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  6. Conscientious objection in health care

    Directory of Open Access Journals (Sweden)

    Kuře Josef

    2016-12-01

    Full Text Available The paper deals with conscientious objection in health care, addressing the problems of scope, verification and limitation of such refusal, paying attention to ideological agendas hidden behind the right of conscience where the claimed refusal can cause harm or where such a claim is an attempt to impose certain moral values on society or an excuse for not providing health care. The nature of conscientious objection will be investigated and an ethical analysis of conscientious objection will be conducted. Finally some suggestions for health care policy will be proposed.

  7. "Hidden" bone metastasis from thyroid carcinoma: a clinical note.

    Science.gov (United States)

    Sioka, C; Skarulis, M C; Tulloch-Reid, M K; Heiss, J D; Reynolds, J C

    2014-01-01

    The (131)I-iodide ((131)I) whole-body scan, for thyroid carcinoma is at times difficult to interpret. In a diagnostic whole body (131)I scan of a patient with follicular carcinoma, a posterior skull lesion was partially hidden by overlapping facial structures. On lateral head view, the abnormality was clearly evident. SPECT/CT and MRI showed the lesion originated in the occipital bone and had enlarged into the posterior fossa. The mass was surgically removed and the patient received (131)I therapy for residual tissue. The study demonstrates a pitfall in the reading of two dimensional radioiodine images which can be overcome by SPECT or lateral imaging. Copyright © 2013 Elsevier España, S.L. and SEMNIM. All rights reserved.

  8. Hidden charged dark matter and chiral dark radiation

    Science.gov (United States)

    Ko, P.; Nagata, Natsumi; Tang, Yong

    2017-10-01

    In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.

  9. Adaptive filtering for hidden node detection and tracking in networks.

    Science.gov (United States)

    Hamilton, Franz; Setzer, Beverly; Chavez, Sergio; Tran, Hien; Lloyd, Alun L

    2017-07-01

    The identification of network connectivity from noisy time series is of great interest in the study of network dynamics. This connectivity estimation problem becomes more complicated when we consider the possibility of hidden nodes within the network. These hidden nodes act as unknown drivers on our network and their presence can lead to the identification of false connections, resulting in incorrect network inference. Detecting the parts of the network they are acting on is thus critical. Here, we propose a novel method for hidden node detection based on an adaptive filtering framework with specific application to neuronal networks. We consider the hidden node as a problem of missing variables when model fitting and show that the estimated system noise covariance provided by the adaptive filter can be used to localize the influence of the hidden nodes and distinguish the effects of different hidden nodes. Additionally, we show that the sequential nature of our algorithm allows for tracking changes in the hidden node influence over time.

  10. The hidden universe

    International Nuclear Information System (INIS)

    Disney, M.

    1985-01-01

    Astronomer Disney has followed a somewhat different tack than that of most popular books on cosmology by concentrating on the notion of hidden (as in not directly observable by its own radiation) matter in the universe

  11. New findings on object permanence: A developmental difference between two types of occlusion.

    Science.gov (United States)

    Moore, M Keith; Meltzoff, Andrew N

    1999-11-01

    Manual search for totally occluded objects was investigated in 10-, 12- and 14-month-old infants. Infants responded to two types of total hiding in different ways, supporting the inference that object permanence is not a once-and-for-all attainment. Occlusion of an object by movement of a screen over it was solved at an earlier age than occlusion in which an object was carried under the screen. This dissociation was not explained by motivation, motor skill or means-ends coordination, because for both tasks the same object was hidden in the same place under the same screen and required the same uncovering response. This dissociation generalized across an experimentally manipulated change in recovery means-infants removed cloths while seated at a table in Expt 1 and were required to crawl through 3-D space to displace semi-rigid pillows in Expt 2. Further analysis revealed that emotional response varied as a function of hiding, suggesting an affective correlate of infant cognition. There are four empirical findings to account for: developmental change, task dissociation, generalization of the effects across recovery means, and emotional reactions. An identity-development theory is proposed explaining these findings in terms of infants' understanding of object identity and the developmental relationship between object identity and object permanence. Object identity is seen as a necessary precursor to the development of object permanence.

  12. Religious Tolerance in the Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Kevin Nobel Kurniawan

    2018-03-01

    Full Text Available Religious intolerance is spreading within the Indonesian institution of education. Previous studies have shown that the growth of intolerance is due to the state’s regulation and pedagogical apparatus. In contrast to the previous studies, I argue that the intolerance is related to hidden curriculum applied by the institution of education.  Normatively, the hidden curriculum contains the value of religious tolerance. However, factually, the author found that there are practices of intolerance, through the formal and informal spheres in the school’s structure, within the hidden curriculum. This article applies a qualitative approach with a mixed method research strategy to analyze data collected from students, teachers, and alumnis through field observation, in-depth interview, and survey.

  13. Object permanence in domestic dogs (Canis lupus familiaris) and gray wolves (Canis lupus).

    Science.gov (United States)

    Fiset, Sylvain; Plourde, Vickie

    2013-05-01

    Recent evidence suggests that phylogenetic constraints exerted on dogs by the process of domestication have altered the ability of dogs to represent the physical world and the displacement of objects. In this study, invisible (Experiment 1) and visible (Experiment 2) displacement problems were administered to determine whether domestic dogs' and gray wolves' cognitive capacities to infer the position of a hidden object differ. The results revealed that adult dogs and wolves performed similarly in searching for disappearing objects: Both species succeeded the visible displacement tasks but failed the invisible displacement problems. We conclude that physical cognition for finding hidden objects in domestic dogs and gray wolves is alike and unrelated to the process of domestication.

  14. Hidden gauge structure of supersymmetric free differential algebras

    Energy Technology Data Exchange (ETDEWEB)

    Andrianopoli, Laura [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy); D’Auria, Riccardo [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); Ravera, Lucrezia [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy)

    2016-08-16

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q{sup ′} introduced in http://dx.doi.org/10.1016/0550-3213(82)90376-5 and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B{sup (2)} and B{sup (3)} in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of two nilpotent fermionic generators in the hidden algebra. We propose that our approach, where all the invariances of the FDA are expressed as Lie derivatives of the p-forms in the hidden supergroup manifold, could be an appropriate framework to discuss theories defined in enlarged versions of superspace recently considered in the literature, such us double field theory and its generalizations.

  15. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  16. Geometric phases and hidden local gauge symmetry

    International Nuclear Information System (INIS)

    Fujikawa, Kazuo

    2005-01-01

    The analysis of geometric phases associated with level crossing is reduced to the familiar diagonalization of the Hamiltonian in the second quantized formulation. A hidden local gauge symmetry, which is associated with the arbitrariness of the phase choice of a complete orthonormal basis set, becomes explicit in this formulation (in particular, in the adiabatic approximation) and specifies physical observables. The choice of a basis set which specifies the coordinate in the functional space is arbitrary in the second quantization, and a subclass of coordinate transformations, which keeps the form of the action invariant, is recognized as the gauge symmetry. We discuss the implications of this hidden local gauge symmetry in detail by analyzing geometric phases for cyclic and noncyclic evolutions. It is shown that the hidden local symmetry provides a basic concept alternative to the notion of holonomy to analyze geometric phases and that the analysis based on the hidden local gauge symmetry leads to results consistent with the general prescription of Pancharatnam. We however note an important difference between the geometric phases for cyclic and noncyclic evolutions. We also explain a basic difference between our hidden local gauge symmetry and a gauge symmetry (or equivalence class) used by Aharonov and Anandan in their definition of generalized geometric phases

  17. Locating Hidden Servers

    National Research Council Canada - National Science Library

    Oeverlier, Lasse; Syverson, Paul F

    2006-01-01

    .... Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship...

  18. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  19. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...

  20. Microwave background constraints on mixing of photons with hidden photons

    International Nuclear Information System (INIS)

    Mirizzi, Alessandro; Redondo, Javier; Sigl, Guenter

    2008-12-01

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle χ 0 -7 - 10 -5 for hidden photon masses between 10 -14 eV and 10 -7 eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  1. Hidden Crises and Communication: An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  2. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  3. Adult-acquired hidden penis in obese patients: a critical survey of the literature.

    Science.gov (United States)

    Cavayero, Chase T; Cooper, Meghan A; Harlin, Stephen L

    2015-03-01

    Hidden penis is anatomically defined by a lack of firm attachments of the skin and dartos fascia to the underlying Buck fascia. To critically appraise the research evidence that could support the most effective surgical techniques for adult-acquired hidden penis in obese patients. Studies investigating patients with a diagnosis of hidden penis were identified. Of these studies, only those with adult patients classified as overweight or obese (body mass index >25) were included in the review. Three reviewers examined the abstracts of the studies identified in the initial Medline search, and abstracts considered potentially relevant underwent full-text review. Studies that included patients with congenital, iatrogenic (eg, circumcision issues or aesthetic genital surgery), or traumatic causes of hidden penis were excluded. Studies that did not define the diagnostic criteria for hidden penis were excluded to minimize the risk of definition bias. The quality of evidence for each study was determined after considering the following sources of bias: method of allocation to study groups, data analysis, presence of baseline differences between groups, objectivity of outcome, and completeness of follow-up. Using these criteria, studies were then graded as high, moderate, or low in quality. Seven studies with a total of 119 patients met the inclusion criteria. All but 1 of the studies were nonrandomized. One study provided a clear presentation of results and appropriate statistical analysis. Six studies accounted for individual-based differences, and 1 study failed to account for baseline differences altogether. Four studies addressed follow-up. One study was of high quality, 2 were of moderate quality, and 4 were of low quality. Building a clinical practice guideline for the surgical management of hidden penis has proven difficult because of a lack of high-quality, statistically significant data in the research synthesis. The authors elucidate the challenges and epitomize

  4. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  5. Hidden Markov Model Application to Transfer The Trader Online Forex Brokers

    Directory of Open Access Journals (Sweden)

    Farida Suharleni

    2012-05-01

    Full Text Available Hidden Markov Model is elaboration of Markov chain, which is applicable to cases that can’t directly observe. In this research, Hidden Markov Model is used to know trader’s transition to broker forex online. In Hidden Markov Model, observed state is observable part and hidden state is hidden part. Hidden Markov Model allows modeling system that contains interrelated observed state and hidden state. As observed state in trader’s transition to broker forex online is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online, whereas as hidden state is broker forex online Marketiva, Masterforex, Instaforex, FBS and Others. First step on application of Hidden Markov Model in this research is making construction model by making a probability of transition matrix (A from every broker forex online. Next step is making a probability of observation matrix (B by making conditional probability of five categories, that is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online and also need to determine an initial state probability (π from every broker forex online. The last step is using Viterbi algorithm to find hidden state sequences that is broker forex online sequences which is the most possible based on model and observed state that is the five categories. Application of Hidden Markov Model is done by making program with Viterbi algorithm using Delphi 7.0 software with observed state based on simulation data. Example: By the number of observation T = 5 and observed state sequences O = (2,4,3,5,1 is found hidden state sequences which the most possible with observed state O as following : where X1 = FBS, X2 = Masterforex, X3 = Marketiva, X4 = Others, and X5 = Instaforex.

  6. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  7. Hidden symmetries in minimal five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, Markus; Silva, Sebastian

    2004-01-01

    We study the hidden symmetries arising in the dimensional reduction of d=5, N=2 supergravity to three dimensions. Extending previous partial results for the bosonic part, we give a derivation that includes fermionic terms, shedding light on the appearance of the local hidden symmetry SO(4) in the reduction

  8. Objective classification of latent behavioral states in bio-logging data using multivariate-normal hidden Markov models.

    Science.gov (United States)

    Phillips, Joe Scutt; Patterson, Toby A; Leroy, Bruno; Pilling, Graham M; Nicol, Simon J

    2015-07-01

    Analysis of complex time-series data from ecological system study requires quantitative tools for objective description and classification. These tools must take into account largely ignored problems of bias in manual classification, autocorrelation, and noise. Here we describe a method using existing estimation techniques for multivariate-normal hidden Markov models (HMMs) to develop such a classification. We use high-resolution behavioral data from bio-loggers attached to free-roaming pelagic tuna as an example. Observed patterns are assumed to be generated by an unseen Markov process that switches between several multivariate-normal distributions. Our approach is assessed in two parts. The first uses simulation experiments, from which the ability of the HMM to estimate known parameter values is examined using artificial time series of data consistent with hypotheses about pelagic predator foraging ecology. The second is the application to time series of continuous vertical movement data from yellowfin and bigeye tuna taken from tuna tagging experiments. These data were compressed into summary metrics capturing the variation of patterns in diving behavior and formed into a multivariate time series used to estimate a HMM. Each observation was associated with covariate information incorporating the effect of day and night on behavioral switching. Known parameter values were well recovered by the HMMs in our simulation experiments, resulting in mean correct classification rates of 90-97%, although some variance-covariance parameters were estimated less accurately. HMMs with two distinct behavioral states were selected for every time series of real tuna data, predicting a shallow warm state, which was similar across all individuals, and a deep colder state, which was more variable. Marked diurnal behavioral switching was predicted, consistent with many previous empirical studies on tuna. HMMs provide easily interpretable models for the objective classification of

  9. Local models and hidden nonlocality in Quantum Theory

    OpenAIRE

    Guerini, Leonardo

    2014-01-01

    This Master's thesis has two central subjects: the simulation of correlations generated by local measurements on entangled quantum states by local hidden-variables models and the revelation of hidden nonlocality. We present and detail the Werner's local model and the hidden nonlocality of some Werner states of dimension $d\\geq5$, the Gisin-Degorre's local model for a Werner state of dimension $d=2$ and the local model of Hirsch et al. for mixtures of the singlet state and noise, all of them f...

  10. Searching for hidden-charm baryonium signals in QCD sum rules

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Zhou, Dan [Beihang University, School of Physics, Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, SK (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University, Research Center for Hadron and CSR Physics, Institute of Modern Physics of CAS, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics, State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-11-15

    We give an explicit QCD sum rule investigation for hidden-charm baryonium states with the quark content u anti ud anti dc anti c, spin J = 0/1/2/3, and of both positive and negative parities. We systematically construct the relevant local hidden-charm baryonium interpolating currents, which can actually couple to various structures, including hidden-charm baryonium states, charmonium states plus two pions, and hidden-charm tetraquark states plus one pion, etc. We do not know which structure these currents couple to at the beginning, but after sum rule analyses we can obtain some information. We find some of them can couple to hidden-charm baryonium states, using which we evaluate the masses of the lowest-lying hidden-charm baryonium states with quantum numbers J{sup P} = 2{sup -}/3{sup -}/0{sup +}/1{sup +}/2{sup +} to be around 5.0 GeV. We suggest to search for hidden-charm baryonium states, especially the one of J = 3{sup -}, in the D-wave J/ψππ and P-wave J/ψρ and J/ψω channels in this energy region. (orig.)

  11. Hidden symmetries in five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, M.

    2003-05-01

    This thesis is concerned with the study of hidden symmetries in supergravity, which play an important role in the present picture of supergravity and string theory. Concretely, the appearance of a hidden G 2(+2) /SO(4) symmetry is studied in the dimensional reduction of d=5, N=2 supergravity to three dimensions - a parallel model to the more famous E 8(+8) /SO(16) case in eleven-dimensional supergravity. Extending previous partial results for the bosonic part, I give a derivation that includes fermionic terms. This sheds new light on the appearance of the local hidden symmetry SO(4) in the reduction, and shows up an unusual feature which follows from an analysis of the R-symmetry associated with N=4 supergravity and of the supersymmetry variations, and which has no parallel in the eleven-dimensional case: The emergence of an additional SO(3) as part of the enhanced local symmetry, invisible in the dimensional reduction of the gravitino, and corresponding to the fact that, of the SO(4) used in the coset model, only the diagonal SO(3) is visible immediately upon dimensional reduction. The uncovering of the hidden symmetries proceeds via the construction of the proper coset gravity in three dimensions, and matching it with the Lagrangian obtained from the reduction. (orig.)

  12. Object permanence in the food-storing coal tit (Periparus ater) and the non-storing great tit (Parus major): Is the mental representation required?

    Science.gov (United States)

    Marhounová, Lucie; Frynta, Daniel; Fuchs, Roman; Landová, Eva

    2017-05-01

    Object permanence is a cognitive ability that enables animals to mentally represent the continuous existence of temporarily hidden objects. Generally, it develops gradually through six qualitative stages, the evolution of which may be connected with some specific ecological and behavioral factors. In birds, the advanced object permanence skills were reported in several storing species of the Corvidae family. In order to test the association between food-storing and achieved performance within the stages, we compared food-storing coal tits (Periparus ater) and nonstoring great tits (Parus major) using an adapted version of Uzgiris & Hunt's Scale 1 tasks. The coal tits significantly outperformed the great tits in searching for completely hidden objects. Most of the great tits could not solve the task when the object disappeared completely. However, the upper limit for both species is likely to be Stage 4. The coal tits could solve problems with simply hidden objects, but they used alternative strategies rather than mental representation when searching for completely hidden objects, especially if choosing between two locations. Our results also suggest that neophobia did not affect the overall performance in the object permanence tasks. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  13. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  14. Sociocultural Dimension of Hidden Content in a Professional Language Curriculum

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2017-12-01

    Full Text Available Introduction: studying curriculum as a pedagogical problem has traditionally been reduced to the analysis of its explicit content, set in official educational documents. However, a much less studied hidden content plays a significant role in education. So, what is the role of the hidden curriculum during professional language training? The purpose of the article is to determine the potential impact of hidden curriculum on students’ conceptual worldview. Comparing the worldview presented in textbooks with students’ one has allowed us to estimate the rate of influence of hidden curr iculum. Materials and Methods: the methodological basis of the work is the cultural concept of personalityoriented education. The methodology for studying the role of hidden curriculum includes four stages: at the first stage, the authors set the criteria for selecting textbooks for analysis and do the selection; at the second stage, the authors select sociocultural concepts for analysis; at the third stage, the scheme of analysis is designed and the analysis of textbooks is done; at the fourth stage, the authors identify the potential influence of hidden curriculum on students’ conceptual worldview. Results: the structure of hidden curriculum has been determined and the scheme for analysing its subject component has been developed. The authors have identified a significant influence of hidden curriculum on students’ worldview, which represents the scientific novelty of the article. Discussion and Conclusions: the article gives the definition of a hidden curriculum which is new for Russian pedagogy and presents a methodology for its analysis in EFL textbooks. That analysis is recommended to be conducted when selecting teaching materials both i n languages and other humanities.

  15. Infinite hidden conditional random fields for human behavior analysis.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time.

  16. Detecting hidden particles with MATHUSLA

    Science.gov (United States)

    Evans, Jared A.

    2018-03-01

    A hidden sector containing light long-lived particles provides a well-motivated place to find new physics. The recently proposed MATHUSLA experiment has the potential to be extremely sensitive to light particles originating from rare meson decays in the very long lifetime region. In this work, we illustrate this strength with the specific example of a light scalar mixed with the standard model-like Higgs boson, a model where MATHUSLA can further probe unexplored parameter space from exotic Higgs decays. Design augmentations should be considered in order to maximize the ability of MATHUSLA to discover very light hidden sector particles.

  17. Zipf exponent of trajectory distribution in the hidden Markov model

    Science.gov (United States)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  18. Zipf exponent of trajectory distribution in the hidden Markov model

    International Nuclear Information System (INIS)

    Bochkarev, V V; Lerner, E Yu

    2014-01-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different

  19. SHIFT: server for hidden stops analysis in frame-shifted translation.

    Science.gov (United States)

    Gupta, Arun; Singh, Tiratha Raj

    2013-02-23

    Frameshift is one of the three classes of recoding. Frame-shifts lead to waste of energy, resources and activity of the biosynthetic machinery. In addition, some peptides synthesized after frame-shifts are probably cytotoxic which serve as plausible cause for innumerable number of diseases and disorders such as muscular dystrophies, lysosomal storage disorders, and cancer. Hidden stop codons occur naturally in coding sequences among all organisms. These codons are associated with the early termination of translation for incorrect reading frame selection and help to reduce the metabolic cost related to the frameshift events. Researchers have identified several consequences of hidden stop codons and their association with myriad disorders. However the wealth of information available is speckled and not effortlessly acquiescent to data-mining. To reduce this gap, this work describes an algorithmic web based tool to study hidden stops in frameshifted translation for all the lineages through respective genetic code systems. This paper describes SHIFT, an algorithmic web application tool that provides a user-friendly interface for identifying and analyzing hidden stops in frameshifted translation of genomic sequences for all available genetic code systems. We have calculated the correlation between codon usage frequencies and the plausible contribution of codons towards hidden stops in an off-frame context. Markovian chains of various order have been used to model hidden stops in frameshifted peptides and their evolutionary association with naturally occurring hidden stops. In order to obtain reliable and persuasive estimates for the naturally occurring and predicted hidden stops statistical measures have been implemented. This paper presented SHIFT, an algorithmic tool that allows user-friendly exploration, analysis, and visualization of hidden stop codons in frameshifted translations. It is expected that this web based tool would serve as a useful complement for

  20. Religion, Spirituality, and the Hidden Curriculum: Medical Student and Faculty Reflections.

    Science.gov (United States)

    Balboni, Michael J; Bandini, Julia; Mitchell, Christine; Epstein-Peterson, Zachary D; Amobi, Ada; Cahill, Jonathan; Enzinger, Andrea C; Peteet, John; Balboni, Tracy

    2015-10-01

    Religion and spirituality play an important role in physicians' medical practice, but little research has examined their influence within the socialization of medical trainees and the hidden curriculum. The objective is to explore the role of religion and spirituality as they intersect with aspects of medicine's hidden curriculum. Semiscripted, one-on-one interviews and focus groups (n = 33 respondents) were conducted to assess Harvard Medical School student and faculty experiences of religion/spirituality and the professionalization process during medical training. Using grounded theory, theme extraction was performed with interdisciplinary input (medicine, sociology, and theology), yielding a high inter-rater reliability score (kappa = 0.75). Three domains emerged where religion and spirituality appear as a factor in medical training. First, religion/spirituality may present unique challenges and benefits in relation to the hidden curriculum. Religious/spiritual respondents more often reported to struggle with issues of personal identity, increased self-doubt, and perceived medical knowledge inadequacy. However, religious/spiritual participants less often described relationship conflicts within the medical team, work-life imbalance, and emotional stress arising from patient suffering. Second, religion/spirituality may influence coping strategies during encounters with patient suffering. Religious/spiritual trainees described using prayer, faith, and compassion as means for coping whereas nonreligious/nonspiritual trainees discussed compartmentalization and emotional repression. Third, levels of religion/spirituality appear to fluctuate in relation to medical training, with many trainees experiencing an increase in religiousness/spirituality during training. Religion/spirituality has a largely unstudied but possibly influential role in medical student socialization. Future study is needed to characterize its function within the hidden curriculum. Copyright

  1. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  2. Asymptotics for Estimating Equations in Hidden Markov Models

    DEFF Research Database (Denmark)

    Hansen, Jørgen Vinsløv; Jensen, Jens Ledet

    Results on asymptotic normality for the maximum likelihood estimate in hidden Markov models are extended in two directions. The stationarity assumption is relaxed, which allows for a covariate process influencing the hidden Markov process. Furthermore a class of estimating equations is considered...

  3. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  4. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  5. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report...

  6. Suppressing the QCD axion abundance by hidden monopoles

    International Nuclear Information System (INIS)

    Kawasaki, Masahiro

    2015-11-01

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10 12 GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  7. DEM Development from Ground-Based LiDAR Data: A Method to Remove Non-Surface Objects

    Directory of Open Access Journals (Sweden)

    Maneesh Sharma

    2010-11-01

    Full Text Available Topography and land cover characteristics can have significant effects on infiltration, runoff, and erosion processes on watersheds. The ability to model the timing and routing of surface water and erosion is affected by the resolution of the digital elevation model (DEM. High resolution ground-based Light Detecting and Ranging (LiDAR technology can be used to collect detailed topographic and land cover characteristic data. In this study, a method was developed to remove vegetation from ground-based LiDAR data to create high resolution DEMs. Research was conducted on intensively studied rainfall–runoff plots on the USDA-ARS Walnut Gulch Experimental Watershed in Southeast Arizona. LiDAR data were used to generate 1 cm resolution digital surface models (DSM for 5 plots. DSMs created directly from LiDAR data contain non-surface objects such as vegetation cover. A vegetation removal method was developed which used a slope threshold and a focal mean filter method to remove vegetation and create bare earth DEMs. The method was validated on a synthetic plot, where rocks and vegetation were added incrementally. Results of the validation showed a vertical error of ±7.5 mm in the final DEM.

  8. Context Tree Estimation in Variable Length Hidden Markov Models

    OpenAIRE

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exp...

  9. Extracting hidden-photon dark matter from an LC-circuit

    International Nuclear Information System (INIS)

    Arias, Paola; Arza, Ariel; Gamboa, Jorge; Mendez, Fernando

    2014-11-01

    We point out that a cold dark matter condensate made of gauge bosons from an extra hidden U(1) sector - dubbed hidden-photons - can create a small, oscillating electric density current. Thus, they could also be searched for in the recently proposed LC-circuit setup conceived for axion cold dark matter search by Sikivie, Sullivan and Tanner. We estimate the sensitivity of this setup for hidden-photon cold dark matter and we find it could cover a sizable, so far unexplored parameter space.

  10. Extracting Hidden-Photon Dark Matter From an LC-Circuit

    CERN Document Server

    Arias, Paola; Döbrich, Babette; Gamboa, Jorge; Méndez, Fernando

    2015-01-01

    We point out that a cold dark matter condensate made of gauge bosons from an extra hidden U(1) sector - dubbed hidden- photons - can create a small, oscillating electric density current. Thus, they could also be searched for in the recently proposed LC-circuit setup conceived for axion cold dark matter search by Sikivie, Sullivan and Tanner. We estimate the sensitivity of this setup for hidden-photon cold dark matter and we find it could cover a sizable, so far unexplored parameter space.

  11. Hidden photons in beam dump experiments and in connection with dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-12-15

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  12. Hidden photons in beam dump experiments and in connection with dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah

    2012-12-01

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  13. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  14. Multilayer Neural Networks with Extensively Many Hidden Units

    International Nuclear Information System (INIS)

    Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido

    2001-01-01

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones

  15. Hidden Area and Mechanical Nonlinearities in Freestanding Graphene

    Science.gov (United States)

    Nicholl, Ryan J. T.; Lavrik, Nickolay V.; Vlassiouk, Ivan; Srijanto, Bernadeta R.; Bolotin, Kirill I.

    2017-06-01

    We investigated the effect of out-of-plane crumpling on the mechanical response of graphene membranes. In our experiments, stress was applied to graphene membranes using pressurized gas while the strain state was monitored through two complementary techniques: interferometric profilometry and Raman spectroscopy. By comparing the data obtained through these two techniques, we determined the geometric hidden area which quantifies the crumpling strength. While the devices with hidden area ˜0 % obeyed linear mechanics with biaxial stiffness 428 ±10 N /m , specimens with hidden area in the range 0.5%-1.0% were found to obey an anomalous nonlinear Hooke's law with an exponent ˜0.1 .

  16. Extracting hidden-photon dark matter from an LC-circuit

    International Nuclear Information System (INIS)

    Arias, Paola; Arza, Ariel; Gamboa, Jorge; Mendez, Fernando; Doebrich, Babette

    2015-01-01

    We point out that a cold dark matter condensate made of gauge bosons from an extra hidden U(1) sector - dubbed hidden photons - can create a small, oscillating electric density current. Thus, they could also be searched for in the recently proposed LC-circuit setup conceived for axion cold dark matter search by Sikivie, Sullivan and Tanner. We estimate the sensitivity of this setup for hidden-photon cold dark matter and we find it could cover a sizable, so far unexplored parameter space. (orig.)

  17. Petro Rents, Political Institutions, and Hidden Wealth

    DEFF Research Database (Denmark)

    Andersen, Jørgen Juel; Johannesen, Niels; Lassen, David Dreyer

    2017-01-01

    Do political institutions limit rent seeking by politicians? We study the transformation of petroleum rents, almost universally under direct government control, into hidden wealth using unique data on bank deposits in offshore financial centers that specialize in secrecy and asset protection. Our...... rulers is diverted to secret accounts. We find very limited evidence that shocks to other types of income not directly controlled by governments affect hidden wealth....

  18. Hidden charm molecules in a finite volume

    International Nuclear Information System (INIS)

    Albaladejo, M.; Hidalgo-Duque, C.; Nieves, J.; Oset, E.

    2014-01-01

    In the present paper we address the interaction of charmed mesons in hidden charm channels in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and several methods for the analysis of these levels ("inverse problem") are investigated. (author)

  19. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  20. Experimental Study of Removing Surface Corrosion Products from Archaeological Iron Objects and Alternating Iron Corrosion Products by Nd:YAG Laser Cleaning System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hye Youn; Cho, Nam Chul [Kongju National University, Daejeon (Korea, Republic of); Lee, Jong Myoung [IMT co. Ltd, Suwon (Korea, Republic of); Yu, Jae Eun [National Research Institute of Cultural Heritage, Daejeon (Korea, Republic of)

    2012-05-15

    The corrosion product of archaeological iron objects is supposed to be removed because it causes re-corrosion. So far it is removed by scapel and sand blaster but they depend on the skill and experience of a conservator and the glass-dust of the sand blaster is harmful to humans. Therefore this study applies a laser cleaning system which is used in various industrial cleaning processes, to remove corrosion product from archaeological iron objects. In addition, this work studies the alternation of corrosion product after laser irradiation, which evaluates the reliability of the laser cleaning system. Optical microscopy, SEM-EDS, XRD, Raman have been used to observe and analyse the surface of the objects. The results show the capacity of laser cleaning some corrosion product, but blackening appears with increasing pulses and laser energy, and some corrosion products, goethite and hematite, are partially altered to magnetite. These problems, blackening and alternation of corrosion product, should be solved by further studies which find the optimal laser irradiation condition and use a wetting agent.

  1. Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.

    Science.gov (United States)

    Krokoff, Lowell J.

    1990-01-01

    Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)

  2. Object permanence in cats (Felis catus): an ecological approach to the study of invisible displacements.

    Science.gov (United States)

    Dumas, C

    1992-12-01

    A single invisible displacement object permanence task was administered to 19 cats (Felis catus). In this task, cats watched a target object from behind a transparent panel. However, cats had to walk around an opaque panel to reach the object. While cats were behind the opaque panel, the object was hidden behind one of two screens. As cats did not perceive the disappearance of the object behind the target screen, the object was invisibly hidden. Results showed that cats solved this task with great flexibility, which markedly contrasts with what has been observed in previous research. The discussion emphasizes the difference between the typical Piagetian task in which the information necessary to succeed must be dealt with in retrospective way, whereas in our task cats had to anticipate a new position of the object. The ecological relevance of this new task is also discussed.

  3. On the LHC sensitivity for non-thermalised hidden sectors

    Science.gov (United States)

    Kahlhoefer, Felix

    2018-04-01

    We show under rather general assumptions that hidden sectors that never reach thermal equilibrium in the early Universe are also inaccessible for the LHC. In other words, any particle that can be produced at the LHC must either have been in thermal equilibrium with the Standard Model at some point or must be produced via the decays of another hidden sector particle that has been in thermal equilibrium. To reach this conclusion, we parametrise the cross section connecting the Standard Model to the hidden sector in a very general way and use methods from linear programming to calculate the largest possible number of LHC events compatible with the requirement of non-thermalisation. We find that even the HL-LHC cannot possibly produce more than a few events with energy above 10 GeV involving states from a non-thermalised hidden sector.

  4. Massive hidden photons as lukewarm dark matter

    International Nuclear Information System (INIS)

    Redondo, Javier; Postma, Marieke

    2008-11-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  5. Massive hidden photons as lukewarm dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Postma, Marieke [Nationaal Inst. voor Kernfysica en Hoge-Energiefysica (NIKHEF), Amsterdam (Netherlands)

    2008-11-15

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  6. New limits on hidden photons from past electron beam dumps

    International Nuclear Information System (INIS)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-01

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  7. New limits on hidden photons from past electron beam dumps

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-15

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  8. Invisible axion in the hidden sector of no-scale supergravity

    International Nuclear Information System (INIS)

    Sato, Hikaru

    1987-01-01

    We propose a new axion model which incorporates the U(1) PQ symmetry into a hidden sector, as well as an observable sector, of no-scale supergravity models. The axion is a spin-zero field in the hidden sector. The U(1) PQ symmetry is naturally embedded in the family symmetry of the no-scale models. Invisible axions live in the gravity hidden sector without conflict with the cosmological and astrophysical constraints. (orig.)

  9. Increased taxon sampling reveals thousands of hidden orthologs in flatworms

    Science.gov (United States)

    2017-01-01

    Gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the gene complement of an organism consists of hidden orthologs, i.e., those with no apparent homology to sequenced animal lineages—mistakenly considered new genes—but actually representing rapidly evolving orthologs or undetected paralogs. Here, we describe Leapfrog, a simple automated BLAST pipeline that leverages increased taxon sampling to overcome long evolutionary distances and identify putative hidden orthologs in large transcriptomic databases by transitive homology. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3427 putative hidden orthologs, some unidentified by OrthoFinder and HaMStR, two common orthogroup inference algorithms. Unexpectedly, we do not observe a correlation between the number of putative hidden orthologs in a lineage and its “average” evolutionary rate. Hidden orthologs do not show unusual sequence composition biases that might account for systematic errors in sequence similarity searches. Instead, gene duplication with divergence of one paralog and weak positive selection appear to underlie hidden orthology in Platyhelminthes. By using Leapfrog, we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g., planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire in flatworms, qualifying the impact of gene losses and gains in gene complement evolution. PMID:28400424

  10. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  11. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  12. Fuzzy Modeled K-Cluster Quality Mining of Hidden Knowledge for Decision Support

    OpenAIRE

    S. Parkash  Kumar; K. S. Ramaswami

    2011-01-01

    Problem statement: The work presented Fuzzy Modeled K-means Cluster Quality Mining of hidden knowledge for Decision Support. Based on the number of clusters, number of objects in each cluster and its cohesiveness, precision and recall values, the cluster quality metrics is measured. The fuzzy k-means is adapted approach by using heuristic method which iterates the cluster to form an efficient valid cluster. With the obtained data clusters, quality assessment is made by predictive mining using...

  13. The origin of the hidden supersymmetry

    International Nuclear Information System (INIS)

    Jakubsky, Vit; Nieto, Luis-Miguel; Plyushchay, Mikhail S.

    2010-01-01

    The hidden supersymmetry and related tri-supersymmetric structure of the free particle system, the Dirac delta potential problem and the Aharonov-Bohm effect (planar, bound state, and tubule models) are explained by a special nonlocal unitary transformation, which for the usual N=2 supercharges has a nature of Foldy-Wouthuysen transformation. We show that in general case, the bosonized supersymmetry of nonlocal, parity even systems emerges in the same construction, and explain the origin of the unusual N=2 supersymmetry of electron in three-dimensional parity even magnetic field. The observation extends to include the hidden superconformal symmetry.

  14. Naturally light hidden photons in LARGE volume string compactifications

    International Nuclear Information System (INIS)

    Goodsell, M.; Jaeckel, J.; Redondo, J.; Ringwald, A.

    2009-09-01

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  15. Hidden photon dark matter search with large metallic mirror

    International Nuclear Information System (INIS)

    Doebrich, Babette; Lindner, Axel; Daumiller, Kai; Engel, Ralph; Roth, Markus; Kowalski, Marek

    2014-10-01

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  16. Supersymmetry, p-brane duality, and hidden spacetime dimensions

    International Nuclear Information System (INIS)

    Bars, I.

    1996-01-01

    A global superalgebra with 32 supercharges and all possible central extensions is studied in order to extract some general properties of duality and hidden dimensions in a theory that treats p-branes democratically. The maximal number of dimensions is 12, with signature (10,2), containing one space and one time dimension that are hidden from the point of view of perturbative ten-dimensional string theory or its compactifications. When the theory is compactified on R d-1,1 circle-times T c+1,1 with d+c+2=12, there are isometry groups that relate to the hidden dimensions as well as to duality. Their combined intersecting classification schemes provide some properties of nonperturbative states and their couplings. copyright 1996 The American Physical Society

  17. A single hidden layer feedforward network with only one neuron in the hidden layer can approximate any univariate function

    OpenAIRE

    Guliyev , Namig; Ismailov , Vugar

    2016-01-01

    The possibility of approximating a continuous function on a compact subset of the real line by a feedforward single hidden layer neural network with a sigmoidal activation function has been studied in many papers. Such networks can approximate an arbitrary continuous function provided that an unlimited number of neurons in a hidden layer is permitted. In this paper, we consider constructive approximation on any finite interval of $\\mathbb{R}$ by neural networks with only one neuron in the hid...

  18. Discovering hidden sectors with monophoton Z' searches

    International Nuclear Information System (INIS)

    Gershtein, Yuri; Petriello, Frank; Quackenbush, Seth; Zurek, Kathryn M.

    2008-01-01

    In many theories of physics beyond the standard model, from extra dimensions to Hidden Valleys and models of dark matter, Z ' bosons mediate between standard model particles and hidden sector states. We study the feasibility of observing such hidden states through an invisibly decaying Z ' at the LHC. We focus on the process pp→γZ ' →γXX † , where X is any neutral, (quasi-) stable particle, whether a standard model neutrino or a new state. This complements a previous study using pp→ZZ ' →l + l - XX † . Only the Z ' mass and two effective charges are needed to describe this process. If the Z ' decays invisibly only to standard model neutrinos, then these charges are predicted by observation of the Z ' through the Drell-Yan process, allowing discrimination between Z ' decays to standard model ν's and invisible decays to new states. We carefully discuss all backgrounds and systematic errors that affect this search. We find that hidden sector decays of a 1 TeV Z ' can be observed at 5σ significance with 50 fb -1 at the LHC. Observation of a 1.5 TeV state requires super-LHC statistics of 1 ab -1 . Control of the systematic errors, in particular, the parton distribution function uncertainty of the dominant Zγ background, is crucial to maximize the LHC search reach.

  19. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... for Families - Vietnamese Spanish Facts for Families Guide Child Abuse - The Hidden Bruises No. 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ...

  20. Learning and inference in a nonequilibrium Ising model with hidden nodes.

    Science.gov (United States)

    Dunn, Benjamin; Roudi, Yasser

    2013-02-01

    We study inference and reconstruction of couplings in a partially observed kinetic Ising model. With hidden spins, calculating the likelihood of a sequence of observed spin configurations requires performing a trace over the configurations of the hidden ones. This, as we show, can be represented as a path integral. Using this representation, we demonstrate that systematic approximate inference and learning rules can be derived using dynamical mean-field theory. Although naive mean-field theory leads to an unstable learning rule, taking into account Gaussian corrections allows learning the couplings involving hidden nodes. It also improves learning of the couplings between the observed nodes compared to when hidden nodes are ignored.

  1. Analysing the hidden curriculum: use of a cultural web.

    Science.gov (United States)

    Mossop, Liz; Dennick, Reg; Hammond, Richard; Robbé, Iain

    2013-02-01

    Major influences on learning about medical professionalism come from the hidden curriculum. These influences can contribute positively or negatively towards the professional enculturation of clinical students. The fact that there is no validated method for identifying the components of the hidden curriculum poses problems for educators considering professionalism. The aim of this study was to analyse whether a cultural web, adapted from a business context, might assist in the identification of elements of the hidden curriculum at a UK veterinary school. A qualitative approach was used. Seven focus groups consisting of three staff groups and four student groups were organised. Questioning was framed using the cultural web, which is a model used by business owners to assess their environment and consider how it affects their employees and customers. The focus group discussions were recorded, transcribed and analysed thematically using a combination of a priori and emergent themes. The cultural web identified elements of the hidden curriculum for both students and staff. These included: core assumptions; routines; rituals; control systems; organisational factors; power structures, and symbols. Discussions occurred about how and where these issues may affect students' professional identity development. The cultural web framework functioned well to help participants identify elements of the hidden curriculum. These aspects aligned broadly with previously described factors such as role models and institutional slang. The influence of these issues on a student's development of a professional identity requires discussion amongst faculty staff, and could be used to develop learning opportunities for students. The framework is promising for the analysis of the hidden curriculum and could be developed as an instrument for implementation in other clinical teaching environments. © Blackwell Publishing Ltd 2013.

  2. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  3. Complicated basins and the phenomenon of amplitude death in coupled hidden attractors

    Energy Technology Data Exchange (ETDEWEB)

    Chaudhuri, Ushnish [Department of Physics, Sri Venkateswara College, University of Delhi, New Delhi 110021 (India); Department of Physics, National University of Singapore, Singapore 117551 (Singapore); Prasad, Awadhesh, E-mail: awadhesh@physics.du.ac.in [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India)

    2014-02-07

    Understanding hidden attractors, whose basins of attraction do not contain the neighborhood of equilibrium of the system, are important in many physical applications. We observe riddled-like complicated basins of coexisting hidden attractors both in coupled and uncoupled systems. Amplitude death is observed in coupled hidden attractors with no fixed point using nonlinear interaction. A new route to amplitude death is observed in time-delay coupled hidden attractors. Numerical results are presented for systems with no or one stable fixed point. The applications are highlighted.

  4. Gauge mediation scenario with hidden sector renormalization in MSSM

    International Nuclear Information System (INIS)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-01-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5 minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  5. Gauge mediation scenario with hidden sector renormalization in MSSM

    Science.gov (United States)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-02-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5¯ minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  6. Quantum mechanics and hidden superconformal symmetry

    Science.gov (United States)

    Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.

    2017-12-01

    Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).

  7. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  8. Online mixted sampling: An application in hidden populations Muestreo mixto online: Una aplicación en poblaciones ocultas Online mixted sampling: An application in hidden populations

    Directory of Open Access Journals (Sweden)

    María Tatiana Gorjup

    2012-04-01

    inmigrante argentino y utilizando como fuentes de información los grupos virtuales.Purpose: The objective of the article is to explore the possibilities offered by new technologies and virtual social networks for the recruitment of sampling units in hidden populations and as a support of the use of mixed methods.Design/methodology: The objective was to identify Argentinean entrepreneurs who start their business in Spain. The observation unit has the characteristics of a hidden population: 1 high geographic dispersion which makes it difficult to localize them; 2 underestimation of the size of Argentinean residents in the official statistics; 3 Argentinean residents in illegal situation; and, 4 in some cases, the factors that led the emigration were negative, making them reluctant to answer. In this context, the researchers used (1 an online virtual sampling and, (2 the traditional snowball sampling. The online virtual sampling was carried out by using a social network (Facebook through which 52 virtual groups of ‘Argentinean living in Spain’ were identified. Subsequently, each member was contacted by an individual message which explained the aim of the research and invited them to participate in the study. Findings: Through the development of this study, it was possible to prove that the use of virtual groups in social networks led to detect observation units that are not registered officially (administrative register, census, etc.. This finding contributed to increase the scope and size of the sample, it favoured the design of the qualitative sample and the triangulation of the results. Therefore, it increased the validity of the hidden population.Originality/value: The article presents an experience of application of virtual sampling and mixed methods in the study of hidden populations. In particular, it analysed Argentinean immigrant entrepreneurs by using virtual groups as a source of information.Purpose: The objective of the article is to explore the possibilities

  9. Wholesale debris removal from LEO

    Science.gov (United States)

    Levin, Eugene; Pearson, Jerome; Carroll, Joseph

    2012-04-01

    Recent advances in electrodynamic propulsion make it possible to seriously consider wholesale removal of large debris from LEO for the first time since the beginning of the space era. Cumulative ranking of large groups of the LEO debris population and general limitations of passive drag devices and rocket-based removal systems are analyzed. A candidate electrodynamic debris removal system is discussed that can affordably remove all debris objects over 2 kg from LEO in 7 years. That means removing more than 99% of the collision-generated debris potential in LEO. Removal is performed by a dozen 100-kg propellantless vehicles that react against the Earth's magnetic field. The debris objects are dragged down and released into short-lived orbits below ISS. As an alternative to deorbit, some of them can be collected for storage and possible in-orbit recycling. The estimated cost per kilogram of debris removed is a small fraction of typical launch costs per kilogram. These rates are low enough to open commercial opportunities and create a governing framework for wholesale removal of large debris objects from LEO.

  10. Update on hidden sectors with dark forces and dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-11-15

    Recently there has been much interest in hidden sectors, especially in the context of dark matter and ''dark forces'', since they are a common feature of beyond standard model scenarios like string theory and SUSY and additionally exhibit interesting phenomenological aspects. Various laboratory experiments place limits on the so-called hidden photon and continuously further probe and constrain the parameter space; an updated overview is presented here. Furthermore, for several hidden sector models with light dark matter we study the viability with respect to the relic abundance and direct detection experiments.

  11. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2016-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  12. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  13. Object permanence in lemurs.

    Science.gov (United States)

    Deppe, Anja M; Wright, Patricia C; Szelistowski, William A

    2009-03-01

    Object permanence, the ability to mentally represent objects that have disappeared from view, should be advantageous to animals in their interaction with the natural world. The objective of this study was to examine whether lemurs possess object permanence. Thirteen adult subjects representing four species of diurnal lemur (Eulemur fulvus rufus, Eulemur mongoz, Lemur catta and Hapalemur griseus) were presented with seven standard Piagetian visible and invisible object displacement tests, plus one single visible test where the subject had to wait predetermined times before allowed to search, and two invisible tests where each hiding place was made visually unique. In all visible tests lemurs were able to find an object that had been in clear view before being hidden. However, when lemurs were not allowed to search for up to 25-s, performance declined with increasing time-delay. Subjects did not outperform chance on any invisible displacements regardless of whether hiding places were visually uniform or unique, therefore the upper limit of object permanence observed was Stage 5b. Lemur species in this study eat stationary foods and are not subject to stalking predators, thus Stage 5 object permanence is probably sufficient to solve most problems encountered in the wild.

  14. Feed Forward Artificial Neural Network Model to Estimate the TPH Removal Efficiency in Soil Washing Process

    Directory of Open Access Journals (Sweden)

    Hossein Jafari Mansoorian

    2017-01-01

    Full Text Available Background & Aims of the Study: A feed forward artificial neural network (FFANN was developed to predict the efficiency of total petroleum hydrocarbon (TPH removal from a contaminated soil, using soil washing process with Tween 80. The main objective of this study was to assess the performance of developed FFANN model for the estimation of   TPH removal. Materials and Methods: Several independent repressors including pH, shaking speed, surfactant concentration and contact time were used to describe the removal of TPH as a dependent variable in a FFANN model. 85% of data set observations were used for training the model and remaining 15% were used for model testing, approximately. The performance of the model was compared with linear regression and assessed, using Root of Mean Square Error (RMSE as goodness-of-fit measure Results: For the prediction of TPH removal efficiency, a FANN model with a three-hidden-layer structure of 4-3-1 and a learning rate of 0.01 showed the best predictive results. The RMSE and R2 for the training and testing steps of the model were obtained to be 2.596, 0.966, 10.70 and 0.78, respectively. Conclusion: For about 80% of the TPH removal efficiency can be described by the assessed regressors the developed model. Thus, focusing on the optimization of soil washing process regarding to shaking speed, contact time, surfactant concentration and pH can improve the TPH removal performance from polluted soils. The results of this study could be the basis for the application of FANN for the assessment of soil washing process and the control of petroleum hydrocarbon emission into the environments.

  15. Hidden attraction the history and mystery of magnetism

    CERN Document Server

    Verschuur, Gerrit L

    1996-01-01

    Long one of nature''s most fascinating phenomena, magnetism was once the subject of many superstitions. Magnets were thought useful to thieves, effective as a love potion or as a cure for gout or spasms. They could remove sorcery from women and put demons to flight and even reconcile married couples. It was said that a lodestone pickled in the salt of sucking fish had the power to attract gold. Today, these beliefs have been put aside, but magnetism is no less remarkable for our modern understanding of it. In Hidden Attraction, Gerrit L. Verschuur, a noted astronomer and National Book Award nominee for The Invisible Universe, traces the history of our fascination with magnetism, from the first discovery of magnets in Greece, to state-of-the-art theories that see magnetism as a basic force in the universe. The book begins with the early debunking of superstitions by Peter Peregrinus (Pierre de Maricourt), whom Roger Bacon hailed as one of the world''s first experimental scientists (Perigrinus held that "experi...

  16. Dopamine reward prediction errors reflect hidden state inference across time

    Science.gov (United States)

    Starkweather, Clara Kwon; Babayan, Benedicte M.; Uchida, Naoshige; Gershman, Samuel J.

    2017-01-01

    Midbrain dopamine neurons signal reward prediction error (RPE), or actual minus expected reward. The temporal difference (TD) learning model has been a cornerstone in understanding how dopamine RPEs could drive associative learning. Classically, TD learning imparts value to features that serially track elapsed time relative to observable stimuli. In the real world, however, sensory stimuli provide ambiguous information about the hidden state of the environment, leading to the proposal that TD learning might instead compute a value signal based on an inferred distribution of hidden states (a ‘belief state’). In this work, we asked whether dopaminergic signaling supports a TD learning framework that operates over hidden states. We found that dopamine signaling exhibited a striking difference between two tasks that differed only with respect to whether reward was delivered deterministically. Our results favor an associative learning rule that combines cached values with hidden state inference. PMID:28263301

  17. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  18. Life imitating art: depictions of the hidden curriculum in medical television programs.

    Science.gov (United States)

    Stanek, Agatha; Clarkin, Chantalle; Bould, M Dylan; Writer, Hilary; Doja, Asif

    2015-09-26

    The hidden curriculum represents influences occurring within the culture of medicine that indirectly alter medical professionals' interactions, beliefs and clinical practices throughout their training. One approach to increase medical student awareness of the hidden curriculum is to provide them with readily available examples of how it is enacted in medicine; as such the purpose of this study was to examine depictions of the hidden curriculum in popular medical television programs. One full season of ER, Grey's Anatomy and Scrubs were selected for review. A summative content analysis was performed to ascertain the presence of depictions of the hidden curriculum, as well as to record the type, frequency and quality of examples. A second reviewer also viewed a random selection of episodes from each series to establish coding reliability. The most prevalent themes across all television programs were: the hierarchical nature of medicine; challenges during transitional stages in medicine; the importance of role modeling; patient dehumanization; faking or overstating one's capabilities; unprofessionalism; the loss of idealism; and difficulties with work-life balance. The hidden curriculum is frequently depicted in popular medical television shows. These examples of the hidden curriculum could serve as a valuable teaching resource in undergraduate medical programs.

  19. Rare Z boson decays to a hidden sector

    Science.gov (United States)

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-01

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  20. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing...... the probability of generating a given string, or computing the most likely path generating a given string. In this paper we consider the problem of computing the most likely string, or consensus string, generated by a given model, and its implications on the complexity of comparing hidden Markov models. We show...... that computing the consensus string, and approximating its probability within any constant factor, is NP-hard, and that the same holds for the closely related labeling problem for class hidden Markov models. Furthermore, we establish the NP-hardness of comparing two hidden Markov models under the L∞- and L1...

  1. Model-based recognition of 3-D objects by geometric hashing technique

    International Nuclear Information System (INIS)

    Severcan, M.; Uzunalioglu, H.

    1992-09-01

    A model-based object recognition system is developed for recognition of polyhedral objects. The system consists of feature extraction, modelling and matching stages. Linear features are used for object descriptions. Lines are obtained from edges using rotation transform. For modelling and recognition process, geometric hashing method is utilized. Each object is modelled using 2-D views taken from the viewpoints on the viewing sphere. A hidden line elimination algorithm is used to find these views from the wire frame model of the objects. The recognition experiments yielded satisfactory results. (author). 8 refs, 5 figs

  2. Cosmological abundance of the QCD axion coupled to hidden photons

    Science.gov (United States)

    Kitajima, Naoya; Sekiguchi, Toyokazu; Takahashi, Fuminobu

    2018-06-01

    We study the cosmological evolution of the QCD axion coupled to hidden photons. For a moderately strong coupling, the motion of the axion field leads to an explosive production of hidden photons by tachyonic instability. We use lattice simulations to evaluate the cosmological abundance of the QCD axion. In doing so, we incorporate the backreaction of the produced hidden photons on the axion dynamics, which becomes significant in the non-linear regime. We find that the axion abundance is suppressed by at most O (102) for the decay constant fa =1016GeV, compared to the case without the coupling. For a sufficiently large coupling, the motion of the QCD axion becomes strongly damped, and as a result, the axion abundance is enhanced. Our results show that the cosmological upper bound on the axion decay constant can be relaxed by a few hundred for a certain range of the coupling to hidden photons.

  3. Multi-Objective Optimization for Solid Amine CO2 Removal Assembly in Manned Spacecraft

    Directory of Open Access Journals (Sweden)

    Rong A

    2017-07-01

    Full Text Available Carbon Dioxide Removal Assembly (CDRA is one of the most important systems in the Environmental Control and Life Support System (ECLSS for a manned spacecraft. With the development of adsorbent and CDRA technology, solid amine is increasingly paid attention due to its obvious advantages. However, a manned spacecraft is launched far from the Earth, and its resources and energy are restricted seriously. These limitations increase the design difficulty of solid amine CDRA. The purpose of this paper is to seek optimal design parameters for the solid amine CDRA. Based on a preliminary structure of solid amine CDRA, its heat and mass transfer models are built to reflect some features of the special solid amine adsorbent, Polyethylenepolyamine adsorbent. A multi-objective optimization for the design of solid amine CDRA is discussed further in this paper. In this study, the cabin CO2 concentration, system power consumption and entropy production are chosen as the optimization objectives. The optimization variables consist of adsorption cycle time, solid amine loading mass, adsorption bed length, power consumption and system entropy production. The Improved Non-dominated Sorting Genetic Algorithm (NSGA-II is used to solve this multi-objective optimization and to obtain optimal solution set. A design example of solid amine CDRA in a manned space station is used to show the optimal procedure. The optimal combinations of design parameters can be located on the Pareto Optimal Front (POF. Finally, Design 971 is selected as the best combination of design parameters. The optimal results indicate that the multi-objective optimization plays a significant role in the design of solid amine CDRA. The final optimal design parameters for the solid amine CDRA can guarantee the cabin CO2 concentration within the specified range, and also satisfy the requirements of lightweight and minimum energy consumption.

  4. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    International Nuclear Information System (INIS)

    Itoh, H.; Okada, N.; Yamashita, T.

    2007-01-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden. (author)

  5. Optical imaging of objects in turbid medium with ultrashort pulses

    Science.gov (United States)

    Wang, Chih-Yu; Sun, Chia-Wei; Yang, Chih Chung; Kiang, Yean-Woei; Lin, Chii-Wann

    2000-07-01

    Photons are seriously scattered when entering turbid medium; this the images of objects hidden in turbid medium can not be obtained by just collecting the transmitted photons. Early-arriving photons, which are also called ballistic or snake protons, are much less scattered when passing through turbid medium, and contains more image information than the late-arriving ones. Therefore, objects embedded in turbid medium can be imaged by gathering the ballistic and snake photons. In the present research we try to recover images of objects in turbid medium by simultaneously time-gate and polarization-gate to obtain the snake photons. An Argon-pumped Ti-Sapphire laser with 100fs pulses was employed as a light source. A streak camera with a 2ps temporal resolution was used to extract the ballistic and snake photons. Two pieces of lean swine meat, measured 4mmX3mm and 5xxX4mm, respectively, were placed in a 10cmX10cmX3cm acrylic tank, which was full of diluted milk. A pair of polarizer and an analyzer was used to extract the light that keeps polarization unchanged. The combination of time gating and polarization gating resulted in good images of objects hidden in turbid medium.

  6. Analyzing Hidden Semantics in Social Bookmarking of Open Educational Resources

    Science.gov (United States)

    Minguillón, Julià

    Web 2.0 services such as social bookmarking allow users to manage and share the links they find interesting, adding their own tags for describing them. This is especially interesting in the field of open educational resources, as delicious is a simple way to bridge the institutional point of view (i.e. learning object repositories) with the individual one (i.e. personal collections), thus promoting the discovering and sharing of such resources by other users. In this paper we propose a methodology for analyzing such tags in order to discover hidden semantics (i.e. taxonomies and vocabularies) that can be used to improve descriptions of learning objects and make learning object repositories more visible and discoverable. We propose the use of a simple statistical analysis tool such as principal component analysis to discover which tags create clusters that can be semantically interpreted. We will compare the obtained results with a collection of resources related to open educational resources, in order to better understand the real needs of people searching for open educational resources.

  7. An impossibility theorem for parameter independent hidden variable theories

    Science.gov (United States)

    Leegwater, Gijs

    2016-05-01

    Recently, Roger Colbeck and Renato Renner (C&R) have claimed that '[n]o extension of quantum theory can have improved predictive power' (Colbeck & Renner, 2011, 2012b). If correct, this is a spectacular impossibility theorem for hidden variable theories, which is more general than the theorems of Bell (1964) and Leggett (2003). Also, C&R have used their claim in attempt to prove that a system's quantum-mechanical wave function is in a one-to-one correspondence with its 'ontic' state (Colbeck & Renner, 2012a). C&R's claim essentially means that in any hidden variable theory that is compatible with quantum-mechanical predictions, probabilities of measurement outcomes are independent of these hidden variables. This makes such variables otiose. On closer inspection, however, the generality and validity of the claim can be contested. First, it is based on an assumption called 'Freedom of Choice'. As the name suggests, this assumption involves the independence of an experimenter's choice of measurement settings. But in the way C&R define this assumption, a no-signalling condition is surreptitiously presupposed, making the assumption less innocent than it sounds. When using this definition, any hidden variable theory violating parameter independence, such as Bohmian Mechanics, is immediately shown to be incompatible with quantum-mechanical predictions. Also, the argument of C&R is hard to follow and their mathematical derivation contains several gaps, some of which cannot be closed in the way they suggest. We shall show that these gaps can be filled. The issue with the 'Freedom of Choice' assumption can be circumvented by explicitly assuming parameter independence. This makes the result less general, but better founded. We then obtain an impossibility theorem for hidden variable theories satisfying parameter independence only. As stated above, such hidden variable theories are impossible in the sense that any supplemental variables have no bearing on outcome probabilities

  8. Entry deterrence and hidden competition

    NARCIS (Netherlands)

    Lavrutich, Maria; Huisman, Kuno; Kort, Peter

    This paper studies strategic investment behavior of firms facing an uncertain demand in a duopoly setting. Firms choose both investment timing and the capacity level while facing additional uncertainty about market participants, which is introduced via the concept of hidden competition. We focus on

  9. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  10. Applications of hidden symmetries to black hole physics

    International Nuclear Information System (INIS)

    Frolov, Valeri

    2011-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  11. Rethinking infant knowledge: toward an adaptive process account of successes and failures in object permanence tasks.

    Science.gov (United States)

    Munakata, Y; McClelland, J L; Johnson, M H; Siegler, R S

    1997-10-01

    Infants seem sensitive to hidden objects in habituation tasks at 3.5 months but fail to retrieve hidden objects until 8 months. The authors first consider principle-based accounts of these successes and failures, in which early successes imply knowledge of principles and failures are attributed to ancillary deficits. One account is that infants younger than 8 months have the object permanence principle but lack means-ends abilities. To test this, 7-month-olds were trained on means-ends behaviors and were tested on retrieval of visible and occluded toys. Means-ends demands were the same, yet infants made more toy-guided retrievals in the visible case. The authors offer an adaptive process account in which knowledge is graded and embedded in specific behavioral processes. Simulation models that learn gradually to represent occluded objects show how this approach can account for success and failure in object permanence tasks without assuming principles and ancillary deficits.

  12. Forecasting oil price trends using wavelets and hidden Markov models

    International Nuclear Information System (INIS)

    Souza e Silva, Edmundo G. de; Souza e Silva, Edmundo A. de; Legey, Luiz F.L.

    2010-01-01

    The crude oil price is influenced by a great number of factors, most of which interact in very complex ways. For this reason, forecasting it through a fundamentalist approach is a difficult task. An alternative is to use time series methodologies, with which the price's past behavior is conveniently analyzed, and used to predict future movements. In this paper, we investigate the usefulness of a nonlinear time series model, known as hidden Markov model (HMM), to predict future crude oil price movements. Using an HMM, we develop a forecasting methodology that consists of, basically, three steps. First, we employ wavelet analysis to remove high frequency price movements, which can be assumed as noise. Then, the HMM is used to forecast the probability distribution of the price return accumulated over the next F days. Finally, from this distribution, we infer future price trends. Our results indicate that the proposed methodology might be a useful decision support tool for agents participating in the crude oil market. (author)

  13. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  14. Signatures of a hidden cosmic microwave background.

    Science.gov (United States)

    Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-09-26

    If there is a light Abelian gauge boson gamma' in the hidden sector its kinetic mixing with the photon can produce a hidden cosmic microwave background (HCMB). For meV masses, resonant oscillations gammagamma' happen after big bang nucleosynthesis (BBN) but before CMB decoupling, increasing the effective number of neutrinos Nnu(eff) and the baryon to photon ratio, and distorting the CMB blackbody spectrum. The agreement between BBN and CMB data provides new constraints. However, including Lyman-alpha data, Nnu(eff) > 3 is preferred. It is tempting to attribute this effect to the HCMB. The interesting parameter range will be tested in upcoming laboratory experiments.

  15. Hidden inventory and safety considerations

    International Nuclear Information System (INIS)

    Anderson, A.R.; James, R.H.; Morgan, F.

    1976-01-01

    Preliminary results are described of the evaluation of residual plutonium in a process line used for the production of experimental fast reactor fuel. Initial attention has been focussed on a selection of work boxes used for processing powders and solutions. Amounts of material measured as ''hidden inventory'' are generally less than 0.1 percent of throughput but in one box containing very complex equipment the amount was exceptionally about 0.5 percent. The total surface area of the box and the installed equipment appears to be the most significant factor in determining the amount of plutonium held-up as ''hidden inventory,'' representing an average of about 4 x 10 -4 g cm -2 . Present results are based on gamma spectrometer measurements but neutron techniques are being developed to overcome some of the inherent uncertainties in the gamma method. It is suggested that the routine use of sample plates of known surface area would be valuable in monitoring the deposition of plutonium in work boxes

  16. WIMPless dark matter from non-Abelian hidden sectors with anomaly-mediated supersymmetry breaking

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Shadmi, Yael

    2011-01-01

    In anomaly-mediated supersymmetry breaking models, superpartner masses are proportional to couplings squared. Their hidden sectors therefore naturally contain WIMPless dark matter, particles whose thermal relic abundance is guaranteed to be of the correct size, even though they are not weakly interacting massive particles. We study viable dark matter candidates in WIMPless anomaly-mediated supersymmetry breaking models with non-Abelian hidden sectors and highlight unusual possibilities that emerge in even the simplest models. In one example with a pure SU(N) hidden sector, stable hidden gluinos freeze out with the correct relic density, but have an extremely low, but natural, confinement scale, providing a framework for self-interacting dark matter. In another simple scenario, hidden gluinos freeze out and decay to visible Winos with the correct relic density, and hidden glueballs may either be stable, providing a natural framework for mixed cold-hot dark matter, or may decay, yielding astrophysical signals. Last, we present a model with light hidden pions that may be tested with improved constraints on the number of nonrelativistic degrees of freedom. All of these scenarios are defined by a small number of parameters, are consistent with gauge coupling unification, preserve the beautiful connection between the weak scale and the observed dark matter relic density, and are natural, with relatively light visible superpartners. We conclude with comments on interesting future directions.

  17. On the hidden maxwell superalgebra underlying D = 4 supergravity

    Energy Technology Data Exchange (ETDEWEB)

    Penafiel, D.M. [Departamento de Fisica, Universidad de Concepcion (Chile); DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy); Ravera, L. [DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy)

    2017-09-15

    In this work, we expand the hidden AdS-Lorentz superalgebra underlying D = 4 supergravity, reaching a (hidden) Maxwell superalgebra. The latter can be viewed as an extension involving cosmological constant of the superalgebra underlying D = 4 supergravity in flat spacetime. We write the Maurer-Cartan equations in this context and we find some interesting extensions of the antisymmetric 3-form A{sup (3)} appearing in the Free Differential Algebra in Minkowski space. The structure of Free Differential Algebras is obtained by considering the zero curvature equations. We write the parametrization of A{sup (3)} in terms of 1-forms and we rend the topological features of its extensions manifest. We interestingly find out that the structure of these extensions, and consequently the structure of the corresponding boundary contribution dA{sup (3)}, strongly depends on the form of the extra fermionic generator appearing in the hidden Maxwell superalgebra. The model we develop in this work is defined in an enlarged superspace with respect to the ordinary one, and the extra bosonic and fermionic 1-forms required for the closure of the hidden Maxwell superalgebra must be considered as physical fields in this enlarged superspace. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  18. The Hidden Dimensions of Databases.

    Science.gov (United States)

    Jacso, Peter

    1994-01-01

    Discusses methods of evaluating commercial online databases and provides examples that illustrate their hidden dimensions. Topics addressed include size, including the number of records or the number of titles; the number of years covered; and the frequency of updates. Comparisons of Readers' Guide Abstracts and Magazine Article Summaries are…

  19. Hidden losses in financial reporting and the manner of hiding case Serbia: Part two

    Directory of Open Access Journals (Sweden)

    Kaluđerović Nenad

    2016-01-01

    Full Text Available There has always been a dilemma whether financial statements are a reflection of the real situation. When financial statements are subject to various conveniences in order to be presented according to the wish of the purchaser, it leads us to the dilemma when and how this happens. This thesis deals with the attempt to start to solve the dilemmas where and when manipulative actions in financial reporting occur. We have carried out researches on selected samples of money losing companies for the period from 2010 to 2013, on the example of financial indicators of the companies which operated in Serbia. Detection of manipulations by means of which loss is hidden in financial statements is very important for the state economy. Under these conditions, development of an adequate method in this area is limited with the international standards of financial reporting. Numerous qualitative and quantitative methods have been used for evaluation of the real and objective components of losses in order to reflect the level of losses in the economy much better. However, in our conditions, there is an universally accepted method which can foresee and evaluate all events and actions that detect hidden losses in financial statements. This thesis presents methods of evaluation (quantitative and qualitative data mining and how they may be applied in detection of hidden losses in financial statements, by trying to identify a combination of methods which satisfies real needs of a certain task best.

  20. Low-intensity interference effects and hidden-variable theories

    Energy Technology Data Exchange (ETDEWEB)

    Buonomano, V [Universidade Estadual de Campinas (Brazil). Inst. de Matematica

    1978-05-11

    The double-slit interference experiment and other similar experiments in the low-intensity limit (that is, one photon in the apparatus at a time) are examined in the spirit of Bell's work from the point of view of hidden-variable theories. It is found that there exists a class of hidden-variable theories which disagrees with quantum mechanics for a certain type of interference experiment. A manufactured conceptualization of this class, which is a particle view of interference, is described. An experiment, which appears to be feasible, is proposed to examine this disagreement.

  1. Application of Hidden Markov Models in Biomolecular Simulations.

    Science.gov (United States)

    Shukla, Saurabh; Shamsi, Zahra; Moffett, Alexander S; Selvam, Balaji; Shukla, Diwakar

    2017-01-01

    Hidden Markov models (HMMs) provide a framework to analyze large trajectories of biomolecular simulation datasets. HMMs decompose the conformational space of a biological molecule into finite number of states that interconvert among each other with certain rates. HMMs simplify long timescale trajectories for human comprehension, and allow comparison of simulations with experimental data. In this chapter, we provide an overview of building HMMs for analyzing bimolecular simulation datasets. We demonstrate the procedure for building a Hidden Markov model for Met-enkephalin peptide simulation dataset and compare the timescales of the process.

  2. Detecting Faults By Use Of Hidden Markov Models

    Science.gov (United States)

    Smyth, Padhraic J.

    1995-01-01

    Frequency of false alarms reduced. Faults in complicated dynamic system (e.g., antenna-aiming system, telecommunication network, or human heart) detected automatically by method of automated, continuous monitoring. Obtains time-series data by sampling multiple sensor outputs at discrete intervals of t and processes data via algorithm determining whether system in normal or faulty state. Algorithm implements, among other things, hidden first-order temporal Markov model of states of system. Mathematical model of dynamics of system not needed. Present method is "prior" method mentioned in "Improved Hidden-Markov-Model Method of Detecting Faults" (NPO-18982).

  3. From the solar system fo hidden cosmic structures

    Energy Technology Data Exchange (ETDEWEB)

    Benes, K

    1987-01-01

    The development of experimental astrophysics showed that in the evolution of planets, natural processes of a common nature take place. They include, e.g., radiogenic heat, the production of magmas, volcanic activity, degassing, etc. The solar system is a cosmic formation in an advanced stage of development and it is a realistic assumption that in the Galaxy other hidden planetary systems in various stages of development exist. The views on the possibility of the origination of life in other systems differ; life, however, is seen as a hidden property of cosmic matter. (M.D.).

  4. Search for hidden Higgs decay in ATLAS detector

    International Nuclear Information System (INIS)

    Gabrielli, A.

    2013-01-01

    In this paper, a brief overview of the search for the Higgs boson in Hidden Valley models is given. Hidden Valley models predict Higgs decays to neutral particles, which can be also long lived with decay paths comparable to the LHC detectors dimensions. Decay final states consist of collimated leptons (Lepton Jets). Results are presented of a search for Higgs decays to long lived particles in the ATLAS detector at the LHC, based on 1.92 fb −1 data collected during 2011 at a 7TeV center-of-mass energy.

  5. A Polarimetric Search for Hidden Quasars in Three Radio-selected Ultraluminous Infrared Galaxies

    International Nuclear Information System (INIS)

    Tran, H.D.; Brotherton, M.S.; Stanford, S.A.; Breugel, W. van; Dey, A.; Stern, D.; Antonucci, R.

    1999-01-01

    We have carried out a spectropolarimetric search for hidden broad-line quasars in three ultraluminous infrared galaxies (ULIRGs) discovered in the positional correlations between sources detected in deep radio surveys and the IRAS Faint Source Catalog. Only the high-ionization Seyfert 2 galaxy TF J1736+1122 is highly polarized, displaying a broad-line spectrum visible in polarized light. The other two objects, TF J1020+6436 and FF J1614+3234, display spectra dominated by a population of young (A type) stars similar to those of open-quotes E+Aclose quotes galaxies. They are unpolarized, showing no sign of hidden broad-line regions. The presence of young starburst components in all three galaxies indicates that the ULIRG phenomenon encompasses both active galactic nuclei (AGNs) and starburst activity, but the most energetic ULIRGs do not necessarily harbor open-quotes buried quasars.close quotes We find that a luminous infrared galaxy is most likely to host an obscured quasar if it exhibits a high-ionization ([O iii] λ5007/Hβ approx-gt 5) spectrum typical of a 'classic' Seyfert 2 galaxy with little or no Balmer absorption lines, is 'ultraluminous' (L IR approx-gt 10 12 L circle-dot ), and has a 'warm' IR color (f 25 /f 60 approx-gt 0.25). The detection of hidden quasars in this group but not in the low-ionization, starburst-dominated ULIRGs (classified as LINERs or H ii galaxies) may indicate an evolutionary connection, with the latter being found in younger systems. copyright copyright 1999. The American Astronomical Society

  6. Dissipative hidden sector dark matter

    Science.gov (United States)

    Foot, R.; Vagnozzi, S.

    2015-01-01

    A simple way of explaining dark matter without modifying known Standard Model physics is to require the existence of a hidden (dark) sector, which interacts with the visible one predominantly via gravity. We consider a hidden sector containing two stable particles charged under an unbroken U (1 )' gauge symmetry, hence featuring dissipative interactions. The massless gauge field associated with this symmetry, the dark photon, can interact via kinetic mixing with the ordinary photon. In fact, such an interaction of strength ε ˜10-9 appears to be necessary in order to explain galactic structure. We calculate the effect of this new physics on big bang nucleosynthesis and its contribution to the relativistic energy density at hydrogen recombination. We then examine the process of dark recombination, during which neutral dark states are formed, which is important for large-scale structure formation. Galactic structure is considered next, focusing on spiral and irregular galaxies. For these galaxies we modeled the dark matter halo (at the current epoch) as a dissipative plasma of dark matter particles, where the energy lost due to dissipation is compensated by the energy produced from ordinary supernovae (the core-collapse energy is transferred to the hidden sector via kinetic mixing induced processes in the supernova core). We find that such a dynamical halo model can reproduce several observed features of disk galaxies, including the cored density profile and the Tully-Fisher relation. We also discuss how elliptical and dwarf spheroidal galaxies could fit into this picture. Finally, these analyses are combined to set bounds on the parameter space of our model, which can serve as a guideline for future experimental searches.

  7. Hidden twelve-dimensional super Poincare symmetry in eleven dimensions

    International Nuclear Information System (INIS)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2004-01-01

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional super Poincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven-dimensional superparticle, taken off-shell, we discover a hidden twelve-dimensional super Poincare symmetry that governs the theory

  8. Application of ANNS in tube CHF prediction: effect on neuron number in hidden layer

    International Nuclear Information System (INIS)

    Han, L.; Shan, J.; Zhang, B.

    2004-01-01

    Prediction of the Critical Heat Flux (CHF) for upward flow of water in uniformly heated vertical round tube is studied with Artificial Neuron Networks (ANNs) method utilizing different neuron number in hidden layers. This study is based on thermal equilibrium conditions. The neuron number in hidden layers is chosen to vary from 5 to 30 with the step of 5. The effect due to the variety of the neuron number in hidden layers is analyzed. The analysis shows that the neuron number in hidden layers should be appropriate, too less will affect the prediction accuracy and too much may result in abnormal parametric trends. It is concluded that the appropriate neuron number in two hidden layers should be [15 15]. (authors)

  9. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  10. Anomalies of hidden local chiral symmetries in sigma-models and extended supergravities

    International Nuclear Information System (INIS)

    Vecchia, P. di; Ferrara, S.; Girardello, L.

    1985-01-01

    Non-linear sigma-models with hidden gauge symmetries are anomalous, at the quantum level, when coupled to chiral fermions in not anomaly free representations of the hidden chiral symmetry. These considerations generally apply to supersymmetric kaehlerian sigma-models on coset spaces with hidden chiral symmetries as well as to extended supergravities in four dimensions with local SU(N) symmetry. The presence of the anomaly implies that the scenario of dynamical generation of gauge vector bosons has to be reconsidered in these theories. (orig.)

  11. "Guess What?": On Hidden-Camera Pranks' Revelation Sequences

    Directory of Open Access Journals (Sweden)

    A. Javier Izquierdo-Martín

    2004-05-01

    Full Text Available Conceived as public communication objects, hidden-camera pranks (HCPs are a type of documentary on ordinary pranks. Defined versus classical Garfinkelian breaching experiments, HCPs also offer a natural form of ethnomethodological experimentation. Here I present some results of an analysis of a sample of forty-nine HCPs' revelation sequences (RSs. These little clips of five to fifty seconds long allow for the description of audio-visual details of the interactional work that actors, accomplices and victims of a HCP have to perform, in a finely coordinated manner in order "to put an end" to an artificially constructed social situation. My study focuses on a set of practical relevances of the work of revelation (offering and awakening (acceptation/rejection endogenously pointed at and topicalized by the agents enmeshed in the HCP situation. URN: urn:nbn:de:0114-fqs0402126

  12. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  13. Review of hidden carbon emissions, trade, and labor income share in China, 2001–2011

    International Nuclear Information System (INIS)

    Wang, Shu-Hong; Song, Ma-Lin

    2014-01-01

    Coordinated development between the economy and the environment is currently one of the most important issues in China. By establishing models concerning labor income share and hidden carbon emissions, and taking trade as the link in their relationship, this study puts forward the scale effects, technological effects, and structural effects that relate to labor income share under the function of trade. We then establish multi-index and multi-indicator constitutive (MIMIC) equation to measure the ratio of hidden carbon emissions to total emissions, which is further considered the basis of the measurement model. Results of regression analysis carried out on labor income share show that hidden carbon emissions do have a positive effect on labor income share. In the meantime, we also prove that under scale effects, technological effects, and the structural effects of trade, hidden carbon emissions affect labor income shares in different directions. Our conclusions and policy implications are obtained from the calculated results. - Highlights: • This study establishes models concerning labor income share and hidden carbon emissions. • MIMIC is established to measure the ratio of hidden carbon emissions to total discharge. • Hidden carbon emissions have a positive effect on labor income share. • Hidden carbon emissions have various effects on the labor income share

  14. The selection and implementation of hidden line algorithms

    International Nuclear Information System (INIS)

    Schneider, A.

    1983-06-01

    One of the most challenging problems in the field of computer graphics is the elimination of hidden lines in images of nontransparent bodies. In the real world the nontransparent material hinders the light ray coming from hidden regions to the observer. In the computer based image formation process there is no automatic visibility regulation of this kind. So many lines are created which result in a poor quality of the spacial representation. Therefore a three-dimensional representation on the screen is only meaningfull if the hidden lines are eliminated. For this process many algorithms have been developed in the past. A common feature of these codes is the large amount of computer time needed. In the first generation of algorithms, which are commonly used today, the bodies are modeled by plane polygons. More recently, however, also algorithms are in use, which are able to treat curved surfaces without discretisation by plane surfaces. In this paper the first group of algorithms is reviewed, and the most important codes are described. The experience obtained during the implementation of two algorithms is presented. (orig.) [de

  15. Hidden sector behind the CKM matrix

    Science.gov (United States)

    Okawa, Shohei; Omura, Yuji

    2017-08-01

    The small quark mixing, described by the Cabibbo-Kobayashi-Maskawa (CKM) matrix in the standard model, may be a clue to reveal new physics around the TeV scale. We consider a simple scenario that extra particles in a hidden sector radiatively mediate the flavor violation to the quark sector around the TeV scale and effectively realize the observed CKM matrix. The lightest particle in the hidden sector, whose contribution to the CKM matrix is expected to be dominant, is a good dark matter (DM) candidate. There are many possible setups to describe this scenario, so that we investigate some universal predictions of this kind of model, focusing on the contribution of DM to the quark mixing and flavor physics. In this scenario, there is an explicit relation between the CKM matrix and flavor violating couplings, such as four-quark couplings, because both are radiatively induced by the particles in the hidden sector. Then, we can explicitly find the DM mass region and the size of Yukawa couplings between the DM and quarks, based on the study of flavor physics and DM physics. In conclusion, we show that DM mass in our scenario is around the TeV scale, and the Yukawa couplings are between O (0.01 ) and O (1 ). The spin-independent DM scattering cross section is estimated as O (10-9) [pb]. An extra colored particle is also predicted at the O (10 ) TeV scale.

  16. Laser experiments explore the hidden sector

    International Nuclear Information System (INIS)

    Ahlers, M.

    2007-11-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses -7 times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background. (orig.)

  17. Diffuse Reflectance Spectroscopy of Hidden Objects. Part II: Recovery of a Target Spectrum.

    Science.gov (United States)

    Pomerantsev, Alexey L; Rodionova, Oxana Ye; Skvortsov, Alexej N

    2017-08-01

    In this study, we consider the reconstruction of a diffuse reflectance near-infrared spectrum of an object (target spectrum) in case the object is covered by an interfering absorbing and scattering layer. Recovery is performed using a new empirical method, which was developed in our previous study. We focus on a system, which consists of several layers of polyethylene (PE) film and underlayer objects with different spectral features. The spectral contribution of the interfering layer is modeled by a three-component two-parameter multivariate curve resolution (MCR) model, which was built and calibrated using spectrally flat objects. We show that this model is applicable to real objects with non-uniform spectra. Ultimately, the target spectrum can be reconstructed from a single spectrum of the covered target. With calculation methods, we are able to recover quite accurately the spectrum of a target even when the object is covered by 0.7 mm of PE.

  18. 438 Optimal Number of States in Hidden Markov Models and its ...

    African Journals Online (AJOL)

    In this paper, Hidden Markov Model is applied to model human movements as to .... emit either discrete information or a continuous data derived from a Probability .... For each hidden state in the test set, the probability = ... by applying the Kullback-Leibler distance (Juang & Rabiner, 1985) which ..... One Size Does Not Fit.

  19. Modelling and evaluation of surgical performance using hidden Markov models.

    Science.gov (United States)

    Megali, Giuseppe; Sinigaglia, Stefano; Tonet, Oliver; Dario, Paolo

    2006-10-01

    Minimally invasive surgery has become very widespread in the last ten years. Since surgeons experience difficulties in learning and mastering minimally invasive techniques, the development of training methods is of great importance. While the introduction of virtual reality-based simulators has introduced a new paradigm in surgical training, skill evaluation methods are far from being objective. This paper proposes a method for defining a model of surgical expertise and an objective metric to evaluate performance in laparoscopic surgery. Our approach is based on the processing of kinematic data describing movements of surgical instruments. We use hidden Markov model theory to define an expert model that describes expert surgical gesture. The model is trained on kinematic data related to exercises performed on a surgical simulator by experienced surgeons. Subsequently, we use this expert model as a reference model in the definition of an objective metric to evaluate performance of surgeons with different abilities. Preliminary results show that, using different topologies for the expert model, the method can be efficiently used both for the discrimination between experienced and novice surgeons, and for the quantitative assessment of surgical ability.

  20. The hidden and informal curriculum across the continuum of training: A cross-sectional qualitative study.

    Science.gov (United States)

    Doja, Asif; Bould, M Dylan; Clarkin, Chantalle; Eady, Kaylee; Sutherland, Stephanie; Writer, Hilary

    2016-04-01

    The hidden and informal curricula refer to learning in response to unarticulated processes and constraints, falling outside the formal medical curriculum. The hidden curriculum has been identified as requiring attention across all levels of learning. We sought to assess the knowledge and perceptions of the hidden and informal curricula across the continuum of learning at a single institution. Focus groups were held with undergraduate and postgraduate learners and faculty to explore knowledge and perceptions relating to the hidden and informal curricula. Thematic analysis was conducted both inductively by research team members and deductively using questions structured by the existing literature. Participants highlighted several themes related to the presence of the hidden and informal curricula in medical training and practice, including: the privileging of some specialties over others; the reinforcement of hierarchies within medicine; and a culture of tolerance towards unprofessional behaviors. Participants acknowledged the importance of role modeling in the development of professional identities and discussed the deterioration in idealism that occurs. Common issues pertaining to the hidden curriculum exist across all levels of learners, including faculty. Increased awareness of these issues could allow for the further development of methods to address learning within the hidden curriculum.

  1. Low scale gravity mediation with warped extra dimension and collider phenomenology on the hidden sector

    International Nuclear Information System (INIS)

    Itoh, Hideo; Okada, Nobuchika; Yamashita, Toshifumi

    2006-01-01

    We propose a scenario of gravity mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model. In our setup, both the visible sector and the hidden sector coexist on the infrared (IR) brane. We introduce the Polonyi model as a simple hidden sector. Because of the warped metric, the effective cutoff scale on the IR brane is 'warped down', so that the gravity mediation occurs at a low scale. As a result, the gravitino is naturally the lightest superpartner (LSP) and contact interactions between the hidden and the visible sector fields become stronger. We address phenomenologies for various IR cutoff scales. In particular, we investigate collider phenomenology involving a scalar field (Polonyi field) in the hidden sector for the case with the IR cutoff around 10 TeV. We find a possibility that the hidden sector scalar can be produced at the LHC and the international linear collider (ILC). Interestingly, the scalar behaves like the Higgs boson of the standard model in the production process, while its decay process is quite different and, once produced, it will provide us with a very clean signature. The hidden sector may be no longer hidden

  2. In Brief: Hidden environment and health costs of energy

    Science.gov (United States)

    Showstack, Randy

    2009-10-01

    The hidden costs of energy production and use in the United States amounted to an estimated $120 billion in 2005, according to a 19 October report by the U.S. National Research Council. The report, “Hidden Costs of Energy: Unpriced Consequences of Energy Production and Use,” examines hidden costs, including the cost of air pollution damage to human health, which are not reflected in market prices of energy sources, electricity, or gasoline. The report found that in 2005, the total annual external damages from sulfur dioxide, nitrogen oxides, and particulate matter created by coal-burning power plants that produced 95% of the nation's coal-generated electricity were about $62 billion, with nonclimate damages averaging about 3.2 cents for every kilowatt-hour of energy produced. It is estimated that by 2030, nonclimate damages will fall to 1.7 cents per kilowatt-hour. The 2030 figure assumes that new policies already slated for implementation are put in place.

  3. Distinguishing Hidden Markov Chains

    OpenAIRE

    Kiefer, Stefan; Sistla, A. Prasad

    2015-01-01

    Hidden Markov Chains (HMCs) are commonly used mathematical models of probabilistic systems. They are employed in various fields such as speech recognition, signal processing, and biological sequence analysis. We consider the problem of distinguishing two given HMCs based on an observation sequence that one of the HMCs generates. More precisely, given two HMCs and an observation sequence, a distinguishing algorithm is expected to identify the HMC that generates the observation sequence. Two HM...

  4. Coupling of Hidden Sector

    OpenAIRE

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fer\\-mions (``sterinos'') and sterile mediating bosons (``sterons'') of mass dimension 1 (not 2!) --- the last described by an antisymmetric tensor field --- requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, sugge...

  5. Co-existing hidden attractors in a radio-physical oscillator system

    DEFF Research Database (Denmark)

    Kuznetsov, A. P.; Kuznetsov, S. P.; Mosekilde, Erik

    2015-01-01

    The term `hidden attractor' relates to a stable periodic, quasiperiodic or chaotic state whose basin of attraction does not overlap with the neighborhood of an unstable equilibrium point. Considering a three-dimensional oscillator system that does not allow for the existence of an equilibrium point...... frequency, describe the bifurcations through which hidden attractors of different type arise and disappear, and illustrate the form of the basins of attraction....

  6. A two particle hidden sector and the oscillations with photons

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Pedro D. [Universidad de Antofagasta, Departamento de Fisica, Antofagasta (Chile); Arias, Paola; Maldonado, Carlos [Universidad de Santiago de Chile, Departmento de Fisica, Santiago (Chile)

    2018-01-15

    We present a detailed study of the oscillations and optical properties for vacuum, in a model for the dark sector that contains axion-like particles and hidden photons. We provide bounds for the couplings versus the mass, using current results from ALPS-I and PVLAS. We also discuss the challenges for the detection of models with more than one hidden particle in light shining trough wall-like experiments. (orig.)

  7. A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments

    Directory of Open Access Journals (Sweden)

    Yun Chen

    2018-01-01

    Full Text Available Currently, many methods are available to improve the target network’s security. The vast majority of them cannot obtain an optimal attack path and interdict it dynamically and conveniently. Almost all defense strategies aim to repair known vulnerabilities or limit services in target network to improve security of network. These methods cannot response to the attacks in real-time because sometimes they need to wait for manufacturers releasing corresponding countermeasures to repair vulnerabilities. In this paper, we propose an improved Q-learning algorithm to plan an optimal attack path directly and automatically. Based on this path, we use software-defined network (SDN to adjust routing paths and create hidden forwarding paths dynamically to filter vicious attack requests. Compared to other machine learning algorithms, Q-learning only needs to input the target state to its agents, which can avoid early complex training process. We improve Q-learning algorithm in two aspects. First, a reward function based on the weights of hosts and attack success rates of vulnerabilities is proposed, which can adapt to different network topologies precisely. Second, we remove the actions and merge them into every state that reduces complexity from O(N3 to O(N2. In experiments, after deploying hidden forwarding paths, the security of target network is boosted significantly without having to repair network vulnerabilities immediately.

  8. Optimal no-go theorem on hidden-variable predictions of effect expectations

    Science.gov (United States)

    Blass, Andreas; Gurevich, Yuri

    2018-03-01

    No-go theorems prove that, under reasonable assumptions, classical hidden-variable theories cannot reproduce the predictions of quantum mechanics. Traditional no-go theorems proved that hidden-variable theories cannot predict correctly the values of observables. Recent expectation no-go theorems prove that hidden-variable theories cannot predict the expectations of observables. We prove the strongest expectation-focused no-go theorem to date. It is optimal in the sense that the natural weakenings of the assumptions and the natural strengthenings of the conclusion make the theorem fail. The literature on expectation no-go theorems strongly suggests that the expectation-focused approach is more general than the value-focused one. We establish that the expectation approach is not more general.

  9. Raising awareness of the hidden curriculum in veterinary medical education: a review and call for research.

    Science.gov (United States)

    Whitcomb, Tiffany L

    2014-01-01

    The hidden curriculum is characterized by information that is tacitly conveyed to and among students about the cultural and moral environment in which they find themselves. Although the hidden curriculum is often defined as a distinct entity, tacit information is conveyed to students throughout all aspects of formal and informal curricula. This unconsciously communicated knowledge has been identified across a wide spectrum of educational environments and is known to have lasting and powerful impacts, both positive and negative. Recently, medical education research on the hidden curriculum of becoming a doctor has come to the forefront as institutions struggle with inconsistencies between formal and hidden curricula that hinder the practice of patient-centered medicine. Similarly, the complex ethical questions that arise during the practice and teaching of veterinary medicine have the potential to cause disagreement between what the institution sets out to teach and what is actually learned. However, the hidden curriculum remains largely unexplored for this field. Because the hidden curriculum is retained effectively by students, elucidating its underlying messages can be a key component of program refinement. A review of recent literature about the hidden curriculum in a variety of fields, including medical education, will be used to explore potential hidden curricula in veterinary medicine and draw attention to the need for further investigation.

  10. Nonparametric model validations for hidden Markov models with applications in financial econometrics.

    Science.gov (United States)

    Zhao, Zhibiao

    2011-06-01

    We address the nonparametric model validation problem for hidden Markov models with partially observable variables and hidden states. We achieve this goal by constructing a nonparametric simultaneous confidence envelope for transition density function of the observable variables and checking whether the parametric density estimate is contained within such an envelope. Our specification test procedure is motivated by a functional connection between the transition density of the observable variables and the Markov transition kernel of the hidden states. Our approach is applicable for continuous time diffusion models, stochastic volatility models, nonlinear time series models, and models with market microstructure noise.

  11. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing......-norms. We discuss the applicability of the technique used for proving the hardness of comparing two hidden Markov models under the L1-norm to other measures of distance between probability distributions. In particular, we show that it cannot be used for proving NP-hardness of determining the Kullback...

  12. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De......_different are integrated. We experimentally validate our approach on the biologically motivated problem of global pairwise alignment.......A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference...

  13. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  14. Hidden and generalized conformal symmetry of Kerr–Sen spacetimes

    International Nuclear Information System (INIS)

    Ghezelbash, A M; Siahaan, H M

    2013-01-01

    It is recently conjectured that generic non-extremal Kerr black hole could be holographically dual to a hidden conformal field theory (CFT) in two dimensions. Moreover, it is known that there are two CFT duals (pictures) to describe the charged rotating black holes which correspond to angular momentum J and electric charge Q of the black hole. Furthermore these two pictures can be incorporated by the CFT duals (general picture) that are generated by SL(2,Z) modular group. The general conformal structure can be revealed by looking at charged scalar wave equation in some appropriate values of frequency and charge. In this regard, we consider the wave equation of a charged massless scalar field in the background of Kerr–Sen black hole and show that in the ‘near region’, the wave equation can be reproduced by the Casimir operator of a local SL(2,R) L ×SL(2,R) R hidden conformal symmetry. We find the exact agreement between macroscopic and microscopic physical quantities like entropy and absorption cross section of scalars for Kerr–Sen black hole. We then find an extension of vector fields that in turn yields an extended local family of SL(2,R) L ×SL(2,R) R hidden conformal symmetry, parameterized by one parameter. For some special values of the parameter, we find a copy of SL(2,R) hidden conformal algebra for the charged Gibbons–Maeda–Garfinkle–Horowitz–Strominger black hole in the strong deflection limit. (paper)

  15. Hidden solution to the μ/Bμ problem in gauge mediation

    International Nuclear Information System (INIS)

    Roy, Tuhin S.; Schmaltz, Martin

    2008-01-01

    We propose a solution to the μ/B μ problem in gauge mediation. The novel feature of our solution is that it uses dynamics of the hidden sector, which is often present in models with dynamical supersymmetry breaking. We give an explicit example model of gauge mediation where a very simple messenger sector generates both μ and B μ at one loop. The usual problem, that B μ is then too large, is solved by strong renormalization effects from the hidden sector which suppress B μ relative to μ. Our mechanism relies on an assumption about the signs of certain incalculable anomalous dimensions in the hidden sector. Making these assumptions not only allows us to solve the μ/B μ problem but also leads to a characteristic superpartner spectrum which would be a smoking gun signal for our mechanism.

  16. Multitask TSK fuzzy system modeling by mining intertask common hidden structure.

    Science.gov (United States)

    Jiang, Yizhang; Chung, Fu-Lai; Ishibuchi, Hisao; Deng, Zhaohong; Wang, Shitong

    2015-03-01

    The classical fuzzy system modeling methods implicitly assume data generated from a single task, which is essentially not in accordance with many practical scenarios where data can be acquired from the perspective of multiple tasks. Although one can build an individual fuzzy system model for each task, the result indeed tells us that the individual modeling approach will get poor generalization ability due to ignoring the intertask hidden correlation. In order to circumvent this shortcoming, we consider a general framework for preserving the independent information among different tasks and mining hidden correlation information among all tasks in multitask fuzzy modeling. In this framework, a low-dimensional subspace (structure) is assumed to be shared among all tasks and hence be the hidden correlation information among all tasks. Under this framework, a multitask Takagi-Sugeno-Kang (TSK) fuzzy system model called MTCS-TSK-FS (TSK-FS for multiple tasks with common hidden structure), based on the classical L2-norm TSK fuzzy system, is proposed in this paper. The proposed model can not only take advantage of independent sample information from the original space for each task, but also effectively use the intertask common hidden structure among multiple tasks to enhance the generalization performance of the built fuzzy systems. Experiments on synthetic and real-world datasets demonstrate the applicability and distinctive performance of the proposed multitask fuzzy system model in multitask regression learning scenarios.

  17. Hidden Costs of Hospital Based Delivery from Two Tertiary Hospitals in Western Nepal.

    Directory of Open Access Journals (Sweden)

    Jeevan Acharya

    Full Text Available Hospital based delivery has been an expensive experience for poor households because of hidden costs which are usually unaccounted in hospital costs. The main aim of this study was to estimate the hidden costs of hospital based delivery and determine the factors associated with the hidden costs.A hospital based cross-sectional study was conducted among 384 post-partum mothers with their husbands/house heads during the discharge time in Manipal Teaching Hospital and Western Regional Hospital, Pokhara, Nepal. A face to face interview with each respondent was conducted using a structured questionnaire. Hidden costs were calculated based on the price rate of the market during the time of the study.The total hidden costs for normal delivery and C-section delivery were 243.4 USD (US Dollar and 321.6 USD respectively. Of the total maternity care expenditures; higher mean expenditures were found for food & drinking (53.07%, clothes (9.8% and transport (7.3%. For postpartum women with their husband or house head, the total mean opportunity cost of "days of work loss" were 84.1 USD and 81.9 USD for normal delivery and C-section respectively. Factors such as literate mother (p = 0.007, employed house head (p = 0.011, monthly family income more than 25,000 NRs (Nepalese Rupees (p = 0.014, private hospital as a place of delivery (p = 0.0001, C-section as a mode of delivery (p = 0.0001, longer duration (>5days of stay in hospital (p = 0.0001, longer distance (>15km from house to hospital (p = 0.0001 and longer travel time (>240 minutes from house to hospital (p = 0.007 showed a significant association with the higher hidden costs (>25000 NRs.Experiences of hidden costs on hospital based delivery and opportunity costs of days of work loss were found high. Several socio-demographic factors, delivery related factors (place and mode of delivery, length of stay, distance from hospital and travel time were associated with hidden costs. Hidden costs can be a

  18. Hidden Costs of Hospital Based Delivery from Two Tertiary Hospitals in Western Nepal.

    Science.gov (United States)

    Acharya, Jeevan; Kaehler, Nils; Marahatta, Sujan Babu; Mishra, Shiva Raj; Subedi, Sudarshan; Adhikari, Bipin

    2016-01-01

    Hospital based delivery has been an expensive experience for poor households because of hidden costs which are usually unaccounted in hospital costs. The main aim of this study was to estimate the hidden costs of hospital based delivery and determine the factors associated with the hidden costs. A hospital based cross-sectional study was conducted among 384 post-partum mothers with their husbands/house heads during the discharge time in Manipal Teaching Hospital and Western Regional Hospital, Pokhara, Nepal. A face to face interview with each respondent was conducted using a structured questionnaire. Hidden costs were calculated based on the price rate of the market during the time of the study. The total hidden costs for normal delivery and C-section delivery were 243.4 USD (US Dollar) and 321.6 USD respectively. Of the total maternity care expenditures; higher mean expenditures were found for food & drinking (53.07%), clothes (9.8%) and transport (7.3%). For postpartum women with their husband or house head, the total mean opportunity cost of "days of work loss" were 84.1 USD and 81.9 USD for normal delivery and C-section respectively. Factors such as literate mother (p = 0.007), employed house head (p = 0.011), monthly family income more than 25,000 NRs (Nepalese Rupees) (p = 0.014), private hospital as a place of delivery (p = 0.0001), C-section as a mode of delivery (p = 0.0001), longer duration (>5days) of stay in hospital (p = 0.0001), longer distance (>15km) from house to hospital (p = 0.0001) and longer travel time (>240 minutes) from house to hospital (p = 0.007) showed a significant association with the higher hidden costs (>25000 NRs). Experiences of hidden costs on hospital based delivery and opportunity costs of days of work loss were found high. Several socio-demographic factors, delivery related factors (place and mode of delivery, length of stay, distance from hospital and travel time) were associated with hidden costs. Hidden costs can be a

  19. Hidden-sector Spectroscopy with Gravitational Waves from Binary Neutron Stars

    Science.gov (United States)

    Croon, Djuna; Nelson, Ann E.; Sun, Chen; Walker, Devin G. E.; Xianyu, Zhong-Zhi

    2018-05-01

    We show that neutron star (NS) binaries can be ideal laboratories to probe hidden sectors with a long-range force. In particular, it is possible for gravitational wave (GW) detectors such as LIGO and Virgo to resolve the correction of waveforms from ultralight dark gauge bosons coupled to NSs. We observe that the interaction of the hidden sector affects both the GW frequency and amplitude in a way that cannot be fitted by pure gravity.

  20. A Hidden Twelve-Dimensional SuperPoincare Symmetry In Eleven Dimensions

    Energy Technology Data Exchange (ETDEWEB)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2003-12-13

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional superPoincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven dimensional superparticle, taken off-shell, we discover a hidden twelve dimensional superPoincare symmetry that governs the theory.

  1. Hidden Neural Networks: A Framework for HMM/NN Hybrids

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric; Krogh, Anders Stærmose

    1997-01-01

    This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN is nor...... HMMs on TIMIT continuous speech recognition benchmarks. On the task of recognizing five broad phoneme classes an accuracy of 84% is obtained compared to 76% for a standard HMM. Additionally, we report a preliminary result of 69% accuracy on the TIMIT 39 phoneme task...

  2. Hidden costs, value lost: uninsurance in America

    National Research Council Canada - National Science Library

    Committee on the Consequences of Uninsurance

    2003-01-01

    Hidden Cost, Value Lost , the fifth of a series of six books on the consequences of uninsurance in the United States, illustrates some of the economic and social losses to the country of maintaining...

  3. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  4. Design Graphics

    Science.gov (United States)

    1990-01-01

    A mathematician, David R. Hedgley, Jr. developed a computer program that considers whether a line in a graphic model of a three-dimensional object should or should not be visible. Known as the Hidden Line Computer Code, the program automatically removes superfluous lines and displays an object from a specific viewpoint, just as the human eye would see it. An example of how one company uses the program is the experience of Birdair which specializes in production of fabric skylights and stadium covers. The fabric called SHEERFILL is a Teflon coated fiberglass material developed in cooperation with DuPont Company. SHEERFILL glazed structures are either tension structures or air-supported tension structures. Both are formed by patterned fabric sheets supported by a steel or aluminum frame or cable network. Birdair uses the Hidden Line Computer Code, to illustrate a prospective structure to an architect or owner. The program generates a three- dimensional perspective with the hidden lines removed. This program is still used by Birdair and continues to be commercially available to the public.

  5. The hidden costs of self-management services in the accounting activity of a company

    Directory of Open Access Journals (Sweden)

    Dan Ioan TOPOR

    2017-05-01

    Full Text Available This article addresses relevant aspects regarding the hidden costs of self-management services in the accounting area, within the accounting department of a company. With this aim, the authors conducted a study using a questionnaire, whose results were analyzed and interpreted. The hidden costs of the self-management of business accounting services observed in the accounting department of the company have been assessed and the causes of their generating sources were identified and analyzed. The debate of these hidden costs involved the treating of notions that exist in the accounting language, but are still not sufficiently explored by the specialists in the area. We also presented and analyzed the causes of the hidden costs of self-management in the accounting activity, as well as a reporting document for failures, arising from the case study. The article ends with the authors' conclusions regarding the hidden costs of self-management services in the accounting area.

  6. Hidden Costs and the Role of Modularity

    DEFF Research Database (Denmark)

    Larsen, Marcus M.

    2013-01-01

    that the inability to effectively estimate the costs of implementing an activity in a foreign location has a negative impact on the process performance of that activity. Performance is deterred as operations are likely to be disrupted by opportunity costs and managerial responses. However, this relationship......This paper addresses estimation errors in strategic decision-making processes due to hidden costs. While previous research has investigated the antecedents of hidden costs, this paper investigates performance consequences. Using unique data on 221 offshoring implementations, it is argued...... is mitigated by the degree of modularity in the activity as it reduces the need for costly coordination in offshoring. This paper contributes to research on offshoring and strategic decision-making by emphasizing the importance of organizational design and of estimating the costs of internal organizational...

  7. Motion Imitation and Recognition using Parametric Hidden Markov Models

    DEFF Research Database (Denmark)

    Herzog, Dennis; Ude, Ales; Krüger, Volker

    2008-01-01

    ) are important. Only together they convey the whole meaning of an action. Similarly, to imitate a movement, the robot needs to select the proper action and parameterize it, e.g., by the relative position of the object that needs to be grasped. We propose to utilize parametric hidden Markov models (PHMMs), which...... extend the classical HMMs by introducing a joint parameterization of the observation densities, to simultaneously solve the problems of action recognition, parameterization of the observed actions, and action synthesis. The proposed approach was fully implemented on a humanoid robot HOAP-3. To evaluate...... the approach, we focused on reaching and pointing actions. Even though the movements are very similar in appearance, our approach is able to distinguish the two movement types and discover the parameterization, and is thus enabling both, action recognition and action synthesis. Through parameterization we...

  8. Development of object permanence in food-storing magpies (Pica pica).

    Science.gov (United States)

    Pollok, B; Prior, H; Güntürkün, O

    2000-06-01

    The development of object permanence was investigated in black-billed magpies (Pica pica), a food-storing passerine bird. The authors tested the hypothesis that food-storing development should be correlated with object-permanence development and that specific stages of object permanence should be achieved before magpies become independent. As predicted, Piagetian Stages 4 and 5 were reached before independence was achieved, and the ability to represent a fully hidden object (Piagetian Stage 4) emerged by the age when magpies begin to retrieve food. Contrary to psittacine birds and humans, but as in dogs and cats, no "A-not-B error" occurred. Although magpies also mastered 5 of 6 invisible displacement tasks, evidence of Piagetian Stage 6 competence was ambiguous.

  9. Hidden Markov models for labeled sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1994-01-01

    A hidden Markov model for labeled observations, called a class HMM, is introduced and a maximum likelihood method is developed for estimating the parameters of the model. Instead of training it to model the statistics of the training sequences it is trained to optimize recognition. It resembles MMI...

  10. Dietary phytate, zinc and hidden zinc deficiency.

    Science.gov (United States)

    Sandstead, Harold H; Freeland-Graves, Jeanne H

    2014-10-01

    Epidemiological data suggest at least one in five humans are at risk of zinc deficiency. This is in large part because the phytate in cereals and legumes has not been removed during food preparation. Phytate, a potent indigestible ligand for zinc prevents it's absorption. Without knowledge of the frequency of consumption of foods rich in phytate, and foods rich in bioavailable zinc, the recognition of zinc deficiency early in the illness may be difficult. Plasma zinc is insensitive to early zinc deficiency. Serum ferritin concentration≤20μg/L is a potential indirect biomarker. Early effects of zinc deficiency are chemical, functional and may be "hidden". The clinical problem is illustrated by 2 studies that involved US Mexican-American children, and US premenopausal women. The children were consuming home diets that included traditional foods high in phytate. The premenopausal women were not eating red meat on a regular basis, and their consumption of phytate was mainly from bran breakfast cereals. In both studies the presence of zinc deficiency was proven by functional responses to controlled zinc treatment. In the children lean-mass, reasoning, and immunity were significantly affected. In the women memory, reasoning, and eye-hand coordination were significantly affected. A screening self-administered food frequency questionnaire for office might help caregiver's identify patients at risk of zinc deficiency. Copyright © 2014 Elsevier GmbH. All rights reserved.

  11. Hidden costs of nuclear power

    International Nuclear Information System (INIS)

    England, R.W.

    1979-01-01

    Mr. England contends that these hidden costs add up to a figure much higher than those that appear in the electric utilities' profit and loss account - costs that are borne by Federal taxpayers, by nuclear industry workers, and by all those people who must share their environment with nuclear facilities. Costs he details are additional deaths and illnesses resulting from exposure to radiation, and the use of tax dollars to clean up the lethal garbage produced by those activities. He asserts that careless handling of uranium ore and mill tailings in past years has apparently resulted in serious public health problems in those mining communities. In another example, Mr. England states that the failure to isolate uranium tailings physically from their environment has probably contributed to an acute leukemia rate in Mesa County, Colorado. He mentions much of the technology development for power reactors being done by the Federal government, not by private reactor manufacturers - thus, again, hidden costs that do not show up in electric bills of customers. The back end of the nuclear fuel cycle as a place for Federally subsidized research and development is discussed briefly. 1 figure, 2 tables

  12. Multivariate longitudinal data analysis with mixed effects hidden Markov models.

    Science.gov (United States)

    Raffa, Jesse D; Dubin, Joel A

    2015-09-01

    Multiple longitudinal responses are often collected as a means to capture relevant features of the true outcome of interest, which is often hidden and not directly measurable. We outline an approach which models these multivariate longitudinal responses as generated from a hidden disease process. We propose a class of models which uses a hidden Markov model with separate but correlated random effects between multiple longitudinal responses. This approach was motivated by a smoking cessation clinical trial, where a bivariate longitudinal response involving both a continuous and a binomial response was collected for each participant to monitor smoking behavior. A Bayesian method using Markov chain Monte Carlo is used. Comparison of separate univariate response models to the bivariate response models was undertaken. Our methods are demonstrated on the smoking cessation clinical trial dataset, and properties of our approach are examined through extensive simulation studies. © 2015, The International Biometric Society.

  13. Limits of performance for the model reduction problem of hidden Markov models

    KAUST Repository

    Kotsalis, Georgios

    2015-12-15

    We introduce system theoretic notions of a Hankel operator, and Hankel norm for hidden Markov models. We show how the related Hankel singular values provide lower bounds on the norm of the difference between a hidden Markov model of order n and any lower order approximant of order n̂ < n.

  14. Limits of performance for the model reduction problem of hidden Markov models

    KAUST Repository

    Kotsalis, Georgios; Shamma, Jeff S.

    2015-01-01

    We introduce system theoretic notions of a Hankel operator, and Hankel norm for hidden Markov models. We show how the related Hankel singular values provide lower bounds on the norm of the difference between a hidden Markov model of order n and any lower order approximant of order n̂ < n.

  15. Hidden Valley Higgs Decays in the ATLAS detector

    CERN Document Server

    Ciapetti, G

    2009-01-01

    A number of extensions of the Standard Model result in particles that are neutral, weakly-coupled and have macroscopic decay lengths that can be comparable with LHC detector dimensions. These particles represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS apparatus. For the purpose of exploring the challenges to the trigger posed by long-lived particles, the Hidden Valley scenario serves as an excellent setting. In this note we present the results of a first study of ATLAS detector performance for some Hidden Valley processes with long-lived, neutral states that decay throughout the detector volume to multi heavy-flavor jets, mainly b-bbar.

  16. The hidden epidemic: confronting sexually transmitted diseases

    National Research Council Canada - National Science Library

    Eng, Thomas R; Butler, William T

    .... In addition, STDs increase the risk of HIV transmission. The Hidden Epidemic examines the scope of sexually transmitted infections in the United States and provides a critical assessment of the nation's response to this public health crisis...

  17. The Agency of Memory Objects

    DEFF Research Database (Denmark)

    Wiegand, Frauke Katharina

    2016-01-01

    and international tourists’ photographs and notes, especially their visual encounters with the exhibition, are understood as participatory interactions in the course of memory work. The article’s aim is twofold: introducing an ANT-inspired methodology to the field of memory studies, and mapping a Sowetan memory......This article analyses the multifarious acts of cultural memory taking place in the small, almost hidden, exhibition space of the famous Regina Mundi Church in Soweto, South Africa, home to the photographic exhibition “The Story of Soweto.” Next to the photographs (1950-2010) by well-known apartheid...... of action, examining the idea that objects, such as images, that leave a trace can act as mediators of memory. Starting from visitors’ appropriations of the exhibition space, the essay sheds light on the different life cycles of memory objects, in particular images, and their diverse mediations. Domestic...

  18. Is wave-particle objectivity compatible with determinism and locality?

    Science.gov (United States)

    Ionicioiu, Radu; Jennewein, Thomas; Mann, Robert B; Terno, Daniel R

    2014-09-26

    Wave-particle duality, superposition and entanglement are among the most counterintuitive features of quantum theory. Their clash with our classical expectations motivated hidden-variable (HV) theories. With the emergence of quantum technologies, we can test experimentally the predictions of quantum theory versus HV theories and put strong restrictions on their key assumptions. Here, we study an entanglement-assisted version of the quantum delayed-choice experiment and show that the extension of HV to the controlling devices only exacerbates the contradiction. We compare HV theories that satisfy the conditions of objectivity (a property of photons being either particles or waves, but not both), determinism and local independence of hidden variables with quantum mechanics. Any two of the above conditions are compatible with it. The conflict becomes manifest when all three conditions are imposed and persists for any non-zero value of entanglement. We propose an experiment to test our conclusions.

  19. Is wave–particle objectivity compatible with determinism and locality?

    Science.gov (United States)

    Ionicioiu, Radu; Jennewein, Thomas; Mann, Robert B.; Terno, Daniel R.

    2014-01-01

    Wave–particle duality, superposition and entanglement are among the most counterintuitive features of quantum theory. Their clash with our classical expectations motivated hidden-variable (HV) theories. With the emergence of quantum technologies, we can test experimentally the predictions of quantum theory versus HV theories and put strong restrictions on their key assumptions. Here, we study an entanglement-assisted version of the quantum delayed-choice experiment and show that the extension of HV to the controlling devices only exacerbates the contradiction. We compare HV theories that satisfy the conditions of objectivity (a property of photons being either particles or waves, but not both), determinism and local independence of hidden variables with quantum mechanics. Any two of the above conditions are compatible with it. The conflict becomes manifest when all three conditions are imposed and persists for any non-zero value of entanglement. We propose an experiment to test our conclusions. PMID:25256419

  20. Active Debris Removal and the Challenges for Environment Remediation

    Science.gov (United States)

    Liou, J. C.

    2012-01-01

    Recent modeling studies on the instability of the debris population in the low Earth orbit (LEO) region and the collision between Iridium 33 and Cosmos 2251 have underlined the need for active debris removal. A 2009 analysis by the NASA Orbital Debris Program Office shows that, in order to maintain the LEO debris population at a constant level for the next 200 years, an active debris removal of about five objects per year is needed. The targets identified for removal are those with the highest mass and collision probability products in the environment. Many of these objects are spent upper stages with masses ranging from 1 to more than 8 metric tons, residing in several altitude regions and concentrated in about 7 inclination bands. To remove five of those objects on a yearly basis, in a cost-effective manner, represents many challenges in technology development, engineering, and operations. This paper outlines the fundamental rationale for considering active debris removal and addresses the two possible objectives of the operations -- removing large debris to stabilize the environment and removing small debris to reduce the threat to operational spacecraft. Technological and engineering challenges associated with the two different objectives are also discussed.

  1. Dimensional reduction in field theory and hidden symmetries in extended supergravity

    International Nuclear Information System (INIS)

    Kremmer, E.

    1985-01-01

    Dimensional reduction in field theories is discussed both in theories which do not include gravity and in gravity theories. In particular, 11-dimensional supergravity and its reduction to 4 dimensions is considered. Hidden symmetries of supergravity with N=8 in 4 dimensions, global E 7 and local SU(8)-invariances in particular are detected. The hidden symmmetries permit to interpret geometrically the scalar fields

  2. Particle adhesion and removal

    CERN Document Server

    Mittal, K L

    2015-01-01

    The book provides a comprehensive and easily accessible reference source covering all important aspects of particle adhesion and removal.  The core objective is to cover both fundamental and applied aspects of particle adhesion and removal with emphasis on recent developments.  Among the topics to be covered include: 1. Fundamentals of surface forces in particle adhesion and removal.2. Mechanisms of particle adhesion and removal.3. Experimental methods (e.g. AFM, SFA,SFM,IFM, etc.) to understand  particle-particle and particle-substrate interactions.4. Mechanics of adhesion of micro- and  n

  3. Bi-objective optimization of a multiple-target active debris removal mission

    Science.gov (United States)

    Bérend, Nicolas; Olive, Xavier

    2016-05-01

    The increasing number of space debris in Low-Earth Orbit (LEO) raises the question of future Active Debris Removal (ADR) operations. Typical ADR scenarios rely on an Orbital Transfer Vehicle (OTV) using one of the two following disposal strategies: the first one consists in attaching a deorbiting kit, such as a solid rocket booster, to the debris after rendezvous; with the second one, the OTV captures the debris and moves it to a low-perigee disposal orbit. For multiple-target ADR scenarios, the design of such a mission is very complex, as it involves two optimization levels: one for the space debris sequence, and a second one for the "elementary" orbit transfer strategy from a released debris to the next one in the sequence. This problem can be seen as a Time-Dependant Traveling Salesman Problem (TDTSP) with two objective functions to minimize: the total mission duration and the total propellant consumption. In order to efficiently solve this problem, ONERA has designed, under CNES contract, TOPAS (Tool for Optimal Planning of ADR Sequence), a tool that implements a Branch & Bound method developed in previous work together with a dedicated algorithm for optimizing the "elementary" orbit transfer. A single run of this tool yields an estimation of the Pareto front of the problem, which exhibits the trade-off between mission duration and propellant consumption. We first detail our solution to cope with the combinatorial explosion of complex ADR scenarios with 10 debris. The key point of this approach is to define the orbit transfer strategy through a small set of parameters, allowing an acceptable compromise between the quality of the optimum solution and the calculation cost. Then we present optimization results obtained for various 10 debris removal scenarios involving a 15-ton OTV, using either the deorbiting kit or the disposal orbit strategy. We show that the advantage of one strategy upon the other depends on the propellant margin, the maximum duration allowed

  4. Experimental search for solar hidden photons in the eV energy range using kinetic mixing with photons

    International Nuclear Information System (INIS)

    Mizumoto, T.; Ohta, R.; Horie, T.; Suzuki, J.; Minowa, M.; Inoue, Y.

    2013-01-01

    We have searched for solar hidden photons in the eV energy range using a dedicated hidden photon detector. The detector consisted of a parabolic mirror with a diameter of 500 mm and a focal length of 1007 mm installed in a vacuum chamber, and a photomultiplier tube at its focal point. The detector was attached to the Tokyo axion helioscope, Sumico which has a mechanism to track the sun. From the result of the measurement, we found no evidence for the existence of hidden photons and set a limit on the photon-hidden photon mixing parameter χ depending on the hidden photon mass m γ'

  5. Sharp Contradiction for Local-Hidden-State Model in Quantum Steering

    Science.gov (United States)

    Chen, Jing-Ling; Su, Hong-Yi; Xu, Zhen-Peng; Pati, Arun Kumar

    2016-08-01

    In quantum theory, no-go theorems are important as they rule out the existence of a particular physical model under consideration. For instance, the Greenberger-Horne-Zeilinger (GHZ) theorem serves as a no-go theorem for the nonexistence of local hidden variable models by presenting a full contradiction for the multipartite GHZ states. However, the elegant GHZ argument for Bell’s nonlocality does not go through for bipartite Einstein-Podolsky-Rosen (EPR) state. Recent study on quantum nonlocality has shown that the more precise description of EPR’s original scenario is “steering”, i.e., the nonexistence of local hidden state models. Here, we present a simple GHZ-like contradiction for any bipartite pure entangled state, thus proving a no-go theorem for the nonexistence of local hidden state models in the EPR paradox. This also indicates that the very simple steering paradox presented here is indeed the closest form to the original spirit of the EPR paradox.

  6. Discovering Hidden Controlling Parameters using Data Analytics and Dimensional Analysis

    Science.gov (United States)

    Del Rosario, Zachary; Lee, Minyong; Iaccarino, Gianluca

    2017-11-01

    Dimensional Analysis is a powerful tool, one which takes a priori information and produces important simplifications. However, if this a priori information - the list of relevant parameters - is missing a relevant quantity, then the conclusions from Dimensional Analysis will be incorrect. In this work, we present novel conclusions in Dimensional Analysis, which provide a means to detect this failure mode of missing or hidden parameters. These results are based on a restated form of the Buckingham Pi theorem that reveals a ridge function structure underlying all dimensionless physical laws. We leverage this structure by constructing a hypothesis test based on sufficient dimension reduction, allowing for an experimental data-driven detection of hidden parameters. Both theory and examples will be presented, using classical turbulent pipe flow as the working example. Keywords: experimental techniques, dimensional analysis, lurking variables, hidden parameters, buckingham pi, data analysis. First author supported by the NSF GRFP under Grant Number DGE-114747.

  7. Searching for confining hidden valleys at LHCb, ATLAS, and CMS

    Science.gov (United States)

    Pierce, Aaron; Shakya, Bibhushan; Tsai, Yuhsin; Zhao, Yue

    2018-05-01

    We explore strategies for probing hidden valley scenarios exhibiting confinement. Such scenarios lead to a moderate multiplicity of light hidden hadrons for generic showering and hadronization similar to QCD. Their decays are typically soft and displaced, making them challenging to probe with traditional LHC searches. We show that the low trigger requirements and excellent track and vertex reconstruction at LHCb provide a favorable environment to search for such signals. We propose novel search strategies in both muonic and hadronic channels. We also study existing ATLAS and CMS searches and compare them with our proposals at LHCb. We find that the reach at LHCb is generically better in the parameter space we consider here, even with optimistic background estimations for ATLAS and CMS searches. We discuss potential modifications at ATLAS and CMS that might make these experiments competitive with the LHCb reach. Our proposed searches can be applied to general hidden valley models as well as exotic Higgs boson decays, such as in twin Higgs models.

  8. Single-hidden-layer feed-forward quantum neural network based on Grover learning.

    Science.gov (United States)

    Liu, Cheng-Yi; Chen, Chein; Chang, Ching-Ter; Shih, Lun-Min

    2013-09-01

    In this paper, a novel single-hidden-layer feed-forward quantum neural network model is proposed based on some concepts and principles in the quantum theory. By combining the quantum mechanism with the feed-forward neural network, we defined quantum hidden neurons and connected quantum weights, and used them as the fundamental information processing unit in a single-hidden-layer feed-forward neural network. The quantum neurons make a wide range of nonlinear functions serve as the activation functions in the hidden layer of the network, and the Grover searching algorithm outstands the optimal parameter setting iteratively and thus makes very efficient neural network learning possible. The quantum neuron and weights, along with a Grover searching algorithm based learning, result in a novel and efficient neural network characteristic of reduced network, high efficient training and prospect application in future. Some simulations are taken to investigate the performance of the proposed quantum network and the result show that it can achieve accurate learning. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Nurture Hidden Talents: Transform School Culture into One That Values Teacher Expertise

    Science.gov (United States)

    Zimmerman, Diane P.

    2014-01-01

    This article looks into the school culture where teacher expertise is often hidden and underused. While the media-rich culture places a high value on talent, the irony is that talent is underrated in most schools, and educators often remain silent about their hidden talents. Many school cultures are not conducive to dialogue that supports displays…

  10. Long memory of financial time series and hidden Markov models with time-varying parameters

    DEFF Research Database (Denmark)

    Nystrup, Peter; Madsen, Henrik; Lindström, Erik

    Hidden Markov models are often used to capture stylized facts of daily returns and to infer the hidden state of financial markets. Previous studies have found that the estimated models change over time, but the implications of the time-varying behavior for the ability to reproduce the stylized...... facts have not been thoroughly examined. This paper presents an adaptive estimation approach that allows for the parameters of the estimated models to be time-varying. It is shown that a two-state Gaussian hidden Markov model with time-varying parameters is able to reproduce the long memory of squared...... daily returns that was previously believed to be the most difficult fact to reproduce with a hidden Markov model. Capturing the time-varying behavior of the parameters also leads to improved one-step predictions....

  11. Photoacoustic imaging of hidden dental caries by using a bundle of hollow optical fibers

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2018-02-01

    Photoacoustic imaging system using a bundle of hollow-optical fibers to detect hidden dental caries is proposed. Firstly, we fabricated a hidden caries model with a brown pigment simulating a common color of caries lesion. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating Nd:YAG laser light with a 532 nm wavelength to occlusal surface of model tooth. We calculated by Fourier transform and found that the waveform from the carious part provides frequency components of approximately from 0.5 to 1.2 MHz. Then a photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for clinical applications. From intensity map of frequency components in 0.5-1.2 MHz, photoacoustic images of hidden caries in the simulated samples were successfully obtained.

  12. Critical object recognition in millimeter-wave images with robustness to rotation and scale.

    Science.gov (United States)

    Mohammadzade, Hoda; Ghojogh, Benyamin; Faezi, Sina; Shabany, Mahdi

    2017-06-01

    Locating critical objects is crucial in various security applications and industries. For example, in security applications, such as in airports, these objects might be hidden or covered under shields or secret sheaths. Millimeter-wave images can be utilized to discover and recognize the critical objects out of the hidden cases without any health risk due to their non-ionizing features. However, millimeter-wave images usually have waves in and around the detected objects, making object recognition difficult. Thus, regular image processing and classification methods cannot be used for these images and additional pre-processings and classification methods should be introduced. This paper proposes a novel pre-processing method for canceling rotation and scale using principal component analysis. In addition, a two-layer classification method is introduced and utilized for recognition. Moreover, a large dataset of millimeter-wave images is collected and created for experiments. Experimental results show that a typical classification method such as support vector machines can recognize 45.5% of a type of critical objects at 34.2% false alarm rate (FAR), which is a drastically poor recognition. The same method within the proposed recognition framework achieves 92.9% recognition rate at 0.43% FAR, which indicates a highly significant improvement. The significant contribution of this work is to introduce a new method for analyzing millimeter-wave images based on machine vision and learning approaches, which is not yet widely noted in the field of millimeter-wave image analysis.

  13. Human health and nutrition: How isotopes are helping to overcome ''hidden hunger''

    International Nuclear Information System (INIS)

    Parr, R.M.; Fjeld, C.R.

    1994-01-01

    In a number of ways, the work of the IAEA is contributing to efforts directed at overcoming hidden hunger and other nutrition problems. The rationale for the IAEA's involvement is twofold. First, adequate nutrition is an essential component of any strategy for improving health, and the IAEA's Statute specifically identifies ''enlarging the contribution of atomic energy to peace, health and prosperity'' as the major objective of programmes. Second, isotope techniques have a wide variety of applications -some of them unique - for targeted research in human nutrition, for assessing nutritional status, and for monitoring the effectiveness of nutritional intervention programmes. This article provides a brief overview of these techniques and their main applications in areas of human nutrition

  14. Hidden Markov models: the best models for forager movements?

    Science.gov (United States)

    Joo, Rocio; Bertrand, Sophie; Tam, Jorge; Fablet, Ronan

    2013-01-01

    One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs). We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs). They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour), while their behavioural modes (fishing, searching and cruising) were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines) for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%), significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  15. Hidden Markov models: the best models for forager movements?

    Directory of Open Access Journals (Sweden)

    Rocio Joo

    Full Text Available One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs. We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs. They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour, while their behavioural modes (fishing, searching and cruising were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%, significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  16. Significance of hidden advertising of the media business models in Latvia

    OpenAIRE

    Rožukalne, Anda

    2012-01-01

    Since 2002 parliamentary and municipal elections in Latvia, media content researches have shown a considerable amount of hidden advertising: media publish information that is paid-for, yet not identified as advertising, assigning this information with the qualities of independent content, therefore misleading its audience. In order to analyze this practice, a research was commissioned to find out why Latvian media publish hidden advertising, what is the force behind this practice, who are com...

  17. Enhanced axion-photon coupling in GUT with hidden photon

    Science.gov (United States)

    Daido, Ryuji; Takahashi, Fuminobu; Yokozaki, Norimi

    2018-05-01

    We show that the axion coupling to photons can be enhanced in simple models with a single Peccei-Quinn field, if the gauge coupling unification is realized by a large kinetic mixing χ = O (0.1) between hypercharge and unbroken hidden U(1)H. The key observation is that the U(1)H gauge coupling should be rather strong to induce such large kinetic mixing, leading to enhanced contributions of hidden matter fields to the electromagnetic anomaly. We find that the axion-photon coupling is enhanced by about a factor of 10-100 with respect to the GUT-axion models with E / N = 8 / 3.

  18. Multistability and hidden attractors in a multilevel DC/DC converter

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik

    2015-01-01

    An attracting periodic, quasiperiodic or chaotic set of a smooth, autonomous system may be referred to as a "hidden attractor" if its basin of attraction does not overlap with the neighborhood of an unstable equilibrium point. Historically, this condition has implied that the basin of attraction...... produce complicated structures of attracting and repelling states organized around the basic switching cycle. This leads us to suggest the existence of hidden attractors in such systems as well. In this case, the condition will be that the basin of attraction does not overlap with the fixed point...

  19. Exploring inequality violations by classical hidden variables numerically

    International Nuclear Information System (INIS)

    Vongehr, Sascha

    2013-01-01

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability, and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs

  20. Mass spectra of hidden-charm molecular pentaquarks states

    International Nuclear Information System (INIS)

    Patel, Smruti; Vinodkumar, P.C.

    2016-01-01

    Very recently, the LHCb Collaboration has reported two hidden-charmed resonances P_c(4380) and P_c(4450) consistent with pentaquark states in the Λ_b"0 → K"-J/Ψp process with masses (widths) (4380 ±8 ± 29) MeV ((205 ±18 ± 86) MeV) and (4449.8 ±1.7 ± 2.5) MeV ((39 ±5 ±19) MeV), respectively. The observation of the P_c states has aroused the theorist's strong interest in the hidden-charm pentaquark states. They have been studied in various frameworks, such as the molecule-like pentaquark states, the diquark-diquark-antiquark type pentaquark states, the diquark-triquark type pentaquark states, re-scattering effects, etc. An identification of pentaquark states as exotic hadron has been one of the long standing problems in the physics of strong interaction and quantum chromodynamics (QCD). A decade ago lots of discussion were made about pentaquarks states but due to lack of further experimental evidences the study of pentaquarks have been almost gone in the darkness. But, recent remarkable observation of two resonances i.e. P_c(4380) and P_c(4450) with hidden charm and the minimal quark content cc-baruud provided new impact for studies of pentaquark states and opens a new window to study the exotic hadronic matter

  1. Hidden supersymmetry and large N

    International Nuclear Information System (INIS)

    Alfaro, J.

    1988-01-01

    In this paper we present a new method to deal with the leading order in the large-N expansion of a quantum field theory. The method uses explicitly the hidden supersymmetry that is present in the path-integral formulation of a stochastic process. In addition to this we derive a new relation that is valid in the leading order of the large-N expansion of the hermitian-matrix model for any spacetime dimension. (orig.)

  2. Long Memory of Financial Time Series and Hidden Markov Models with Time-Varying Parameters

    DEFF Research Database (Denmark)

    Nystrup, Peter; Madsen, Henrik; Lindström, Erik

    2016-01-01

    Hidden Markov models are often used to model daily returns and to infer the hidden state of financial markets. Previous studies have found that the estimated models change over time, but the implications of the time-varying behavior have not been thoroughly examined. This paper presents an adaptive...... to reproduce with a hidden Markov model. Capturing the time-varying behavior of the parameters also leads to improved one-step density forecasts. Finally, it is shown that the forecasting performance of the estimated models can be further improved using local smoothing to forecast the parameter variations....

  3. Finite-time Lyapunov dimension and hidden attractor of the Rabinovich system

    OpenAIRE

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Prasad, A.; Shrimali, M. D.

    2015-01-01

    The Rabinovich system, describing the process of interaction between waves in plasma, is considered. It is shown that the Rabinovich system can exhibit a hidden attractor in the case of multistability as well as a classical self-excited attractor. The hidden attractor in this system can be localized by analytical/numerical methods based on the continuation and perpetual points. The concept of finite-time Lyapunov dimension is developed for numerical study of the dimension of attractors. A con...

  4. Intense gamma-ray lines from hidden vector dark matter decay

    International Nuclear Information System (INIS)

    Arina, Chiara; Hambye, Thomas

    2009-12-01

    Scenarios with hidden, spontaneously broken, non-abelian gauge groups contain a natural dark matter candidate, the hidden vector, whose longevity is due to an accidental custodial symmetry in the renormalizable Lagrangian. Nevertheless, non-renormalizable dimension six operators break the custodial symmetry and induce the decay of the dark matter particle at cosmological times. We discuss in this paper the cosmic ray signatures of this scenario and we show that the decay of hidden vector dark matter particles generically produce an intense gamma ray line which could be observed by the Fermi-LAT experiment, if the scale of custodial symmetry breaking is close to the Grand Unification scale. This gamma line proceeds directly from a tree level dark matter 2-body decay in association with a Higgs boson. Within this model we also perform a determination of the relic density constraints taking into account the dark matter annihilation processes with one dark matter particle in the final state. The corresponding direct detection rates can be easily of order the current experimental sensitivities. (orig.)

  5. Intense gamma-ray lines from hidden vector dark matter decay

    Energy Technology Data Exchange (ETDEWEB)

    Arina, Chiara; Hambye, Thomas [Universite Libre de Bruxelles (Belgium). Service de Physique Theorique; Ibarra, Alejandro [Technische Univ. Muenchen, Garching (Germany). Physik-Department; Weniger, Christoph [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-12-15

    Scenarios with hidden, spontaneously broken, non-abelian gauge groups contain a natural dark matter candidate, the hidden vector, whose longevity is due to an accidental custodial symmetry in the renormalizable Lagrangian. Nevertheless, non-renormalizable dimension six operators break the custodial symmetry and induce the decay of the dark matter particle at cosmological times. We discuss in this paper the cosmic ray signatures of this scenario and we show that the decay of hidden vector dark matter particles generically produce an intense gamma ray line which could be observed by the Fermi-LAT experiment, if the scale of custodial symmetry breaking is close to the Grand Unification scale. This gamma line proceeds directly from a tree level dark matter 2-body decay in association with a Higgs boson. Within this model we also perform a determination of the relic density constraints taking into account the dark matter annihilation processes with one dark matter particle in the final state. The corresponding direct detection rates can be easily of order the current experimental sensitivities. (orig.)

  6. Intense gamma-ray lines from hidden vector dark matter decay

    International Nuclear Information System (INIS)

    Arina, Chiara; Hambye, Thomas; Ibarra, Alejandro; Weniger, Christoph

    2010-01-01

    Scenarios with hidden, spontaneously broken, non-abelian gauge groups contain a natural dark matter candidate, the hidden vector, whose longevity is due to an accidental custodial symmetry in the renormalizable Lagrangian. Nevertheless, non-renormalizable dimension six operators break the custodial symmetry and induce the decay of the dark matter particle at cosmological times. We discuss in this paper the cosmic ray signatures of this scenario and we show that the decay of hidden vector dark matter particles generically produce an intense gamma ray line which could be observed by the Fermi-LAT experiment, if the scale of custodial symmetry breaking is close to the Grand Unification scale. This gamma line proceeds directly from a tree level dark matter 2-body decay in association with a Higgs boson. Within this model we also perform a determination of the relic density constraints taking into account the dark matter annihilation processes with one dark matter particle in the final state. The corresponding direct detection rates can be easily of order the current experimental sensitivities

  7. The Hidden Cost of Buying a Computer.

    Science.gov (United States)

    Johnson, Michael

    1983-01-01

    In order to process data in a computer, application software must be either developed or purchased. Costs for modifications of the software package and maintenance are often hidden. The decision to buy or develop software packages should be based upon factors of time and maintenance. (MLF)

  8. Theoretical analysis of hidden photon searches in high-precision experiments

    International Nuclear Information System (INIS)

    Beranek, Tobias

    2014-01-01

    Although the Standard Model of particle physics (SM) provides an extremely successful description of the ordinary matter, one knows from astronomical observations that it accounts only for around 5% of the total energy density of the Universe, whereas around 30% are contributed by the dark matter. Motivated by anomalies in cosmic ray observations and by attempts to solve questions of the SM like the (g-2) μ discrepancy, proposed U(1) extensions of the Standard Model gauge group SU(3) x SU(2) x U(1) have raised attention in recent years. In the considered U(1) extensions a new, light messenger particle γ', the hidden photon, couples to the hidden sector as well as to the electromagnetic current of the SM by kinetic mixing. This allows for a search for this particle in laboratory experiments exploring the electromagnetic interaction. Various experimental programs have been started to search for the γ' boson, such as in electron-scattering experiments, which are a versatile tool to explore various physics phenomena. One approach is the dedicated search in fixed-target experiments at modest energies as performed at MAMI or at JLAB. In these experiments the scattering of an electron beam off a hadronic target e→e(A,Z)l + l - is investigated and a search for a very narrow resonance in the invariant mass distribution of the l + l - pair is performed. This requires an accurate understanding of the theoretical basis of the underlying processes. For this purpose it is demonstrated in the first part of this work, in which way the hidden photon can be motivated from existing puzzles encountered at the precision frontier of the SM. The main part of this thesis deals with the analysis of the theoretical framework for electron scattering fixed-target experiments searching for hidden photons. As a first step, the cross section for the bremsstrahlung emission of hidden photons in such experiments is studied. Based on these results, the applicability of the Weizsaecker

  9. Sterile neutrino, hidden dark matter and their cosmological signatures

    International Nuclear Information System (INIS)

    Das, Subinoy

    2012-01-01

    Though thermal dark matter has been the central idea behind the dark matter candidates, it is highly possible that dark matter of the universe is non-thermal in origin or it might be in thermal contact with some hidden or dark sector but not with standard model. Here we explore the cosmological bounds as well as the signatures on two types of non-thermal dark matter candidates. First we discuss a hidden dark matter with almost no interaction (or very feeble) with standard model particles so that it is not in thermal contact with visible sector but we assume it is thermalized with in a hidden sector due to some interaction. While encompassing the standard cold WIMP scenario, we do not require the freeze-out process to be non-relativistic. Rather, freeze-out may also occur when dark matter particles are semi-relativistic or relativistic. Especially we focus on the warm dark matter scenario in this set up and find the constraints on the warm dark matter mass, cross-section and hidden to visible sector temperature ratio which accounts for the observed dark-matter density, satisfies the Tremaine-Gunn bound on dark-matter phase space density and has a free-streaming length consistent with cosmological constraints on the matter power spectrum. Our method can also be applied to keV sterile neutrino dark matter which is not thermalized with standard model but is thermalized with in a dark sector. The second part of this proceeding focuses on an exotic dark matter candidate which arises from the existence of eV mass sterile neutrino through a late phase transition. Due to existence of a strong scalar force the light sterile states get trapped into stable degenerate micro nuggets. We find that its signature in matter power spectra is close to a warm dark matter candidate.

  10. Hidden Attraction - The History and Mystery of Magnetism

    Science.gov (United States)

    Verschuur, Gerrit L.

    1996-04-01

    Long one of nature's most fascinating phenomena, magnetism was once the subject of many superstitions. Magnets were thought useful to thieves, effective as a love potion, and as a cure for gout or spasms. They could remove sorcery from women and put demons to flight and even reconcile married couples. It was said that a lodestone pickled in the salt of sucking fish had the power to attract gold. Today, these beliefs have been put aside, but magnetism is no less remarkable for our modern understanding of it. In Hidden Attraction , Gerrit L. Verschuur, a noted astronomer and National Book Award nominee for The Invisible Universe , traces the history of our fascination with magnetism, from the mystery and superstition that propelled the first alchemical experiments with lodestone, through the more tangible works of Faraday, Maxwell, Hertz and other great pioneers of magnetism (scientists responsible for the extraordinary advances in modern science and technology, including radio, the telephone, and computers, that characterize the twentieth century), to state-of-the-art theories that see magnetism as a basic force in the universe. Boasting many informative illustrations, this is an adventure of the mind, using the specific phenomenon of magnetism to show how we have moved from an era of superstitions to one in which the Theory of Everything looms on the horizon.

  11. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  12. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  13. Algorithms for a parallel implementation of Hidden Markov Models with a small state space

    DEFF Research Database (Denmark)

    Nielsen, Jesper; Sand, Andreas

    2011-01-01

    Two of the most important algorithms for Hidden Markov Models are the forward and the Viterbi algorithms. We show how formulating these using linear algebra naturally lends itself to parallelization. Although the obtained algorithms are slow for Hidden Markov Models with large state spaces...

  14. Testing string vacua in the lab. From a hidden CMB to dark forces in flux compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Cicoli, Michele; Goodsell, Mark; Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Hamburg (Germany). Theory Group; Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenolgy

    2011-03-15

    We perform a detailed analysis of the phenomenological properties of hidden Abelian gauge bosons with a kinetic mixing with the ordinary photon within type IIB flux compactifications. We study the interplay between moduli stabilisation and the Green-Schwarz mechanism that gives mass to the hidden photon paying particular attention to the role of D-terms. We present two generic classes of explicit Calabi-Yau examples with an isotropic and an anisotropic shape of the extra dimensions showing how the last case turns out to be very promising to make contact with current experiments. In fact, anisotropic compactifications lead naturally to a GeV-scale hidden photon (''dark forces'' that can be searched for in beam dump experiments) for an intermediate string scale; or even to an meV-scale hidden photon (which could lead to a ''hidden CMB'' and can be tested by light-shining-through-a-wall experiments) in the case of TeV-scale strings. (orig.)

  15. Has Bell's inequality a general meaning for hidden-variable theories

    International Nuclear Information System (INIS)

    Lochak, G.

    1976-01-01

    The proof given by J. S. Bell of an inequality between mean values of measurement results which, according to him, would be characteristic of any local hidden-parameter theory, is analyzed. It is shown that Bell's proof is based upon a hypothesis already contained in von Neumann's famous theorem: It consists in the admission that hidden values of parameters must obey the same statistical laws as observed values. This hypothesis contradicts in advance well known and certainly correct statistical relations in measurement results: one must therefore reject the type of theory considered by Bell, and his inequality has no general meaning

  16. Object permanence in dogs: invisible displacement in a rotation task.

    Science.gov (United States)

    Miller, Holly C; Gipson, Cassie D; Vaughan, Aubrey; Rayburn-Reeves, Rebecca; Zentall, Thomas R

    2009-02-01

    Dogs were tested for object permanence using an invisible displacement in which an object was hidden in one of two containers at either end of a beam and the beam was rotated. Consistent with earlier research, when the beam was rotated 180 degrees , the dogs failed to find the object. However, when the beam was rotated only 90 degrees , they were successful. Furthermore, when the dogs were led either 90 degrees or 180 degrees around the apparatus, they were also successful. In a control condition, when the dogs could not see the direction of the 90 degrees rotation, they failed to find the object. The results suggest that the 180 degrees rotation may produce an interfering context that can be reduced by rotating the apparatus only 90 degrees or by changing the dogs' perspective. Once the conflict is eliminated, dogs show evidence of object permanence that includes invisibly displaced objects.

  17. Swallowing sound detection using hidden markov modeling of recurrence plot features

    International Nuclear Information System (INIS)

    Aboofazeli, Mohammad; Moussavi, Zahra

    2009-01-01

    Automated detection of swallowing sounds in swallowing and breath sound recordings is of importance for monitoring purposes in which the recording durations are long. This paper presents a novel method for swallowing sound detection using hidden Markov modeling of recurrence plot features. Tracheal sound recordings of 15 healthy and nine dysphagic subjects were studied. The multidimensional state space trajectory of each signal was reconstructed using the Taken method of delays. The sequences of three recurrence plot features of the reconstructed trajectories (which have shown discriminating capability between swallowing and breath sounds) were modeled by three hidden Markov models. The Viterbi algorithm was used for swallowing sound detection. The results were validated manually by inspection of the simultaneously recorded airflow signal and spectrogram of the sounds, and also by auditory means. The experimental results suggested that the performance of the proposed method using hidden Markov modeling of recurrence plot features was superior to the previous swallowing sound detection methods.

  18. Swallowing sound detection using hidden markov modeling of recurrence plot features

    Energy Technology Data Exchange (ETDEWEB)

    Aboofazeli, Mohammad [Faculty of Engineering, Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, Manitoba, R3T 5V6 (Canada)], E-mail: umaboofa@cc.umanitoba.ca; Moussavi, Zahra [Faculty of Engineering, Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, Manitoba, R3T 5V6 (Canada)], E-mail: mousavi@ee.umanitoba.ca

    2009-01-30

    Automated detection of swallowing sounds in swallowing and breath sound recordings is of importance for monitoring purposes in which the recording durations are long. This paper presents a novel method for swallowing sound detection using hidden Markov modeling of recurrence plot features. Tracheal sound recordings of 15 healthy and nine dysphagic subjects were studied. The multidimensional state space trajectory of each signal was reconstructed using the Taken method of delays. The sequences of three recurrence plot features of the reconstructed trajectories (which have shown discriminating capability between swallowing and breath sounds) were modeled by three hidden Markov models. The Viterbi algorithm was used for swallowing sound detection. The results were validated manually by inspection of the simultaneously recorded airflow signal and spectrogram of the sounds, and also by auditory means. The experimental results suggested that the performance of the proposed method using hidden Markov modeling of recurrence plot features was superior to the previous swallowing sound detection methods.

  19. Hidden conformal symmetry of a rotating black hole with four charges

    International Nuclear Information System (INIS)

    Shao Kainan; Zhang Zhibai

    2011-01-01

    Kerr/CFT correspondence exhibits many remarkable connections between the near-horizon Kerr black hole and a conformal field theory (CFT). Recently, Castro, Maloney, and Strominger showed that a hidden conformal symmetry exists in the solution space of a Kerr black hole. In this paper we investigate a rotating black hole with four independent U(1) charges derived from string theory which is known as the four-dimensional Cvetic-Youm solution, and we prove that the same hidden conformal symmetry also holds. We obtain the exact black hole entropy using the temperatures derived. The entropy and absorption cross section agree with the previous results [M. Cvetic and F. Larsen, Nucl. Phys. B506, 107 (1997).] and [M. Cvetic and F. Larsen, J. High Energy Phys. 09 (2009) 088.]. In addition, we clarify a previous explanation on the temperatures of the Cvetic-Youm solution's dual CFT. This work provides more robust derivation of the hidden conformal symmetry of Kerr-like black holes and as well as Kerr/CFT correspondence.

  20. Implications of the measured angular anisotropy at the hidden order transition of URu2Si2

    Science.gov (United States)

    Chandra, P.; Coleman, P.; Flint, R.; Trinh, J.; Ramirez, A. P.

    2018-05-01

    The heavy fermion compound URu2Si2 continues to attract great interest due to the long-unidentified nature of the hidden order that develops below 17.5 K. Here we discuss the implications of an angular survey of the linear and nonlinear susceptibility of URu2Si2 in the vicinity of the hidden order transition [1]. While the anisotropic nature of spin fluctuations and low-temperature quasiparticles was previously established, our recent results suggest that the order parameter itself has intrinsic Ising anisotropy, and that moreover this anisotropy extends far above the hidden order transition. Consistency checks and subsequent questions for future experimental and theoretical studies of hidden order are discussed.

  1. Hidden sector dark matter and the Galactic Center gamma-ray excess: a closer look

    Science.gov (United States)

    Escudero, Miguel; Witte, Samuel J.; Hooper, Dan

    2017-11-01

    Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case, we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. We also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.

  2. Hidden Sector Dark Matter and the Galactic Center Gamma-Ray Excess: A Closer Look

    Energy Technology Data Exchange (ETDEWEB)

    Escudero, Miguel; Witte, Samuel J.; Hooper, Dan

    2017-09-20

    Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case, we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. We also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.

  3. A combined spectral and object-based approach to transparent cloud removal in an operational setting for Landsat ETM+

    Science.gov (United States)

    Watmough, Gary R.; Atkinson, Peter M.; Hutton, Craig W.

    2011-04-01

    The automated cloud cover assessment (ACCA) algorithm has provided automated estimates of cloud cover for the Landsat ETM+ mission since 2001. However, due to the lack of a band around 1.375 μm, cloud edges and transparent clouds such as cirrus cannot be detected. Use of Landsat ETM+ imagery for terrestrial land analysis is further hampered by the relatively long revisit period due to a nadir only viewing sensor. In this study, the ACCA threshold parameters were altered to minimise omission errors in the cloud masks. Object-based analysis was used to reduce the commission errors from the extended cloud filters. The method resulted in the removal of optically thin cirrus cloud and cloud edges which are often missed by other methods in sub-tropical areas. Although not fully automated, the principles of the method developed here provide an opportunity for using otherwise sub-optimal or completely unusable Landsat ETM+ imagery for operational applications. Where specific images are required for particular research goals the method can be used to remove cloud and transparent cloud helping to reduce bias in subsequent land cover classifications.

  4. Cultural competence in medical education: aligning the formal, informal and hidden curricula.

    Science.gov (United States)

    Paul, David; Ewen, Shaun C; Jones, Rhys

    2014-12-01

    The concept of cultural competence has become reified by inclusion as an accreditation standard in the US and Canada, in New Zealand it is demanded through an Act of Parliament, and it pervades discussion in Australian medical education discourse. However, there is evidence that medical graduates feel poorly prepared to deliver cross-cultural care (Weissman et al. in J Am Med Assoc 294(9):1058-1067, 2005) and many commentators have questioned the effectiveness of cultural competence curricula. In this paper we apply Hafferty's taxonomy of curricula, the formal, informal and hidden curriculum (Hafferty in Acad Med 73(4):403-407, 1998), to cultural competence. Using an example across each of these curricular domains, we highlight the need for curricular congruence to support cultural competence development among learners. We argue that much of the focus on cultural competence has been in the realm of formal curricula, with existing informal and hidden curricula which may be at odds with the formal curriculum. The focus of the formal, informal and hidden curriculum, we contend, should be to address disparities in health care outcomes. In conclusion, we suggest that without congruence between formal, informal and hidden curricula, approaches to addressing disparity in health care outcomes in medical education may continue to represent reform without change.

  5. The Hidden Curriculum of Veterinary Education: Mediators and Moderators of Its Effects.

    Science.gov (United States)

    Roder, Carrie A; May, Stephen A

    The "hidden curriculum" has long been supposed to have an effect on students' learning during their clinical education, and in particular in shaping their ideas of what it means to be a professional. Despite this, there has been little evidence linking specific changes in professional attitudes to the individual components of the hidden curriculum. This study aimed to recognize those components that led to a change in students' professional attitudes at a UK veterinary school, as well as to identify the attitudes most affected. Observations were made of 11 student groups across five clinical rotations, followed by semi-structured interviews with 23 students at the end of their rotation experience. Data were combined and analyzed thematically, taking both an inductive and deductive approach. Views about the importance of technical competence and communication skills were promoted as a result of students' interaction with the hidden curriculum, and tensions were revealed in relation to their attitudes toward compassion and empathy, autonomy and responsibility, and lifestyle ethic. The assessment processes of rotations and the clinical service organization served to communicate the messages of the hidden curriculum, bringing about changes in student professional attitudes, while student-selected role models and the student rotation groups moderated the effects of these influences.

  6. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  7. A Rose By Other Names: Some General Musings on Lawrence and Colleagues' Hidden Curriculum Scoping Review.

    Science.gov (United States)

    Hafferty, Frederic W; Martimianakis, Maria Athina

    2017-11-07

    In this Commentary, the authors explore the scoping review by Lawrence and colleagues by challenging their conclusion that with over 25 years' worth of "ambiguous and seemingly ubiquitous use" of the hidden curriculum construct in health professions education scholarship, it is time to either move to a more uniform definitional foundation or abandon the term altogether. The commentary authors counter these remedial propositions by foregrounding the importance of theoretical diversity and the conceptual richness afforded when the hidden curriculum construct is used as an entry point for studying the interstitial space between the formal and a range of other-than-formal domains of learning. Further, they document how tightly-delimited scoping strategies fail to capture the wealth of educational scholarship that operates within a hidden curriculum framework, including "hidden" hidden curriculum articles, studies that employ alternative constructs, and investigations that target important tacit socio-cultural influences on learners and faculty without formally deploying the term. They offer examples of how the hidden curriculum construct, while undergoing significant transformation in its application within the field of health professions education, has created the conceptual foundation for the application of a number of critical perspectives that make visible the field's political investments in particular forms of knowing and associated practices. Finally, the commentary authors invite readers to consider the methodological promise afforded by conceptual heterogeneity, particularly strands of scholarship that resituate the hidden curriculum concept within the magically expansive dance of social relationships, social learning, and social life that form the learning environments of health professions education.

  8. Prediction of super-heavy N⁎ and Λ⁎ resonances with hidden beauty

    International Nuclear Information System (INIS)

    Wu Jiajun; Zhao Lu; Zou, B.S.

    2012-01-01

    The meson-baryon coupled channel unitary approach with the local hidden gauge formalism is extended to the hidden beauty sector. A few narrow N ⁎ and Λ ⁎ resonances around 11 GeV are predicted as dynamically generated states from the interactions of heavy beauty mesons and baryons. Production cross sections of these predicted resonances in pp and ep collisions are estimated as a guide for the possible experimental search at relevant facilities.

  9. People ageing with spinal cord injury in New Zealand: a hidden population? The need for a spinal cord injury registry.

    Science.gov (United States)

    Smaill, Richard; Schluter, Philip J; Barnett, Pauline; Keeling, Sally

    2016-07-15

    To identify and establish a research database of ageing New Zealand people who sustained a traumatic or non-traumatic spinal cord injury (SCI) before 1990. All living New Zealand residents incurring a SCI before 1 January 1990 were eligible. A co-ordinated consultation with apposite New Zealand organisations was undertaken to identify and access existing SCI databases, and remove duplicate or ineligible records. 1,400 people were identified. Using the national patient information management system to determine eligibility, 1,174 people remained after exclusions; 600 (51.1%) through the Auckland Spinal Rehabilitation Unit and 574 (48.9%) through the Burwood Spinal Unit. Common to both databases were people's National Health Index number, contact details, basic demographic data, date of injury, and neurological level of SCI. An unexpectedly large SCI population was uncovered; a population largely hidden due to the uncoordinated, fragmented and inconsistently collected information held within different organisations. As life expectancy rapidly increases for those with SCI, coupled with an accelerated ageing general population, this hidden SCI population can be expected to grow. A single, well-managed and coordinated national SCI registry is urgently needed in New Zealand for planning and delivery of services, especially for those developing age-related complex interwoven secondary conditions.

  10. Locality or non-locality in quantum mechanics: hidden variables without ''spooky action-at-a-distance''

    International Nuclear Information System (INIS)

    Aharonov, Y.; Scully, M.

    2001-01-01

    The folklore notion of the ''Non-Locality of Quantum Mechanics'' is examined from the point of view of hidden-variables theories according to Belinfante's classification in his Survey of Hidden Variables Theories. It is here shown that in the case of EPR, there exist hidden variables theories that successfully reproduce quantum-mechanical predictions, but which are explicitly local. Since such theories do not fall into Belinfante's classification, we propose an expanded classification which includes similar theories, which we term as theories of the ''third'' kind. Causal implications of such theories are explored. (orig.)

  11. Revealing hidden covariation detection: evidence for implicit abstraction at study.

    Science.gov (United States)

    Rossnagel, C S

    2001-09-01

    Four experiments in the brain scans paradigm (P. Lewicki, T. Hill, & I. Sasaki, 1989) investigated hidden covariation detection (HCD). In Experiment 1 HCD was found in an implicit- but not in an explicit-instruction group. In Experiment 2 HCD was impaired by nonholistic perception of stimuli but not by divided attention. In Experiment 3 HCD was eliminated by interspersing stimuli that deviated from the critical covariation. In Experiment 4 a transfer procedure was used. HCD was found with dissimilar test stimuli that preserved the covariation but was almost eliminated with similar stimuli that were neutral as to the covariation. Awareness was assessed both by objective and subjective tests in all experiments. Results suggest that HCD is an effect of implicit rule abstraction and that similarity processing plays only a minor role. HCD might be suppressed by intentional search strategies that induce inappropriate aggregation of stimulus information.

  12. Hidden magnetism in periodically modulated one dimensional dipolar fermions

    Science.gov (United States)

    Fazzini, S.; Montorsi, A.; Roncaglia, M.; Barbiero, L.

    2017-12-01

    The experimental realization of time-dependent ultracold lattice systems has paved the way towards the implementation of new Hubbard-like Hamiltonians. We show that in a one-dimensional two-components lattice dipolar Fermi gas the competition between long range repulsion and correlated hopping induced by periodically modulated on-site interaction allows for the formation of hidden magnetic phases, with degenerate protected edge modes. The magnetism, characterized solely by string-like nonlocal order parameters, manifests in the charge and/or in the spin degrees of freedom. Such behavior is enlighten by employing Luttinger liquid theory and numerical methods. The range of parameters for which hidden magnetism is present can be reached by means of the currently available experimental setups and probes.

  13. Head First Object-Oriented Analysis and Design

    CERN Document Server

    McLaughlin, Brett D; West, David

    2006-01-01

    "Head First Object Oriented Analysis and Design is a refreshing look at subject of OOAD. What sets this book apart is its focus on learning. The authors have made the content of OOAD accessible, usable for the practitioner." Ivar Jacobson, Ivar Jacobson Consulting "I just finished reading HF OOA&D and I loved it! The thing I liked most about this book was its focus on why we do OOA&D-to write great software!" Kyle Brown, Distinguished Engineer, IBM "Hidden behind the funny pictures and crazy fonts is a serious, intelligent, extremely well-crafted presentation of OO Analysis and Design

  14. Identification of hidden failures in control systems: a functional modelling approach

    International Nuclear Information System (INIS)

    Jalashgar, A.; Modarres, M.

    1996-01-01

    This paper presents a model which encompasses knowledge about a process control system's functionalities in a function-oriented failure analysis task. The technique called Hybrid MFM-GTST, mainly utilizes two different function - oriented methods (MFM and GTST) to identify all functions of the system components, and hence possible sources of hidden failures in process control systems. Hidden failures are referred to incipient failures within the system that in long term may lead to loss of major functions. The features of the method are described and demonstrated by using an example of a process control system

  15. Heisenberg (and Schrödinger, and Pauli) on hidden variables

    Science.gov (United States)

    Bacciagaluppi, Guido; Crull, Elise

    In this paper, we discuss various aspects of Heisenberg's thought on hidden variables in the period 1927-1935. We also compare Heisenberg's approach to others current at the time, specifically that embodied by von Neumann's impossibility proof, but also views expressed mainly in correspondence by Pauli and by Schrödinger. We shall base ourselves mostly on published and unpublished materials that are known but little-studied, among others Heisenberg's own draft response to the EPR paper. Our aim will be not only to clarify Heisenberg's thought on the hidden-variables question, but in part also to clarify how this question was understood more generally at the time.

  16. Plate removal following orthognathic surgery.

    Science.gov (United States)

    Little, Mhairi; Langford, Richard Julian; Bhanji, Adam; Farr, David

    2015-11-01

    The objectives of this study are to determine the removal rates of orthognathic plates used during orthognathic surgery at James Cook University Hospital and describe the reasons for plate removal. 202 consecutive orthognathic cases were identified between July 2004 and July 2012. Demographics and procedure details were collected for these patients. Patients from this group who returned to theatre for plate removal between July 2004 and November 2012 were identified and their notes were analysed for data including reason for plate removal, age, smoking status, sex and time to plate removal. 3.2% of plates were removed with proportionally more plates removed from the mandible than the maxilla. 10.4% of patients required removal of one or more plate. Most plates were removed within the first post-operative year. The commonest reasons for plate removal were plate exposure and infection. The plate removal rates in our study are comparable to those seen in the literature. Copyright © 2015 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.

  17. Anti-pairing in learning of a neural network with redundant hidden units

    International Nuclear Information System (INIS)

    Kwon, Chulan; Kim, Hyong Kyun

    2005-01-01

    We study the statistical mechanics of learning from examples between the two-layered committee machines with different numbers of hidden units using the replica theory. The number M of hidden units of the student network is larger than the number M T of those of the target network called the teacher. We choose the networks to have binary synaptic weights, ±1, which makes it possible to compare the calculation with the Monte Carlo simulation. We propose an effective teacher as a virtual target network which has the same M hidden units as the student and gives identical outputs with those of the original teacher. This is a way of making a conjecture for a ground state of a thermodynamic system, given by the weights of the effective teacher in our study. We suppose that the weights on M T hidden units of the effective teacher are the same as those of the original teacher while those on M - M T redundant hidden units are composed of anti-pairs, {1, - 1}, with probability 1 - p in the limit p → 0. For p = 0 exact, there are no terms related to the effective teacher in the calculation, for the contributions of anti-pairs to outputs are exactly cancelled. In the limit p → 0, however, we find that the learnt weights of the student are actually equivalent to those of the suggested effective teacher, which is not possible from the calculation for p = 0. p plays the role of a symmetry breaking parameter for anti-pairing ordering, which is analogous to the magnetic field for the Ising model. A first-order phase transition is found to be signalled by breaking of symmetry in permuting hidden units. Above a critical number of examples, the student is shown to learn perfectly the effective teacher. Anti-pairing can be measured by a set of order parameters; zero in the permutation-symmetric phase and nonzero in the permutation symmetry breaking phase. Results from the Monte Carlo simulation are shown to be in good agreement with those from the replica calculation

  18. Hidden acoustic information revealed by intentional nonlinearity

    Science.gov (United States)

    Dowling, David R.

    2017-11-01

    Acoustic waves are omnipresent in modern life and are well described by the linearized equations of fluid dynamics. Once generated, acoustic waves carry and collect information about their source and the environment through which they propagate, respectively, and this information may be retrieved by analyzing recordings of these waves. Because of this, acoustics is the primary means for observation, surveillance, reconnaissance, and remote sensing in otherwise opaque environments, such as the Earth's oceans and crust, and the interior of the human body. For such information-retrieval tasks, acoustic fields are nearly always interrogated within their recorded frequency range or bandwidth. However, this frequency-range restriction is not general; acoustic fields may also carry (hidden) information at frequencies outside their bandwidth. Although such a claim may seem counter intuitive, hidden acoustic-field information can be revealed by re-introducing a marquee trait of fluid dynamics: nonlinearity. In particular, an intentional quadratic nonlinearity - a form of intra-signal heterodyning - can be used to obtain acoustic field information at frequencies outside a recorded acoustic field's bandwidth. This quadratic nonlinearity enables a variety of acoustic remote sensing applications that were long thought to be impossible. In particular, it allows the detrimental effects of sparse recordings and random scattering to be suppressed when the original acoustic field has sufficient bandwidth. In this presentation, the topic is developed heuristically, with a just brief exposition of the relevant mathematics. Hidden acoustic field information is then revealed from simulated and measured acoustic fields in simple and complicated acoustic environments involving frequencies from a few Hertz to more than 100 kHz, and propagation distances from tens of centimeters to hundreds of kilometers. Sponsored by ONR, NAVSEA, and NSF.

  19. Hidden neuronal correlations in cultured networks

    International Nuclear Information System (INIS)

    Segev, Ronen; Baruchi, Itay; Hulata, Eyal; Ben-Jacob, Eshel

    2004-01-01

    Utilization of a clustering algorithm on neuronal spatiotemporal correlation matrices recorded during a spontaneous activity of in vitro networks revealed the existence of hidden correlations: the sequence of synchronized bursting events (SBEs) is composed of statistically distinguishable subgroups each with its own distinct pattern of interneuron spatiotemporal correlations. These findings hint that each of the SBE subgroups can serve as a template for coding, storage, and retrieval of a specific information

  20. Low energy theorems of hidden local symmetries

    International Nuclear Information System (INIS)

    Harada, Masayasu; Kugo, Taichiro; Yamawaki, Koichi.

    1994-01-01

    We prove to all orders of the loop expansion the low energy theorems of hidden local symmetries in four-dimensional nonlinear sigma models based on the coset space G/H, with G and H being arbitrary compact groups. Although the models are non-renormalizable, the proof is done in an analogous manner to the renormalization proof of gauge theories and two-dimensional nonlinear sigma models by restricting ourselves to the operators with two derivatives (counting a hidden gauge boson field as one derivative), i.e., with dimension 2, which are the only operators relevant to the low energy limit. Through loop-wise mathematical induction based on the Ward-Takahashi identity for the BRS symmetry, we solve renormalization equation for the effective action up to dimension-2 terms plus terms with the relevant BRS sources. We then show that all the quantum corrections to the dimension-2 operators, including the finite parts as well as the divergent ones, can be entirely absorbed into a re-definition (renormalization) of the parameters and the fields in the dimension-2 part of the tree-level Lagrangian. (author)

  1. Infants use temporal regularities to chunk objects in memory.

    Science.gov (United States)

    Kibbe, Melissa M; Feigenson, Lisa

    2016-01-01

    Infants, like adults, can maintain only a few items in working memory, but can overcome this limit by creating more efficient representations, or "chunks." Previous research shows that infants can form chunks using shared features or spatial proximity between objects. Here we asked whether infants also can create chunked representations using regularities that unfold over time. Thirteen-month old infants first were familiarized with four objects of different shapes and colors, presented in successive pairs. For some infants, the identities of objects in each pair varied randomly across familiarization (Experiment 1). For others, the objects within a pair always co-occurred, either in consistent relative spatial positions (Experiment 2a) or varying spatial positions (Experiment 2b). Following familiarization, infants saw all four objects hidden behind a screen and then saw the screen lifted to reveal either four objects or only three. Infants in Experiment 1, who had been familiarized with random object pairings, failed to look longer at the unexpected 3-object outcome; they showed the same inability to concurrently represent four objects as in other studies of infant working memory. In contrast, infants in Experiments 2a and 2b, who had been familiarized with regularly co-occurring pairs, looked longer at the unexpected outcome. These infants apparently used the co-occurrence between individual objects during familiarization to form chunked representations that were later deployed to track the objects as they were hidden at test. In Experiment 3, we confirmed that the familiarization affected infants' ability to remember the occluded objects rather than merely establishing longer-term memory for object pairs. Following familiarization to consistent pairs, infants who were not shown a hiding event (but merely saw the same test outcomes as in Experiments 2a and b) showed no preference for arrays of three versus four objects. Finally, in Experiments 4 and 5, we asked

  2. Object permanence in the Goffin cockatoo (Cacatua goffini).

    Science.gov (United States)

    Auersperg, Alice M I; Szabo, Birgit; von Bayern, Auguste M P; Bugnyar, Thomas

    2014-02-01

    The ability to represent hidden objects plays an important role in the survival of many species. In order to provide an inclusive synopsis of the current benchmark tasks used to test object permanence in animals for a psittacine representative, we tested eight Goffin cockatoos (Cacatua goffini) on Stages 3-6 of Piagetian object permanence as well as derivations of spatial transposition, rotation, and translocation tasks. Subjects instantly solved visible displacement 3b and 4a but showed an extended plateau for solving Stage 5a at a very late age (10 months). Subjects readily solved most invisible displacement tasks including double hidings and four angles (90°, 180°, 270°, and 360°) of rotation and translocations at high performance levels, although Piagetian Stage 6 invisible displacement tasks caused more difficulties for the animals than transposition, rotations, and translocation tasks. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  3. Hair removal in adolescence

    Directory of Open Access Journals (Sweden)

    Sandra Pereira

    2015-06-01

    Full Text Available Introduction: Due to hormonal stimulation during puberty, changes occur in hair type and distribution. In both sexes, body and facial unwanted hair may have a negative psychological impact on the teenager. There are several available methods of hair removal, but the choice of the most suitable one for each individual can raise doubts. Objective: To review the main methods of hair removal and clarify their indications, advantages and disadvantages. Development: There are several removal methods currently available. Shaving and depilation with chemicals products are temporary methods, that need frequent repetition, because hair removal is next to the cutaneous surface. The epilating methods in which there is full hair extraction include: epilation with wax, thread, tweezers, epilating machines, laser, intense pulsed light, and electrolysis. Conclusions: The age of beginning hair removal and the method choice must be individualized and take into consideration the skin and hair type, location, dermatological and endocrine problems, removal frequency, cost and personal preferences.

  4. Fuzzy hidden Markov chains segmentation for volume determination and quantitation in PET

    Energy Technology Data Exchange (ETDEWEB)

    Hatt, M [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Lamare, F [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609, (France); Boussion, N [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Turzo, A [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Collet, C [Ecole Nationale Superieure de Physique de Strasbourg (ENSPS), ULP, Strasbourg, F-67000 (France); Salzenstein, F [Institut d' Electronique du Solide et des Systemes (InESS), ULP, Strasbourg, F-67000 (France); Roux, C [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Jarritt, P [Medical Physics Agency, Royal Victoria Hospital, Belfast (United Kingdom); Carson, K [Medical Physics Agency, Royal Victoria Hospital, Belfast (United Kingdom); Rest, C Cheze-Le [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Visvikis, D [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France)

    2007-07-21

    Accurate volume of interest (VOI) estimation in PET is crucial in different oncology applications such as response to therapy evaluation and radiotherapy treatment planning. The objective of our study was to evaluate the performance of the proposed algorithm for automatic lesion volume delineation; namely the fuzzy hidden Markov chains (FHMC), with that of current state of the art in clinical practice threshold based techniques. As the classical hidden Markov chain (HMC) algorithm, FHMC takes into account noise, voxel intensity and spatial correlation, in order to classify a voxel as background or functional VOI. However the novelty of the fuzzy model consists of the inclusion of an estimation of imprecision, which should subsequently lead to a better modelling of the 'fuzzy' nature of the object of interest boundaries in emission tomography data. The performance of the algorithms has been assessed on both simulated and acquired datasets of the IEC phantom, covering a large range of spherical lesion sizes (from 10 to 37 mm), contrast ratios (4:1 and 8:1) and image noise levels. Both lesion activity recovery and VOI determination tasks were assessed in reconstructed images using two different voxel sizes (8 mm{sup 3} and 64 mm{sup 3}). In order to account for both the functional volume location and its size, the concept of % classification errors was introduced in the evaluation of volume segmentation using the simulated datasets. Results reveal that FHMC performs substantially better than the threshold based methodology for functional volume determination or activity concentration recovery considering a contrast ratio of 4:1 and lesion sizes of <28 mm. Furthermore differences between classification and volume estimation errors evaluated were smaller for the segmented volumes provided by the FHMC algorithm. Finally, the performance of the automatic algorithms was less susceptible to image noise levels in comparison to the threshold based techniques. The

  5. Constraints on hidden photons from current and future observations of CMB spectral distortions

    International Nuclear Information System (INIS)

    Kunze, Kerstin E.; Vázquez-Mozo, Miguel Á.

    2015-01-01

    A variety of beyond the standard model scenarios contain very light hidden sector U(1) gauge bosons undergoing kinetic mixing with the photon. The resulting oscillation between ordinary and hidden photons leads to spectral distortions of the cosmic microwave background. We update the bounds on the mixing parameter χ 0 and the mass of the hidden photon m γ' for future experiments measuring CMB spectral distortions, such as PIXIE and PRISM/COrE. For 10 −14  eV∼< m γ' ∼< 10 −13  eV, we find the kinetic mixing angle χ 0 has to be less than 10 −8 at 95% CL. These bounds are more than an order of magnitude stronger than those derived from the COBE/FIRAS data

  6. Glacier area and volume changes of Hidden Valley, Mustang, Nepal from ~1980s to 2010 based on remote sensing

    Directory of Open Access Journals (Sweden)

    L. Lama

    2015-05-01

    Full Text Available Glaciers are one of the important natural resources of freshwater and sources of water for hydropower, agriculture and drinking whenever the water is scarce. This mapping and change analysis helps to understand the status and decadal changes of glaciers in Hidden Valley, Mustang district, Nepal. The investigation is carried out using Landsat images of the years 1977 (~1980s, 1990, 2000 and 2010. We mapped 10 glaciers of the Hidden Valley covering an area of 19.79 km2 based on the object-based image classification method using an automatic method and manual delineation by a Geographic Information System (GIS, separately. The glacier outlines for 2010, 2000, 1990 and 1980s in both methods are delineated from the multispectral Landsat images of the respective years. The total area losses of the glaciers from the automatic method are 1.713 and 0.625 km2 between 1990−2000 and 2000−2010 and from manual delineation are 2.021, 1.264, 1.041 km2 between ~1980s−1990, 1990−2000 and 2000−2010. The amount of average estimated glacier ice reserves lost is 0.326 km3 (26.26 % and the total glacier area loss is 4.33 km2 (21.87 % from the 1980s to 2010 based on manual delineation. The glaciers of Hidden Valley are shrinking and fragmented due to decrease in glacier area and ice reserves.

  7. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...... functions are also discussed....

  8. Quantum gravity removes classical singularities and shortens the life of black holes

    International Nuclear Information System (INIS)

    Frolov, V.P.; Vilkovisky, G.A.

    1982-01-01

    One of the fundamental problems in classical General Relativity is what is to be done with singularities which inevitably arise in the theoretical description of the massive body (or total Universe) collapse. Although the singularities arising as a result of the gravitational collapse are believed to be hidden under event horizons and thus are not visible to an external observer, their very existence means the crisis of the classical gravitational physics. It is generally believed that the proper account of quantum effects may cure this disease. The aim of the present work is to show that it really happens, and quantum gravity does remove classical singularities. (Auth.)

  9. Hidden hyperchaos and electronic circuit application in a 5D self-exciting homopolar disc dynamo

    Science.gov (United States)

    Wei, Zhouchao; Moroz, Irene; Sprott, J. C.; Akgul, Akif; Zhang, Wei

    2017-03-01

    We report on the finding of hidden hyperchaos in a 5D extension to a known 3D self-exciting homopolar disc dynamo. The hidden hyperchaos is identified through three positive Lyapunov exponents under the condition that the proposed model has just two stable equilibrium states in certain regions of parameter space. The new 5D hyperchaotic self-exciting homopolar disc dynamo has multiple attractors including point attractors, limit cycles, quasi-periodic dynamics, hidden chaos or hyperchaos, as well as coexisting attractors. We use numerical integrations to create the phase plane trajectories, produce bifurcation diagram, and compute Lyapunov exponents to verify the hidden attractors. Because no unstable equilibria exist in two parameter regions, the system has a multistability and six kinds of complex dynamic behaviors. To the best of our knowledge, this feature has not been previously reported in any other high-dimensional system. Moreover, the 5D hyperchaotic system has been simulated using a specially designed electronic circuit and viewed on an oscilloscope, thereby confirming the results of the numerical integrations. Both Matlab and the oscilloscope outputs produce similar phase portraits. Such implementations in real time represent a new type of hidden attractor with important consequences for engineering applications.

  10. Search for dark matter in the hidden-photon sector with a large spherical mirror

    CERN Document Server

    Veberic, Darko; Doebrich, Babette; Engel, Ralph; Jaeckel, Joerg; Kowalski, Marek; Lindner, Axel; Mathes, Hermann-Josef; Redondo, Javier; Roth, Markus; Schaefer, Christoph; Ulrich, Ralf

    2015-01-01

    If dark matter consists of hidden-sector photons which kinetically mix with regular photons, a tiny oscillating electric-field component is present wherever we have dark matter. In the surface of conducting materials this induces a small probability to emit single photons almost perpendicular to the surface, with the corresponding photon frequency matching the mass of the hidden photons. We report on a construction of an experimental setup with a large ~14 m2 spherical metallic mirror that will allow for searches of hidden-photon dark matter in the eV and sub-eV range by application of different electromagnetic radiation detectors. We discuss sensitivity and accessible regions in the dark matter parameter space.

  11. Hidden ion population of the magnetosphere

    International Nuclear Information System (INIS)

    Olsen, R.C.

    1982-01-01

    Particle data from two geosynchronous satellites (Applied Technology Satellite 6 and SCATHA) show a normally hidden ion population appearing when the satellites are in the earth's shadow. Ion and electron data show the spacecraft potential dropping from +10 V in sunlight to +4 and +5 V in eclipse at local midnight, in low-energy (T/sub e/ -2 ), isotropic ion population appears which was invisible in sunlight because of the larger positive spacecraft potential. Higher-energy populations generally cover the tails of the hidden ion populations, so they cannot be inferred from daylight data. The isotropic populations appears only in a few percent of the spacecraft eclipse events, appearing only at times of low Kp (2 or less, preceded by a day with Σ Kp< or =20). A low-energy (T = 1--2 eV) field-aligned population often appears with and without the isotropic population, at slightly higher flux levels. These fluxes are visible in sunlight, but again the distribution functions obtained in eclipse differ from those that would be inferred from daylight data. Measurement of the thermal plasma population on a consistent basis, particularly in the plasma sheet, will require some method of controlling the detector potential with respect to the ambient plamsa

  12. ARSENIC REMOVAL FROM DRINKING WATER BY IRON REMOVAL. USEPA DEMONSTRATION PROJECT AT CLIMAX, MN. PROJECT SUMMARY

    Science.gov (United States)

    This document is an eight page summary of the final report on arsenic demonstration project at Climax, MN (EPA/600/R-06/152). The objectives of the project are to evaluate the effectiveness of the Kinetico iron removal system in removing arsenic to meet the new arsenic maximum co...

  13. Prediction of Annual Rainfall Pattern Using Hidden Markov Model ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Hidden Markov model is very influential in stochastic world because of its ... the earth from the clouds. The usual ... Rainfall modelling and ... Markov Models have become popular tools ... environment sciences, University of Jos, plateau state,.

  14. On the approximation by single hidden layer feedforward neural networks with fixed weights

    OpenAIRE

    Guliyev, Namig J.; Ismailov, Vugar E.

    2017-01-01

    International audience; Feedforward neural networks have wide applicability in various disciplines of science due to their universal approximation property. Some authors have shown that single hidden layer feedforward neural networks (SLFNs) with fixed weights still possess the universal approximation property provided that approximated functions are univariate. But this phenomenon does not lay any restrictions on the number of neurons in the hidden layer. The more this number, the more the p...

  15. On E(11) of M-theory: 1. Hidden Symmetries of Maximal Supergravities and Lego of Dynkin Diagrams

    International Nuclear Information System (INIS)

    Nurmagambetov, A.J.

    2007-01-01

    We review a graphical way of classifying hidden symmetry algebras and groups of D=11, 10 maximal supergravities in terms of Dynkin diagrams, the shapes of which are determined by the bosonic field content of supergravities supermultiplets. The approach we follow is tightly related to the West's conjecture on a hidden symmetry of M-theory, and we discuss benefits of the approach in compare to other ways of searching for hidden symmetries of String Theory

  16. "Hidden" tongue jewellery.

    LENUS (Irish Health Repository)

    McNamara, C M

    2001-06-01

    Tongue piercing has many associated risks. This is a case report of a patient who, to avoid parental disapproval, hid the dorsal aspect of a lingual stud device. Subsequently, the dorsum repaired. The device could no longer be removed manually and warranted surgical removal. Despite being in situ for over two years, no further complications arose, but all efforts to obtain patient agreement for removal of the device failed.

  17. Generalized inequalities for quantum correlations with hidden variables

    International Nuclear Information System (INIS)

    Vinduska, M.

    1991-01-01

    Renowned inequalities for quantum correlations are generalized for the case when quantum system cannot be described with an absolute independent measure of the probability. Such a formulation appears to be suitable for the formulation of the hidden variables theory in terms of non-Euclidean geometry. 10 refs

  18. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving ...

  19. Securing Localization With Hidden and Mobile Base Stations

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Srivastava, Mani; Cagalj, Mario

    2006-01-01

    localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure nodecentric...

  20. Optimisation of Hidden Markov Model using Baum–Welch algorithm ...

    Indian Academy of Sciences (India)

    The present work is a part of development of Hidden Markov Model. (HMM) based ... the Himalaya. In this work, HMMs have been developed for forecasting of maximum and minimum ..... data collection teams of Snow and Avalanche Study.

  1. Duality and hidden symmetries in interacting particle systems

    NARCIS (Netherlands)

    Giardinà, C.; Kurchan, J.; Redig, F.H.J.; Vafayi, K.

    2009-01-01

    In the context of Markov processes, both in discrete and continuous setting, we show a general relation between duality functions and symmetries of the generator. If the generator can be written in the form of a Hamiltonian of a quantum spin system, then the "hidden" symmetries are easily derived.

  2. Statistical identification with hidden Markov models of large order splitting strategies in an equity market

    Science.gov (United States)

    Vaglica, Gabriella; Lillo, Fabrizio; Mantegna, Rosario N.

    2010-07-01

    Large trades in a financial market are usually split into smaller parts and traded incrementally over extended periods of time. We address these large trades as hidden orders. In order to identify and characterize hidden orders, we fit hidden Markov models to the time series of the sign of the tick-by-tick inventory variation of market members of the Spanish Stock Exchange. Our methodology probabilistically detects trading sequences, which are characterized by a significant majority of buy or sell transactions. We interpret these patches of sequential buying or selling transactions as proxies of the traded hidden orders. We find that the time, volume and number of transaction size distributions of these patches are fat tailed. Long patches are characterized by a large fraction of market orders and a low participation rate, while short patches have a large fraction of limit orders and a high participation rate. We observe the existence of a buy-sell asymmetry in the number, average length, average fraction of market orders and average participation rate of the detected patches. The detected asymmetry is clearly dependent on the local market trend. We also compare the hidden Markov model patches with those obtained with the segmentation method used in Vaglica et al (2008 Phys. Rev. E 77 036110), and we conclude that the former ones can be interpreted as a partition of the latter ones.

  3. 77 FR 8253 - Notice of Proposed Settlement Agreement and Opportunity for Public Comment: Hidden Lane Landfill...

    Science.gov (United States)

    2012-02-14

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9631-3] Notice of Proposed Settlement Agreement and Opportunity for Public Comment: Hidden Lane Landfill Superfund Site ACTION: Notice. SUMMARY: In accordance... (``DOJ'') on behalf of EPA, in connection with the Hidden Lane Landfill Superfund Site, Sterling, Loudoun...

  4. Belief propagation and replicas for inference and learning in a kinetic Ising model with hidden spins

    International Nuclear Information System (INIS)

    Battistin, C; Roudi, Y; Hertz, J; Tyrcha, J

    2015-01-01

    We propose a new algorithm for inferring the state of hidden spins and reconstructing the connections in a synchronous kinetic Ising model, given the observed history. Focusing on the case in which the hidden spins are conditionally independent of each other given the state of observable spins, we show that calculating the likelihood of the data can be simplified by introducing a set of replicated auxiliary spins. Belief propagation (BP) and susceptibility propagation (SusP) can then be used to infer the states of hidden variables and to learn the couplings. We study the convergence and performance of this algorithm for networks with both Gaussian-distributed and binary bonds. We also study how the algorithm behaves as the fraction of hidden nodes and the amount of data are changed, showing that it outperforms the Thouless–Anderson–Palmer (TAP) equations for reconstructing the connections. (paper)

  5. Hidden Markov Model for quantitative prediction of snowfall

    Indian Academy of Sciences (India)

    A Hidden Markov Model (HMM) has been developed for prediction of quantitative snowfall in Pir-Panjal and Great Himalayan mountain ranges of Indian Himalaya. The model predicts snowfall for two days in advance using daily recorded nine meteorological variables of past 20 winters from 1992–2012. There are six ...

  6. Hidden Markov models applied to a subsequence of the Xylella fastidiosa genome

    Directory of Open Access Journals (Sweden)

    Silva Cibele Q. da

    2003-01-01

    Full Text Available Dependencies in DNA sequences are frequently modeled using Markov models. However, Markov chains cannot account for heterogeneity that may be present in different regions of the same DNA sequence. Hidden Markov models are more realistic than Markov models since they allow for the identification of heterogeneous regions of a DNA sequence. In this study we present an application of hidden Markov models to a subsequence of the Xylella fastidiosa DNA data. We found that a three-state model provides a good description for the data considered.

  7. A Multilayer Hidden Markov Models-Based Method for Human-Robot Interaction

    Directory of Open Access Journals (Sweden)

    Chongben Tao

    2013-01-01

    Full Text Available To achieve Human-Robot Interaction (HRI by using gestures, a continuous gesture recognition approach based on Multilayer Hidden Markov Models (MHMMs is proposed, which consists of two parts. One part is gesture spotting and segment module, the other part is continuous gesture recognition module. Firstly, a Kinect sensor is used to capture 3D acceleration and 3D angular velocity data of hand gestures. And then, a Feed-forward Neural Networks (FNNs and a threshold criterion are used for gesture spotting and segment, respectively. Afterwards, the segmented gesture signals are respectively preprocessed and vector symbolized by a sliding window and a K-means clustering method. Finally, symbolized data are sent into Lower Hidden Markov Models (LHMMs to identify individual gestures, and then, a Bayesian filter with sequential constraints among gestures in Upper Hidden Markov Models (UHMMs is used to correct recognition errors created in LHMMs. Five predefined gestures are used to interact with a Kinect mobile robot in experiments. The experimental results show that the proposed method not only has good effectiveness and accuracy, but also has favorable real-time performance.

  8. The use of an electric field for the removal of alum from treated wooden objects

    DEFF Research Database (Denmark)

    Christensen, Iben Vernegren; Ottosen, Lisbeth M.; Jensen, Poul

    2009-01-01

    In this paper the removal of sulfate and aluminum ions from waterlogged alum treated wood with the use of an applied electric field is in focus. Removal of alum is seen as the first step towards re-conservation of the wood with e.g. PEG. Alum treated wood samples from the Hjortspring finds (app....... 350 BC) was used in this investigation and a total of six experiments are presented here. An electric DC field was applied across the wood for 4-20 days. A constant current of 1-5 mA was applied and the corresponding voltage drop initially low, often below 10 V. At the end of the experiments sulfate...... has moved as expected towards the positively charged electrode (anode) and after 20 days only 10% of the sulfate was left in the wood. The majority of the sulfate was removed with the use of the electric field. It was shown that it is possible to apply the electric field and remove sulfate in both...

  9. How to Find a Hidden World at the Large Hadron Collider

    CERN Document Server

    Wells, James D.

    2008-01-01

    I discuss how the Large Hadron Collider era should broaden our view of particle physics research, and apply this thinking to the case of Hidden Worlds. I focus on one of the simplest representative cases of a Hidden World, and detail the rich implications it has for LHC physics, including universal suppression of Higgs boson production, trans-TeV heavy Higgs boson signatures, heavy-to-light Higgs boson decays, weakly coupled exotic gauge bosons, and Higgs boson decays to four fermions via light exotic gauge bosons. Some signatures may be accessible in the very early stages of collider operation, whereas others motivate a later high-lumonosity upgrade.

  10. Selection of hidden layer nodes in neural networks by statistical tests

    International Nuclear Information System (INIS)

    Ciftcioglu, Ozer

    1992-05-01

    A statistical methodology for selection of the number of hidden layer nodes in feedforward neural networks is described. The method considers the network as an empirical model for the experimental data set subject to pattern classification so that the selection process becomes a model estimation through parameter identification. The solution is performed for an overdetermined estimation problem for identification using nonlinear least squares minimization technique. The number of the hidden layer nodes is determined as result of hypothesis testing. Accordingly the redundant network structure with respect to the number of parameters is avoided and the classification error being kept to a minimum. (author). 11 refs.; 4 figs.; 1 tab

  11. On the production of hidden-flavored hadronic states at high energy

    Science.gov (United States)

    Wang, Wei

    2018-04-01

    I discuss the production mechanism of hidden-flavored hadrons at high energy. Using e+e‑ collisions and light-meson pair production in high energy exclusive processes, I demonstrate that hidden quark pairs do not necessarily participate in short-distance hard scattering. Implications are then explored in a few examples. Finally, I discuss the production mechanism of X(3872) in hadron collisions, where some misunderstandings have arisen in the literature. Supported by the Thousand Talents Plan for Young Professionals, National Natural Science Foundation of China (11575110, 11655002, 11735010, 11747611), Natural Science Foundation of Shanghai (15DZ2272100) and Scientific Research Foundation for Re- turned Overseas Chinese Scholars, Ministry of Education

  12. Minimal spontaneously broken hidden sector and its impact on Higgs boson physics at the CERN Large Hadron Collider

    International Nuclear Information System (INIS)

    Schabinger, Robert; Wells, James D.

    2005-01-01

    Little experimental data bears on the question of whether there is a spontaneously broken hidden sector that has no Standard Model quantum numbers. Here we discuss the prospects of finding evidence for such a hidden sector through renormalizable interactions of the Standard Model Higgs boson with a Higgs boson of the hidden sector. We find that the lightest Higgs boson in this scenario has smaller rates in standard detection channels, and it can have a sizeable invisible final state branching fraction. Details of the hidden sector determine whether the overall width of the lightest state is smaller or larger than the Standard Model width. We compute observable rates, total widths and invisible decay branching fractions within the general framework. We also introduce the 'A-Higgs Model', which corresponds to the limit of a hidden sector Higgs boson weakly mixing with the Standard Model Higgs boson. This model has only one free parameter in addition to the mass of the light Higgs state and it illustrates most of the generic phenomenology issues, thereby enabling it to be a good benchmark theory for collider searches. We end by presenting an analogous supersymmetry model with similar phenomenology, which involves hidden sector Higgs bosons interacting with MSSM Higgs bosons through D-terms

  13. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  14. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier, E-mail: redondo@mpp.mpg.de [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza, España (Spain)

    2015-07-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  15. Pentaquarks with hidden charm as hadroquarkonia

    Energy Technology Data Exchange (ETDEWEB)

    Eides, Michael I. [University of Kentucky, Department of Physics and Astronomy, Lexington, KY (United States); Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Petrov, Victor Yu. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Polyakov, Maxim V. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Ruhr-Universitaet Bochum, Institut fuer Theoretische Physik II, Bochum (Germany)

    2018-01-15

    We consider hidden charm pentaquarks as hadroquarkonium states in a QCD inspired approach. Pentaquarks arise naturally as bound states of quarkonia excitations and ordinary baryons. The LHCb P{sub c}(4450) pentaquark is interpreted as a ψ{sup '}-nucleon bound state with spin-parity J{sup P} = 3/2{sup -}. The partial decay width Γ(P{sub c}(4450) → J/ψ + N) ∼ 11 MeV is calculated and turned out to be in agreement with the experimental data for P{sub c}(4450). The P{sub c}(4450) pentaquark is predicted to be a member of one of the two almost degenerate hidden-charm baryon octets with spin-parities J{sup P} = 1/2{sup -}, 3/2{sup -}. The masses and decay widths of the octet pentaquarks are calculated. The widths are small and comparable with the width of the P{sub c}(4450) pentaquark, and the masses of the octet pentaquarks satisfy the Gell-Mann-Okubo relation. Interpretation of pentaquarks as loosely bound Σ{sub c} anti D* and Σ{sub c}{sup *} anti D* deuteronlike states is also considered. We determine quantum numbers of these bound states and calculate their masses in the one-pion exchange scenario. The hadroquarkonium and molecular approaches to exotic hadrons are compared and the relative advantages and drawbacks of each approach are discussed. (orig.)

  16. Pitfalls and recommendations in cases of laser removal of decorative tattoos with pigmented lesions: case report and review of the literature.

    Science.gov (United States)

    Pohl, Laura; Kaiser, Kathrine; Raulin, Christian

    2013-09-01

    Pigmented lesions in decorative tattoos cause diagnostic difficulties at a clinical and dermoscopic level. In cases of laser removal of tattoos, hidden suspicious nevi may be revealed gradually. We describe the first case of a malignant melanoma that developed on a preexisting nevus within a tattoo during and between the phases of laser removal. The patient refused to undergo excision of the nevus until we made excision conditional for continued laser treatment. The English literature reports 16 cases of malignant melanoma developing in tattoos. Correlation between the placement of tattoos and the development of malignant melanoma remains unclear. Our case emphasizes the diagnostic problems of pigmented lesions within tattoos. For safety reasons, tattoos should never be placed on pigmented lesions; if they are, the tattoos should not undergo laser treatment. We suggest an excision before starting laser tattoo removal. Dermoscopic assessments on a regular basis during the period of tattoo removal are recommended.

  17. Well-Being Impacts of Human-Elephant Conflict in Khumaga, Botswana: Exploring Visible and Hidden Dimensions

    Directory of Open Access Journals (Sweden)

    Allison L Mayberry

    2017-01-01

    Full Text Available High densities of wild African savannah elephants (Loxodonta africana combined with widespread human land-use have increased human-elephant conflict in northern Botswana. Visible impacts (e.g. crop/property damage, injury/fatality of elephants on human well-being are well documented in scholarly literature while hidden impacts (e.g. emotional stress, restricted mobility are less so. This research uses qualitative methods to explore human experiences with elephants and perceived impacts of elephants on human well-being. Findings reveal participants are concerned about food insecurity and associated visible impacts of elephant crop raids. Findings also reveal participants are concerned about reduced safety and restricted mobility as hidden impacts threatening livelihoods and everyday life. Both visible and hidden impacts of elephants contribute to people's negative feelings towards elephants, as does the broader political context. This research emphasises the importance of investigating both visible and hidden impacts of elephants on human well-being to foster holistic understanding of human-elephant conflict scenarios and to inform future mitigation strategies.

  18. Aero Engine Component Fault Diagnosis Using Multi-Hidden-Layer Extreme Learning Machine with Optimized Structure

    Directory of Open Access Journals (Sweden)

    Shan Pang

    2016-01-01

    Full Text Available A new aero gas turbine engine gas path component fault diagnosis method based on multi-hidden-layer extreme learning machine with optimized structure (OM-ELM was proposed. OM-ELM employs quantum-behaved particle swarm optimization to automatically obtain the optimal network structure according to both the root mean square error on training data set and the norm of output weights. The proposed method is applied to handwritten recognition data set and a gas turbine engine diagnostic application and is compared with basic ELM, multi-hidden-layer ELM, and two state-of-the-art deep learning algorithms: deep belief network and the stacked denoising autoencoder. Results show that, with optimized network structure, OM-ELM obtains better test accuracy in both applications and is more robust to sensor noise. Meanwhile it controls the model complexity and needs far less hidden nodes than multi-hidden-layer ELM, thus saving computer memory and making it more efficient to implement. All these advantages make our method an effective and reliable tool for engine component fault diagnosis tool.

  19. … To be hidden does not mean to be merely revealed – Part 2

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-12-01

    Full Text Available This text revisits the long-term project Hidden Curriculum (HC, initiated by Annette Krauss, that addresses unquestioned routines, hierarchies of knowledge and the role of the body in learning processes from the perspective of secondary/high school education (in the research on a hidden curriculum. The first part of this text (www.medienimpulse.at/articles/view/848 entailed a deeper analysis of educational studies on the phenomenon of hidden curriculum in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire and Jacques Rancière. The aim of the second part is to address academic canons and corporeality within educational settings and to investigate the physicality of everyday norms through revisiting the framework, results and processes of the collaborative research of the HC project with secondary/high school students.

  20. Job Clubs: Getting into the Hidden Labor Market.

    Science.gov (United States)

    Kimeldorf, Martin; Tornow, Janice A.

    1984-01-01

    A job club approach for secondary disabled youth focuses on mastering job seeking skills by behaviorally sequenced steps learned in situational experiences within a self-help group process framework. Students learn to penetrate the hidden job market, to use social networking via the telephone, and to participate successfully in job interviews. (CL)

  1. Spatial Region Estimation for Autonomous CoT Clustering Using Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Joon‐young Jung

    2018-02-01

    Full Text Available This paper proposes a hierarchical dual filtering (HDF algorithm to estimate the spatial region between a Cloud of Things (CoT gateway and an Internet of Things (IoT device. The accuracy of the spatial region estimation is important for autonomous CoT clustering. We conduct spatial region estimation using a hidden Markov model (HMM with a raw Bluetooth received signal strength indicator (RSSI. However, the accuracy of the region estimation using the validation data is only 53.8%. To increase the accuracy of the spatial region estimation, the HDF algorithm removes the high‐frequency signals hierarchically, and alters the parameters according to whether the IoT device moves. The accuracy of spatial region estimation using a raw RSSI, Kalman filter, and HDF are compared to evaluate the effectiveness of the HDF algorithm. The success rate and root mean square error (RMSE of all regions are 0.538, 0.622, and 0.75, and 0.997, 0.812, and 0.5 when raw RSSI, a Kalman filter, and HDF are used, respectively. The HDF algorithm attains the best results in terms of the success rate and RMSE of spatial region estimation using HMM.

  2. Hidden Markov models and other machine learning approaches in computational molecular biology

    Energy Technology Data Exchange (ETDEWEB)

    Baldi, P. [California Inst. of Tech., Pasadena, CA (United States)

    1995-12-31

    This tutorial was one of eight tutorials selected to be presented at the Third International Conference on Intelligent Systems for Molecular Biology which was held in the United Kingdom from July 16 to 19, 1995. Computational tools are increasingly needed to process the massive amounts of data, to organize and classify sequences, to detect weak similarities, to separate coding from non-coding regions, and reconstruct the underlying evolutionary history. The fundamental problem in machine learning is the same as in scientific reasoning in general, as well as statistical modeling: to come up with a good model for the data. In this tutorial four classes of models are reviewed. They are: Hidden Markov models; artificial Neural Networks; Belief Networks; and Stochastic Grammars. When dealing with DNA and protein primary sequences, Hidden Markov models are one of the most flexible and powerful alignments and data base searches. In this tutorial, attention is focused on the theory of Hidden Markov Models, and how to apply them to problems in molecular biology.

  3. Quasiparticle scattering image in hidden order phases and chiral superconductors

    Energy Technology Data Exchange (ETDEWEB)

    Thalmeier, Peter [Max Planck Institute for Chemical Physics of Solids, 01187 Dresden (Germany); Akbari, Alireza, E-mail: alireza@apctp.org [Asia Pacific Center for Theoretical Physics, Pohang, Gyeongbuk 790-784 (Korea, Republic of); Department of Physics, and Max Planck POSTECH Center for Complex Phase Materials, POSTECH, Pohang 790-784 (Korea, Republic of)

    2016-02-15

    The technique of Bogoliubov quasiparticle interference (QPI) has been successfully used to investigate the symmetry of unconventional superconducting gaps, also in heavy fermion compounds. It was demonstrated that QPI can distinguish between the d-wave singlet candidates in CeCoIn{sub 5}. In URu{sub 2}Si{sub 2} presumably a chiral d-wave singlet superconducting (SC) state exists inside a multipolar hidden order (HO) phase. We show that hidden order leaves an imprint on the symmetry of QPI pattern that may be used to determine the essential question whether HO in URu{sub 2}Si{sub 2} breaks the in-plane rotational symmetry or not. We also demonstrate that the chiral d-wave SC gap leads to a crossover to a quasi-2D QPI spectrum below T{sub c} which sharpens the HO features. Furthermore we investigate the QPI image of chiral p-wave multigap superconductor Sr{sub 2}RuO{sub 4}. - Highlights: • The chiral multigap structure of Sr{sub 2}RuO{sub 4} leads to rotation of QPI spectrum with bias voltage. • 5f band reconstruction in hidden order phase of URu{sub 2}Si{sub 2} is obtained from two orbital model. • The chiral superconductivity in URu{sub 2}Si{sub 2} leads to quasi-2D quasiparticle interference (QPI).

  4. Heavy superpartners with less tuning from hidden sector renormalisation

    International Nuclear Information System (INIS)

    Hardy, Edward

    2014-01-01

    In supersymmetric extensions of the Standard Model, superpartner masses consistent with collider bounds typically introduce significant tuning of the electroweak scale. We show that hidden sector renormalisation can greatly reduce such a tuning if the supersymmetry breaking, or mediating, sector runs through a region of strong coupling not far from the weak scale. In the simplest models, only the tuning due to the gaugino masses is improved, and a weak scale gluino mass in the region of 5 TeV may be obtained with an associated tuning of only one part in ten. In models with more complex couplings between the visible and hidden sectors, the tuning with respect to sfermions can also be reduced. We give an example of a model, with low scale gauge mediation and superpartner masses allowed by current LHC bounds, that has an overall tuning of one part in twenty

  5. Using hidden Markov models to align multiple sequences.

    Science.gov (United States)

    Mount, David W

    2009-07-01

    A hidden Markov model (HMM) is a probabilistic model of a multiple sequence alignment (msa) of proteins. In the model, each column of symbols in the alignment is represented by a frequency distribution of the symbols (called a "state"), and insertions and deletions are represented by other states. One moves through the model along a particular path from state to state in a Markov chain (i.e., random choice of next move), trying to match a given sequence. The next matching symbol is chosen from each state, recording its probability (frequency) and also the probability of going to that state from a previous one (the transition probability). State and transition probabilities are multiplied to obtain a probability of the given sequence. The hidden nature of the HMM is due to the lack of information about the value of a specific state, which is instead represented by a probability distribution over all possible values. This article discusses the advantages and disadvantages of HMMs in msa and presents algorithms for calculating an HMM and the conditions for producing the best HMM.

  6. A Fast SVD-Hidden-nodes based Extreme Learning Machine for Large-Scale Data Analytics.

    Science.gov (United States)

    Deng, Wan-Yu; Bai, Zuo; Huang, Guang-Bin; Zheng, Qing-Hua

    2016-05-01

    Big dimensional data is a growing trend that is emerging in many real world contexts, extending from web mining, gene expression analysis, protein-protein interaction to high-frequency financial data. Nowadays, there is a growing consensus that the increasing dimensionality poses impeding effects on the performances of classifiers, which is termed as the "peaking phenomenon" in the field of machine intelligence. To address the issue, dimensionality reduction is commonly employed as a preprocessing step on the Big dimensional data before building the classifiers. In this paper, we propose an Extreme Learning Machine (ELM) approach for large-scale data analytic. In contrast to existing approaches, we embed hidden nodes that are designed using singular value decomposition (SVD) into the classical ELM. These SVD nodes in the hidden layer are shown to capture the underlying characteristics of the Big dimensional data well, exhibiting excellent generalization performances. The drawback of using SVD on the entire dataset, however, is the high computational complexity involved. To address this, a fast divide and conquer approximation scheme is introduced to maintain computational tractability on high volume data. The resultant algorithm proposed is labeled here as Fast Singular Value Decomposition-Hidden-nodes based Extreme Learning Machine or FSVD-H-ELM in short. In FSVD-H-ELM, instead of identifying the SVD hidden nodes directly from the entire dataset, SVD hidden nodes are derived from multiple random subsets of data sampled from the original dataset. Comprehensive experiments and comparisons are conducted to assess the FSVD-H-ELM against other state-of-the-art algorithms. The results obtained demonstrated the superior generalization performance and efficiency of the FSVD-H-ELM. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. TeraHertz imaging of hidden paint layers on canvas

    NARCIS (Netherlands)

    Adam, A.J.L.; Planken, P.C.M.; Meloni, S.; Dik, J.

    2009-01-01

    We show terahertz reflection images of hidden paint layers in a painting on canvas and compare the results with X-ray Radiography and Infrared Reflectography. Our terahertz measurements show strong reflections from both the canvas/paint interface and from the raw umber/lead white interface,

  8. Book review: Troubling possibility, hidden fires and secret drawers ...

    African Journals Online (AJOL)

    Book review: Troubling possibility, hidden fires and secret drawers: Tiyambe Zeleza's smouldering charcoal. H.F. Ross. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL.

  9. Hidden flows and waste processing--an analysis of illustrative futures.

    Science.gov (United States)

    Schiller, F; Raffield, T; Angus, A; Herben, M; Young, P J; Longhurst, P J; Pollard, S J T

    2010-12-14

    An existing materials flow model is adapted (using Excel and AMBER model platforms) to account for waste and hidden material flows within a domestic environment. Supported by national waste data, the implications of legislative change, domestic resource depletion and waste technology advances are explored. The revised methodology offers additional functionality for economic parameters that influence waste generation and disposal. We explore this accounting system under hypothetical future waste and resource management scenarios, illustrating the utility of the model. A sensitivity analysis confirms that imports, domestic extraction and their associated hidden flows impact mostly on waste generation. The model offers enhanced utility for policy and decision makers with regard to economic mass balance and strategic waste flows, and may promote further discussion about waste technology choice in the context of reducing carbon budgets.

  10. Hidden histories: challenges for pedagogy and participation

    OpenAIRE

    Morrice, Linda

    2013-01-01

    Higher Education has become and an increasingly diverse and globalised system in which the binaries between ‘traditional’ and ‘non-traditional’ students, exclusion and inclusion have less resonance and analytical purchase. Drawing on research with refugees Linda will suggest that higher education can be marked simultaneously by belonging and recognition, deficit and exclusion. Complex differences and inequalities remain hidden and unspoken, raising new questions and challenges for pedagogy an...

  11. Costs of Quality: Exploratory Analysis of Hidden Elements and Prioritization using Analytic Hierarchy Process

    Directory of Open Access Journals (Sweden)

    Sailaja A

    2015-02-01

    Full Text Available Cost of Quality analysis is emerged as an effective tool for the industrial managers for pinpointing the deficiencies in the system as well as for identifying the improvement areas by highlighting the cost reduction opportunities. However , this analysis will be fully effective only if it is further extended to identify the cost incurred in ensuring quality in all areas of the supply chain including the hidden costs and costs of missed out opportunities. Most of the hidden elements of quality costs are difficult to track and not accounted by the traditional accounting tools. An exploratory analysis is made in this research to identify the hidden elements of quality costs in manufacturing industry. Further, the identified cost elements are classified into various groups for better analysis and, finally, prioritized to identify the vital few among them. Analytic Hierarchy Process (AHP technique which is one of the most popular Multi Criteria Decision Method (MCDM and Pareto analysis were used in this study for prioritizing the hidden quality cost elements based on their degree of impact on overall cost of quality. By this analysis, the key cost elements which are to be addressed to reduce the overall cost of quality are identified.

  12. INSCY

    DEFF Research Database (Denmark)

    Assent, Ira; Krieger, Ralph; Müller, Emmanuel

    2008-01-01

    Clustering is an established data mining technique for grouping objects based on mutual similarity. In high-dimensional spaces, clusters are typically hidden in the scatter of irrelevant attributes. To detect these hidden clusters, subspace clustering focuses on relevant attribute projections...... for each individual cluster. As the number of possible projections is exponential in the number of dimensions, efficiency is crucial for these high-dimensional settings. Moreover, the resulting subspace clusters are often highly redundant, i.e. many clusters are detected multiply in several projections....... Containing essentially the same information, redundant subspace clusters have to be removed to allow users to review the entire output. In addition, removal of low-dimensional redundancy actually improves quality. In this work we propose a novel index structure for efficient subspace clustering with in...

  13. THE EFFICIENCY OF YARN WOUND FILTERS IN GIARDIA CYSTS REMOVAL USING THE IMPROVED SUCROSE GRADIENT

    Directory of Open Access Journals (Sweden)

    M.R SHAH MANSOURI

    2001-09-01

    Full Text Available Introduction. The protozoan parasite Giardia is one of the important biological cotaminants in water. lts presence in water has caused the outbreak of a number of epidemics in various part of the world including the United States. The major impediment in detecting this particular parasite is unavailability of suitable filters capable of removing it from water. Regarding the fact yarn wound filters (cartridge used in removing Giardia under laboratory condition are currently difficult to obtain in Iran, attempts were made to design and manufacture the filters according to standards recommended in the literature. Methods. To determine the efficiency of filters manufactured in this way, a pilot system was established and parameters of concern were investigated. A given number of cysts were introduced in each case to the water in the pilot tank after being counted on the hemocytometer lamella After the entire tank water (at least 4001had been pumped through the filters, the filter were removed from the pilot system to have their yarns separated and washed. The cysts recovered were then counted and compared with the original input cysts to determine the efficiency of the filters. Formation of sediments on filters due to suspended solids in water was a great impediment in counting the cysts hidden in the sediments. To overcome this difficulty, the method of floatation in sucrose was used to remove the hidden cysts from the sediments. Regarding the morphological characteristics of the cysts, the method was also studied in terms of the sucrose film concentration and the effects of centrifugal speed and duration on the removal of cysts from sediments. Results. The results indicated an efficiency of 80.69±5.85, which was ideal for a first experience in Iran. a level of 2.5 molar of Sucrose with a duration of 10 minutes for the centrifugation time at 2,000 rpm were considered to be optimum levels to yield a certainty of 95 percent and an efficiency of

  14. A scheme of hidden-structure attribute-based encryption with multiple authorities

    Science.gov (United States)

    Ling, J.; Weng, A. X.

    2018-05-01

    In the most of the CP-ABE schemes with hidden access structure, both all the user attributes and the key generation are managed by only one authority. The key generation efficiency will decrease as the number of user increases, and the data will encounter security issues as the only authority is attacked. We proposed a scheme of hidden-structure attribute-based encryption with multiple authorities, which introduces multiple semi-trusted attribute authorities, avoiding the threat even though one or more authorities are attacked. We also realized user revocation by managing a revocation list. Based on DBDH assumption, we proved that our scheme is of IND-CMA security. The analysis shows that our scheme improves the key generation efficiency.

  15. A Stochastic Flows Approach for Asset Allocation with Hidden Economic Environment

    Directory of Open Access Journals (Sweden)

    Tak Kuen Siu

    2015-01-01

    Full Text Available An optimal asset allocation problem for a quite general class of utility functions is discussed in a simple two-state Markovian regime-switching model, where the appreciation rate of a risky share changes over time according to the state of a hidden economy. As usual, standard filtering theory is used to transform a financial model with hidden information into one with complete information, where a martingale approach is applied to discuss the optimal asset allocation problem. Using a martingale representation coupled with stochastic flows of diffeomorphisms for the filtering equation, the integrand in the martingale representation is identified which gives rise to an optimal portfolio strategy under some differentiability conditions.

  16. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  17. The hidden costs of nuclear power

    International Nuclear Information System (INIS)

    Keough, C.

    1981-01-01

    The two basic hidden costs of nuclear power are public money and public health. Nuclear power appears to be economical because many of the costs of producins electricity in these plants are paid by the federal government. So, like it or not, the citizens are footing the bill with their taxes. Design and development of plants have been paid for with public money, and disposal and cleanup costs will also be paid in this manner. The economic and health costs associated with nuclear accidents are staggering

  18. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  19. Einstein-Bohr controversy and theory of hidden variables

    Czech Academy of Sciences Publication Activity Database

    Lokajíček, Miloš V.

    2010-01-01

    Roč. 8, č. 4 (2010), s. 638-645 ISSN 1303-5150 R&D Projects: GA MŠk LA08015 Institutional research plan: CEZ:AV0Z10100502 Keywords : Schroedinger equation * EPR paradox * hidden variables Subject RIV: BF - Elementary Particles and High Energy Physics Impact factor: 0.697, year: 2010 http://arxiv.org/abs/1004.3005

  20. Hidden symmetries of the Principal Chiral Model unveiled

    International Nuclear Information System (INIS)

    Devchand, C.; Schiff, J.

    1996-12-01

    By relating the two-dimensional U(N) Principal Chiral Model to a Simple linear system we obtain a free-field parametrization of solutions. Obvious symmetry transformations on the free-field data give symmetries of the model. In this way all known 'hidden symmetries' and Baecklund transformations, as well as a host of new symmetries, arise. (author). 21 refs

  1. PERSONAL NETWORK SAMPLING, OUTDEGREE ANALYSIS AND MULTILEVEL ANALYSIS - INTRODUCING THE NETWORK CONCEPT IN STUDIES OF HIDDEN POPULATIONS

    NARCIS (Netherlands)

    SPREEN, M; ZWAAGSTRA, R

    1994-01-01

    Populations, such as heroin and cocaine users, the homeless and the like (hidden populations), are among the most difficult populations to which to apply classic random sampling procedures. A frequently used data collection method for these hidden populations is the snowball procedure. The

  2. Sodium removal, storage, and requalification of components

    International Nuclear Information System (INIS)

    Gallegos, A.; Shimazaki, T.; Oliva, R.M.

    1974-01-01

    The objectives of this program are to devise, develop, test, and evaluate techniques for sodium removal and storage of test specimens and components, and to expand and refine, by test and analysis, the sodium removal and storage techniques and procedures for use in processing typical LMFBR components

  3. Optimisation of Hidden Markov Model using Baum–Welch algorithm

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 126; Issue 1. Optimisation of Hidden Markov Model using Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya. J C Joshi Tankeshwar Kumar Sunita Srivastava Divya Sachdeva. Volume 126 Issue 1 February 2017 ...

  4. Real-time classification of humans versus animals using profiling sensors and hidden Markov tree model

    Science.gov (United States)

    Hossen, Jakir; Jacobs, Eddie L.; Chari, Srikant

    2015-07-01

    Linear pyroelectric array sensors have enabled useful classifications of objects such as humans and animals to be performed with relatively low-cost hardware in border and perimeter security applications. Ongoing research has sought to improve the performance of these sensors through signal processing algorithms. In the research presented here, we introduce the use of hidden Markov tree (HMT) models for object recognition in images generated by linear pyroelectric sensors. HMTs are trained to statistically model the wavelet features of individual objects through an expectation-maximization learning process. Human versus animal classification for a test object is made by evaluating its wavelet features against the trained HMTs using the maximum-likelihood criterion. The classification performance of this approach is compared to two other techniques; a texture, shape, and spectral component features (TSSF) based classifier and a speeded-up robust feature (SURF) classifier. The evaluation indicates that among the three techniques, the wavelet-based HMT model works well, is robust, and has improved classification performance compared to a SURF-based algorithm in equivalent computation time. When compared to the TSSF-based classifier, the HMT model has a slightly degraded performance but almost an order of magnitude improvement in computation time enabling real-time implementation.

  5. Addressing the hidden curriculum in the clinical workplace: A practical tool for trainees and faculty.

    Science.gov (United States)

    Mulder, Hanneke; Ter Braak, Edith; Chen, H Carrie; Ten Cate, Olle

    2018-02-28

    The hidden curriculum, commonly described in negative terms, is considered highly influential in medical education, especially in the clinical workplace. Structured approaches to address it are limited in number and scope. This paper presents a practical, value-neutral method called REVIEW (Reflecting & Evaluating Values Implicit in Education in the Workplace), to facilitate reflection and discussion on the hidden curriculum by faculty members and trainees. REVIEW approaches the hidden curriculum as a reflection of the professional microculture of a clinical team. This microculture results from collective problem solving and mutual negotiation when facing different, often conflicting, demands and interests, and their underlying values in daily clinical practice. Using this nonjudgmental conceptual framework, REVIEW employs a series of 50 culture statements that must be prioritized using Q-sort methodology, reflecting how the culture in a particular clinical context (e.g. ward or department) is perceived by faculty members and trainees. This procedure can be done individually or in groups. Most important is the resulting team discussion after the exercise - a discussion about perceptions of actual team culture and the culture desired by the team. Our early experiences suggest that REVIEW can be a useful tool for addressing the hidden curriculum.

  6. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  7. Human analog tests of the sixth stage of object permanence.

    Science.gov (United States)

    Heishman, M; Conant, M; Pasnak, R

    1995-06-01

    Two adult cats were tested on multiple invisible displacement. A dowel was established as a secondary reinforcer and hidden in a manner similar to that used to assess the culmination of sensorimotor intelligence in human infants. Three other cats were tested on single invisible displacement, a simpler version of the task. For human infants, this task is used to assess the beginning of mental representation in the sixth and last stage of sensorimotor intelligence. The cats' searches on these tasks were consistent with representation of an unsensed object and fully developed sensorimotor intelligence.

  8. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  9. On the significance of bell's inequality for hidden-variable theories

    International Nuclear Information System (INIS)

    De Baere, W.

    1984-01-01

    It is explicitly shown that Bell's derivation of the generalized Bell inequality and its subsequent interpretation depend on an implicit hypothesis concerning the reproducibility of some set of hidden variables in different runs of the same experiment

  10. Risk from the frontlines of a hidden epidemic sexuality, masculinities ...

    African Journals Online (AJOL)

    Risk from the frontlines of a hidden epidemic sexuality, masculinities and social pressures ... It frames risk in the context of the dynamics governing sexuality, underlined ... MSM risk and practice, in these contexts, are consequently shaped by ...

  11. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  12. A PDP model of the simultaneous perception of multiple objects

    Science.gov (United States)

    Henderson, Cynthia M.; McClelland, James L.

    2011-06-01

    Illusory conjunctions in normal and simultanagnosic subjects are two instances where the visual features of multiple objects are incorrectly 'bound' together. A connectionist model explores how multiple objects could be perceived correctly in normal subjects given sufficient time, but could give rise to illusory conjunctions with damage or time pressure. In this model, perception of two objects benefits from lateral connections between hidden layers modelling aspects of the ventral and dorsal visual pathways. As with simultanagnosia, simulations of dorsal lesions impair multi-object recognition. In contrast, a large ventral lesion has minimal effect on dorsal functioning, akin to dissociations between simple object manipulation (retained in visual form agnosia and semantic dementia) and object discrimination (impaired in these disorders) [Hodges, J.R., Bozeat, S., Lambon Ralph, M.A., Patterson, K., and Spatt, J. (2000), 'The Role of Conceptual Knowledge: Evidence from Semantic Dementia', Brain, 123, 1913-1925; Milner, A.D., and Goodale, M.A. (2006), The Visual Brain in Action (2nd ed.), New York: Oxford]. It is hoped that the functioning of this model might suggest potential processes underlying dorsal and ventral contributions to the correct perception of multiple objects.

  13. The Global Hidden Hunger Indices and Maps: An Advocacy Tool for Action

    Science.gov (United States)

    Muthayya, Sumithra; Rah, Jee Hyun; Sugimoto, Jonathan D.; Roos, Franz F.; Kraemer, Klaus; Black, Robert E.

    2013-01-01

    The unified global efforts to mitigate the high burden of vitamin and mineral deficiency, known as hidden hunger, in populations around the world are crucial to the achievement of most of the Millennium Development Goals (MDGs). We developed indices and maps of global hidden hunger to help prioritize program assistance, and to serve as an evidence-based global advocacy tool. Two types of hidden hunger indices and maps were created based on i) national prevalence data on stunting, anemia due to iron deficiency, and low serum retinol levels among preschool-aged children in 149 countries; and ii) estimates of Disability Adjusted Life Years (DALYs) attributed to micronutrient deficiencies in 136 countries. A number of countries in sub-Saharan Africa, as well as India and Afghanistan, had an alarmingly high level of hidden hunger, with stunting, iron deficiency anemia, and vitamin A deficiency all being highly prevalent. The total DALY rates per 100,000 population, attributed to micronutrient deficiencies, were generally the highest in sub-Saharan African countries. In 36 countries, home to 90% of the world’s stunted children, deficiencies of micronutrients were responsible for 1.5-12% of the total DALYs. The pattern and magnitude of iodine deficiency did not conform to that of other micronutrients. The greatest proportions of children with iodine deficiency were in the Eastern Mediterranean (46.6%), European (44.2%), and African (40.4%) regions. The current indices and maps provide crucial data to optimize the prioritization of program assistance addressing global multiple micronutrient deficiencies. Moreover, the indices and maps serve as a useful advocacy tool in the call for increased commitments to scale up effective nutrition interventions. PMID:23776712

  14. The global hidden hunger indices and maps: an advocacy tool for action.

    Science.gov (United States)

    Muthayya, Sumithra; Rah, Jee Hyun; Sugimoto, Jonathan D; Roos, Franz F; Kraemer, Klaus; Black, Robert E

    2013-01-01

    The unified global efforts to mitigate the high burden of vitamin and mineral deficiency, known as hidden hunger, in populations around the world are crucial to the achievement of most of the Millennium Development Goals (MDGs). We developed indices and maps of global hidden hunger to help prioritize program assistance, and to serve as an evidence-based global advocacy tool. Two types of hidden hunger indices and maps were created based on i) national prevalence data on stunting, anemia due to iron deficiency, and low serum retinol levels among preschool-aged children in 149 countries; and ii) estimates of Disability Adjusted Life Years (DALYs) attributed to micronutrient deficiencies in 136 countries. A number of countries in sub-Saharan Africa, as well as India and Afghanistan, had an alarmingly high level of hidden hunger, with stunting, iron deficiency anemia, and vitamin A deficiency all being highly prevalent. The total DALY rates per 100,000 population, attributed to micronutrient deficiencies, were generally the highest in sub-Saharan African countries. In 36 countries, home to 90% of the world's stunted children, deficiencies of micronutrients were responsible for 1.5-12% of the total DALYs. The pattern and magnitude of iodine deficiency did not conform to that of other micronutrients. The greatest proportions of children with iodine deficiency were in the Eastern Mediterranean (46.6%), European (44.2%), and African (40.4%) regions. The current indices and maps provide crucial data to optimize the prioritization of program assistance addressing global multiple micronutrient deficiencies. Moreover, the indices and maps serve as a useful advocacy tool in the call for increased commitments to scale up effective nutrition interventions.

  15. First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB

    Energy Technology Data Exchange (ETDEWEB)

    Aguilar-Arevalo, A.; Amidei, D.; Bertou, X.; Butner, M.; Cancelo, G.; Castañeda Vázquez, A.; Cervantes Vergara, B. A.; Chavarria, A. E.; Chavez, C. R.; de Mello Neto, J. R. T.; D’Olivo, J. C.; Estrada, J.; Fernandez Moroni, G.; Gaïor, R.; Guardincerri, Y.; Hernández Torres, K. P.; Izraelevitch, F.; Kavner, A.; Kilminster, B.; Lawson, I.; Letessier-Selvon, A.; Liao, J.; Matalon, A.; Mello, V. B. B.; Molina, J.; Privitera, P.; Ramanathan, K.; Sarkis, Y.; Schwarz, T.; Settimo, M.; Sofo Haro, M.; Thomas, R.; Tiffenberg, J.; Tiouchichine, E.; Torres Machado, D.; Trillaud, F.; You, X.; Zhou, J.

    2017-04-05

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30 eV$c^{-2}$ with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter $\\kappa$ is competitive with constraints from solar emission, reaching a minimum value of 2.2$\\times$$10^{-14}$ at 17 eV$c^{-2}$. These results are the most stringent direct detection constraints on hidden-photon dark matter with masses 3-12 eV$c^{-2}$ and the first demonstration of direct experimental sensitivity to ionization signals $<$12 eV from dark matter interactions.

  16. Crisis Entrepreneurs and Hidden Crises : Illustrative Examples of Interactional

    NARCIS (Netherlands)

    Prof. Cees van Woerkum; dr. Annette Klarenbeek

    2012-01-01

    We examine the ways in which a hidden crisis can be exposed from a communication point of view. In which way can organisations create general awareness of a crisis and try to understand the dynamic nature of interactions? With the help of discourse analysis, we have examined the interactional

  17. Hidden Markov model for improved ultrasound-based presence detection

    NARCIS (Netherlands)

    Jaramillo Garcia, P.A.; Linnartz, J.P.M.G.

    2015-01-01

    Adaptive lighting systems typically use a presence detector to save energy by switching off lights in unoccupied rooms. However, it is highly annoying when lights are erroneously turned off while a user is present (false negative, FN). This paper focuses on the estimation of presence, using a Hidden

  18. The role of food and nutrition system approaches in tackling hidden hunger.

    Science.gov (United States)

    Burchi, Francesco; Fanzo, Jessica; Frison, Emile

    2011-02-01

    One of the World's greatest challenges is to secure sufficient and healthy food for all, and to do so in an environmentally sustainable manner. This review explores the interrelationships of food, health, and environment, and their role in addressing chronic micronutrient deficiencies, also known as "hidden hunger", affecting over two billion people worldwide. While the complexity and underlying determinants of undernutrition have been well-understood for decades, the scaling of food and nutrition system approaches that combine sustainable agriculture aimed at improved diet diversity and livelihoods have been limited in their development and implementation. However, an integrated system approach to reduce hidden hunger could potentially serve as a sustainable opportunity.

  19. Smoothing tautologies, hidden dynamics, and sigmoid asymptotics for piecewise smooth systems

    Science.gov (United States)

    Jeffrey, Mike R.

    2015-10-01

    Switches in real systems take many forms, such as impacts, electronic relays, mitosis, and the implementation of decisions or control strategies. To understand what is lost, and what can be retained, when we model a switch as an instantaneous event, requires a consideration of so-called hidden terms. These are asymptotically vanishing outside the switch, but can be encoded in the form of nonlinear switching terms. A general expression for the switch can be developed in the form of a series of sigmoid functions. We review the key steps in extending Filippov's method of sliding modes to such systems. We show how even slight nonlinear effects can hugely alter the behaviour of an electronic control circuit, and lead to "hidden" attractors inside the switching surface.

  20. Light hidden-sector U(1)s in string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-15

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  1. Light hidden-sector U(1)s in string compactifications

    International Nuclear Information System (INIS)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-01

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  2. Test Plan for the overburden removal demonstration

    International Nuclear Information System (INIS)

    Rice, P.; Thompson, D.; Winberg, M.; Skaggs, J.

    1993-06-01

    The removal of soil overburdens from contaminated pits and trenches involves using equipment that will remove a small layer of soil from 3 to 6 in. at any time. As a layer of soil is removed, overburden characterization techniques perform surveys to a depth that exceeds each overburden removal layer to ensure that the removed soil will be free of contamination. It is generally expected that no contamination will be found in the soil overburden, which was brought in after the waste was put in place. It is anticipated that some containers in the waste zone have lost their integrity, and the waste leakage from those containers has migrated by gravity downward into the waste zone. To maintain a safe work environment, this method of overburden removal should allow safe preparation of a pit or trench for final remediation. To demonstrate the soil overburden techniques, the Buried Waste Integrated Demonstration Program has contracted vendor services to provide equipment and techniques demonstrating soil overburden removal technology. The demonstration will include tests that will evaluate equipment performance and techniques for removal of overburden soil, control of contamination spread, and dust control. To evaluate the performance of these techniques, air particulate samples, physical measurements of the excavation soil cuts, maneuverability measurements, and time versus volume (rate) of soil removal data will be collected during removal operations. To provide a medium for sample evaluation, the overburden will be spiked at specific locations and depths with rare earth tracers. This test plan will be describe the objectives of the demonstration, data quality objectives, methods to be used to operate the equipment and use the techniques in the test area, and methods to be used in collecting data during the demonstration

  3. Results from the solar hidden photon search (SHIPS)

    International Nuclear Information System (INIS)

    Schwarz, Matthias; Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Guenter; Redondo, Javier

    2015-02-01

    We present the results of a search for transversely polarised hidden photons (HPs) with ∝3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon<->HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m 2 at the 95%C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  4. Results from the Solar Hidden Photon Search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Günter [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany); Knabbe, Ernst-Axel; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Redondo, Javier, E-mail: mschwarz@hs.uni-hamburg.de, E-mail: ernst-axel.knabbe@desy.de, E-mail: Axel-lindner@desy.de, E-mail: jredondo@unizar.es, E-mail: Andreas.Ringwald@desy.de, E-mail: mschneide@hs.uni-hamburg.de, E-mail: jsusol@hs.uni-hamburg.de, E-mail: gwiedemann@hs.uni-hamburg.de [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza (Spain)

    2015-08-01

    We present the results of a search for transversely polarised hidden photons (HPs) with ∼ 3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon ↔ HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95% C.L . Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  5. Results from the solar hidden photon search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Knabbe, Ernst-Axel; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Zaragoza Univ. (Spain). Dept. de Fisica Teorica; Max-Planck-Institut fuer Physik, Muenchen (Germany)

    2015-02-15

    We present the results of a search for transversely polarised hidden photons (HPs) with ∝3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon<->HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95%C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  6. Results from the Solar Hidden Photon Search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany); Knabbe, Ernst-Axel; Lindner, Axel [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik (Werner-Heisenberg-Institut), Föhringer Ring 6, D-80805 München (Germany); Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Günter [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany)

    2015-08-07

    We present the results of a search for transversely polarised hidden photons (HPs) with ∼3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon ↔ HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95% C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  7. Completing Quantum Mechanics with Quantized Hidden Variables

    OpenAIRE

    van Enk, S. J.

    2015-01-01

    I explore the possibility that a quantum system S may be described completely by the combination of its standard quantum state $|\\psi\\rangle$ and a (hidden) quantum state $|\\phi\\rangle$ (that lives in the same Hilbert space), such that the outcome of any standard projective measurement on the system S is determined once the two quantum states are specified. I construct an algorithm that retrieves the standard quantum-mechanical probabilities, which depend only on $|\\psi\\rangle$, by assuming t...

  8. A simple approach for the sonochemical loading of Au, Ag and Pd nanoparticle on functionalized MWCNT and subsequent dispersion studies for removal of organic dyes: Artificial neural network and response surface methodology studies.

    Science.gov (United States)

    Moghaddari, Mitra; Yousefi, Fakhri; Ghaedi, Mehrorang; Dashtian, Kheibar

    2018-04-01

    In this study, the artificial neural network (ANN) and response surface methodology (RSM) based on central composite design (CCD) were applied for modeling and optimization of the simultaneous ultrasound-assisted removal of quinoline yellow (QY) and eosin B (EB). The MWCNT-NH 2 and its composites were prepared by sonochemistry method and characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD) and energy dispersive spectroscopy (EDS) analysis's. Initial dyes concentrations, adsorbent mass, sonication time and pH contribution on QY and EB removal percentage were investigated by CCD and replication of experiments at conditions suggested by model has results which statistically are close to experimented data. The ultrasound irradiation is associated with raising mass transfer of process so that small amount of the adsorbent (0.025 g) is able to remove high percentage (88.00% and 91.00%) of QY and EB, respectively in short time (6.0 min) at pH = 6. Analysis of experimental data by conventional models is good indication of Langmuir efficiency for fitting and explanation of experimented data. The ANN based on the Levenberg-Marquardt algorithm (LMA) combined of linear transfer function at output layer and tangent sigmoid transfer function at hidden layer with 20 hidden neurons supply best operation conditions for good prediction of adsorption data. Accurate and efficient artificial neural network was obtained by changing the number of neurons in the hidden layer, while data was divided into training, test and validation sets which contained 70, 15 and 15% of data points respectively. The Average absolute deviation (AAD)% of a collection of 128 data points for MWCNT-NH 2 and composites is 0.58%.for EB and 0.55 for YQ. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Employing open/hidden administration in psychotherapy research: A randomized-controlled trial of expressive writing

    Science.gov (United States)

    Tondorf, Theresa; Kaufmann, Lisa-Katrin; Degel, Alexander; Locher, Cosima; Birkhäuer, Johanna; Gerger, Heike; Ehlert, Ulrike

    2017-01-01

    Psychotherapy has been shown to be effective, but efforts to prove specific effects by placebo-controlled trials have been practically and conceptually hampered. We propose that adopting open/hidden designs from placebo research would offer a possible way to establish specificity in psychotherapy. Therefore, we tested the effects of providing opposing treatment rationales in an online expressive writing intervention on affect in healthy subjects. Results indicate that it was possible to conduct the expressive writing intervention both covertly and openly, but that participants in the hidden administration condition did not fully benefit from the otherwise effective expressive writing intervention in the long-run. Effect sizes between open and hidden administration groups were comparable to pre-post effect sizes of the intervention. While this finding is important for the understanding of psychotherapy's effects per se, it also proves that alternative research approaches to establish specificity are feasible and informative in psychotherapy research. Trial registration: German Clinical Trials Register DRKS00009428 PMID:29176768

  10. An objective interpretation of Lagrangian quantum mechanics

    International Nuclear Information System (INIS)

    Roberts, K.V.

    1978-01-01

    Unlike classical mechanics, the Copenhagen interpretation of quantum mechanics does not provide an objective space-time picture of the actual history of a physical system. This paper suggests how the conceptual foundations of quantum mechanics can be reformulated, without changing the mathematical content of the theory or its detailed agreement with experiment and without introducing any hidden variables, in order to provide an objective, covariant, Lagrangian description of reality which is deterministic and time-symmetric on the microscopic scale. The basis of this description can be expressed either as an action functional or as a summation over Feynman diagrams or paths. The probability laws associated with the quantum-mechanical measurement process, and the asymmetry in time of the principles of macroscopic causality and of the laws of statistical mechanics, are interpreted as consequences of the particular boundary conditions that apply to the actual universe. The objective interpretation does not include the observer and the measurement process among the fundamental concepts of the theory, but it does not entail a revision of the ideas of determinism and of time, since in a Lagrangian theory both initial and final boundary conditions on the action functional are required. (author)

  11. Kinetic mixing of the photon with hidden U(1)s in string phenomenology

    International Nuclear Information System (INIS)

    Abel, S.A.; Khoze, V.V.; Jaeckel, J.

    2008-03-01

    Embeddings of the standard model in type II string theory typically contain a variety of U(1) gauge factors arising from D-branes in the bulk. In general, there is no reason why only one of these - the one corresponding to weak hypercharge - should be massless. Observations require that standard model particles must be neutral (or have an extremely small charge) under additional massless U(1)s, i.e. the latter have to belong to a so called hidden sector. The exchange of heavy messengers, however, can lead to a kinetic mixing between the hypercharge and the hidden-sector U(1)s, that is testable with near future experiments. This provides a powerful probe of the hidden sectors and, as a consequence, of the string theory realisation itself. In the present paper, we show, using a variety of methods, how the kinetic mixing can be derived from the underlying type II string compactification, involving supersymmetric and nonsupersymmetric configurations of D-branes, both in large volumes and in warped backgrounds with fluxes. We first demonstrate by explicit example that kinetic mixing occurs in a completely supersymmetric set-up where we can use conformal field theory techniques. We then develop a supergravity approach which allows us to examine the phenomenon in more general backgrounds, where we find that kinetic mixing is natural in the context of flux compactifications. We discuss the phenomenological consequences for experiments at the low-energy frontier, searching for signatures of light, sub-electronvolt or even massless hidden-sector U(1) gauge bosons and minicharged particles. (orig.)

  12. Kinetic mixing of the photon with hidden U(1)s in string phenomenology

    Energy Technology Data Exchange (ETDEWEB)

    Abel, S.A.; Khoze, V.V. [Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Goodsell, M.D. [Laboratoire de Physique Theorique et Hautes Energies, Paris (France); Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology]|[Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-03-15

    Embeddings of the standard model in type II string theory typically contain a variety of U(1) gauge factors arising from D-branes in the bulk. In general, there is no reason why only one of these - the one corresponding to weak hypercharge - should be massless. Observations require that standard model particles must be neutral (or have an extremely small charge) under additional massless U(1)s, i.e. the latter have to belong to a so called hidden sector. The exchange of heavy messengers, however, can lead to a kinetic mixing between the hypercharge and the hidden-sector U(1)s, that is testable with near future experiments. This provides a powerful probe of the hidden sectors and, as a consequence, of the string theory realisation itself. In the present paper, we show, using a variety of methods, how the kinetic mixing can be derived from the underlying type II string compactification, involving supersymmetric and nonsupersymmetric configurations of D-branes, both in large volumes and in warped backgrounds with fluxes. We first demonstrate by explicit example that kinetic mixing occurs in a completely supersymmetric set-up where we can use conformal field theory techniques. We then develop a supergravity approach which allows us to examine the phenomenon in more general backgrounds, where we find that kinetic mixing is natural in the context of flux compactifications. We discuss the phenomenological consequences for experiments at the low-energy frontier, searching for signatures of light, sub-electronvolt or even massless hidden-sector U(1) gauge bosons and minicharged particles. (orig.)

  13. First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB.

    Science.gov (United States)

    Aguilar-Arevalo, A; Amidei, D; Bertou, X; Butner, M; Cancelo, G; Castañeda Vázquez, A; Cervantes Vergara, B A; Chavarria, A E; Chavez, C R; de Mello Neto, J R T; D'Olivo, J C; Estrada, J; Fernandez Moroni, G; Gaïor, R; Guardincerri, Y; Hernández Torres, K P; Izraelevitch, F; Kavner, A; Kilminster, B; Lawson, I; Letessier-Selvon, A; Liao, J; Matalon, A; Mello, V B B; Molina, J; Privitera, P; Ramanathan, K; Sarkis, Y; Schwarz, T; Settimo, M; Sofo Haro, M; Thomas, R; Tiffenberg, J; Tiouchichine, E; Torres Machado, D; Trillaud, F; You, X; Zhou, J

    2017-04-07

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30  eV c^{-2} with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter κ is competitive with constraints from solar emission, reaching a minimum value of 2.2×10^{-14} at 17  eV c^{-2}. These results are the most stringent direct detection constraints on hidden-photon dark matter in the galactic halo with masses 3-12  eV c^{-2} and the first demonstration of direct experimental sensitivity to ionization signals dark matter interactions.

  14. The incompatibility between local hidden variable theories and the ...

    Indian Academy of Sciences (India)

    I discuss in detail the result that the Bell's inequalities derived in the context of local hidden variable theories for discrete quantized observables can be satisfied only if a fundamental conservation law is violated on the average. This result shows that such theories are physically nonviable, and makes the demarcating criteria ...

  15. Unpacking the Hidden Efficacies of Learning in Productive Failure

    Science.gov (United States)

    Hung, David; Chen, Victor; Lim, Seo Hong

    2009-01-01

    This paper describes a framework for learning where learners undergo experimentations with the phenomena at hand according to progressive and staged goals. Bowling is used as a case study in this paper. The premise for experimentations is that learners can experience hidden efficacies, including the formation of "bad habits." A distinction is made…

  16. Exact Sampling and Decoding in High-Order Hidden Markov Models

    NARCIS (Netherlands)

    Carter, S.; Dymetman, M.; Bouchard, G.

    2012-01-01

    We present a method for exact optimization and sampling from high order Hidden Markov Models (HMMs), which are generally handled by approximation techniques. Motivated by adaptive rejection sampling and heuristic search, we propose a strategy based on sequentially refining a lower-order language

  17. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  18. Hidden Markov Model of atomic quantum jump dynamics in an optically probed cavity

    DEFF Research Database (Denmark)

    Gammelmark, S.; Molmer, K.; Alt, W.

    2014-01-01

    We analyze the quantum jumps of an atom interacting with a cavity field. The strong atom- field interaction makes the cavity transmission depend on the time dependent atomic state, and we present a Hidden Markov Model description of the atomic state dynamics which is conditioned in a Bayesian...... manner on the detected signal. We suggest that small variations in the observed signal may be due to spatial motion of the atom within the cavity, and we represent the atomic system by a number of hidden states to account for both the small variations and the internal state jump dynamics. In our theory...

  19. Low-lying 1/2-hidden strange pentaquark states in the constituent quark model

    Institute of Scientific and Technical Information of China (English)

    Hui Li; Zong-Xiu Wu; Chun-Sheng An; Hong Chen

    2017-01-01

    We investigate the spectrum of the low-lying 1/2-hidden strange pentaquark states,employing the constituent quark model,and looking at two ways within that model of mediating the hyperfine interaction between quarks-Goldstone boson exchange and one gluon exchange.Numerical results show that the lowest 1/2-hidden strange pentaquark state in the Goldstone boson exchange model lies at ~ 1570 MeV,so this pentaquark configuration may form a notable component in S11(1535) if the Goldstone boson exchange model is applied.This is consistent with the prediction that S11 (1535) couples very strongly to strangeness channels.

  20. The perception of the hidden curriculum on medical education: an exploratory study

    Directory of Open Access Journals (Sweden)

    Murakami Manabu

    2009-12-01

    Full Text Available Abstract Background Major curriculum reform of undergraduate medical education occurred during the past decades in the United Kingdom (UK; however, the effects of the hidden curriculum, which influence the choice of primary care as a career, have not been sufficiently recognized. While Japan, where traditionally few institutions systematically foster primary care physicians and very few have truly embraced family medicine as their guiding discipline, has also experienced meaningful curriculum reform, the effect of the hidden curriculum is not well known. The aim of this study is to identify themes pertaining to the students' perceptions of the hidden curriculum affecting undergraduate medical education in bedside learning in Japan. Methods Semi-structured interviews with thematic content analysis were implemented. Undergraduate year-5 students from a Japanese medical school at a Japanese teaching hospital were recruited. Interview were planned to last between 30 to 60 minutes each, over an 8-month period in 2007. The interviewees' perceptions concerning the quality of teaching in their bedside learning and related experiences were collected and analysed thematically. Results Twenty five medical students (18 males and 7 females, mean age 25 years old consented to participate in the interviews, and seven main themes emerged: "the perception of education as having a low priority," "the prevalence of positive/negative role models," "the persistence of hierarchy and exclusivity," "the existence of gender issues," "an overburdened medical knowledge," "human relationships with colleagues and medical team members," and "first experience from the practical wards and their patients." Conclusions Both similarities and differences were found when comparing the results to those of previous studies in the UK. Some effects of the hidden curriculum in medical education likely exist in common between the UK and Japan, despite the differences in their demographic

  1. Regional differences, socio-demographics, and hidden population of HIV/AIDS in India.

    Science.gov (United States)

    Kumar, Rajeev; Suar, Damodar; Singh, Sanjay Kumar

    2017-02-01

    This study examines the prevalence of HIV/AIDS in different regions of India, their socio-demographic indicators, and the presence of hidden population infected with HIV. Secondary data analyzed were obtained from national and international agencies. Considering the prevalence of HIV/AIDS in India, the low-prevalence regions in the last decade have shown a steady increase in recent years. Productive age, urbanization, male gender, lower level of education, minority religions, low income, and mobile occupations are associated with HIV pandemic. The hidden population vulnerable to HIV/AIDS are: street children, homeless population, and refugees. These observations can help map the high-risk behavior groups and formulate targeted strategies to curb the HIV menace.

  2. Optimized hardware framework of MLP with random hidden layers for classification applications

    Science.gov (United States)

    Zyarah, Abdullah M.; Ramesh, Abhishek; Merkel, Cory; Kudithipudi, Dhireesha

    2016-05-01

    Multilayer Perceptron Networks with random hidden layers are very efficient at automatic feature extraction and offer significant performance improvements in the training process. They essentially employ large collection of fixed, random features, and are expedient for form-factor constrained embedded platforms. In this work, a reconfigurable and scalable architecture is proposed for the MLPs with random hidden layers with a customized building block based on CORDIC algorithm. The proposed architecture also exploits fixed point operations for area efficiency. The design is validated for classification on two different datasets. An accuracy of ~ 90% for MNIST dataset and 75% for gender classification on LFW dataset was observed. The hardware has 299 speed-up over the corresponding software realization.

  3. The Role of Food and Nutrition System Approaches in Tackling Hidden Hunger

    Directory of Open Access Journals (Sweden)

    Emile Frison

    2011-01-01

    Full Text Available One of the World’s greatest challenges is to secure sufficient and healthy food for all, and to do so in an environmentally sustainable manner. This review explores the interrelationships of food, health, and environment, and their role in addressing chronic micronutrient deficiencies, also known as “hidden hunger”, affecting over two billion people worldwide. While the complexity and underlying determinants of undernutrition have been well-understood for decades, the scaling of food and nutrition system approaches that combine sustainable agriculture aimed at improved diet diversity and livelihoods have been limited in their development and implementation. However, an integrated system approach to reduce hidden hunger could potentially serve as a sustainable opportunity.

  4. Measurement problem and local hidden variables with entangled photons

    Directory of Open Access Journals (Sweden)

    Muchowski Eugen

    2017-12-01

    Full Text Available It is shown that there is no remote action with polarization measurements of photons in singlet state. A model is presented introducing a hidden parameter which determines the polarizer output. This model is able to explain the polarization measurement results with entangled photons. It is not ruled out by Bell’s Theorem.

  5. [Case-control study on effect of rivaroxaban on the risk of hidden bleeding after total hip arthroplasty].

    Science.gov (United States)

    Li, Jun; Jing, Jue-Hua; Shi, Zhan-Jun; Zhou, Yun

    2014-01-01

    To investigate the risk of hidden blood loss about applying rivaroxaban after total hip arthroplasty. From October 2009 to May 2012,88 patients with femoral head necrosis were treated with primary total hip arthroplasty. All the patients were divided into Rivaroxaban group(44 cases)and control group(44 cases). There were 25 males and 19 females in the Rivaroxaban group, with an average age of (58.48 +/- 15.19) years old; in the control group,24 patients were male and 20 patients were female, with an average age of (61.11 +/- 13.54) years old. The patients in the Rivaroxaban group took Rivaroxaban orally from the first day after operation with a dose of 10 mg each day, and treatment course was 14 days. The patients in the control group took placebo orally at the same time. Dominant blood loss and transfusion were recorded, blood routine examinations were taken before operation and at 3 days after operation. The total blood loss and hidden blood loss were calculated according to the formula. The mean total blood loss was (1509.56 +/- 325.23) ml and the hidden blood loss was(581.47 +/- 215.01) ml, accounting for (37.88 +/- 10.42)% in the Rivaroxaban group. The mean total blood loss was (1262.30 +/- 397.95) ml and the hidden blood loss was (395.59 +/- 97.33) ml, accounting for (30.62 +/- 0.20)% in the control group. The total blood loss, hidden blood loss and transfusion in the Rivaroxaban group was significantly more than those in control group,b ut there was no significant difference on dominant blood loss between two groups. Rivaroxaban increased the overall bleeding risk of total hip arthroplasty, especially hidden bleeding risk, which should be careful used.

  6. Tagging partially reconstructed objects with jet substructure

    Energy Technology Data Exchange (ETDEWEB)

    Freytsis, Marat, E-mail: freytsis@uoregon.edu [Department of Physics, Harvard University, Cambridge, MA, 02138 (United States); Volansky, Tomer [Raymond and Beverly Sackler School of Physics and Astronomy, Tel-Aviv University, Tel-Aviv 69978 (Israel); Walsh, Jonathan R. [Ernest Orlando Lawrence Berkeley National Laboratory, University of California, Berkeley, CA 94720 (United States); Berkeley Center for Theoretical Physics, University of California, Berkeley, CA 94720 (United States)

    2017-06-10

    We present a new tagger which aims at identifying partially reconstructed objects, in which only some of the constituents are collected in a single jet. As an example, we focus on top decays in which either part of the hadronically decaying W or the b jet is soft or falls outside of the top jet cone. We construct an observable to identify remnant substructure from the decay and employ aggressive jet grooming to reject QCD backgrounds. The tagger is complementary to existing ones and works well in the intermediate boost regime where jet substructure techniques usually fail. It is anticipated that a similar tagger can be used to identify non-QCD hadronic jets, such as those expected from hidden valleys.

  7. Tagging partially reconstructed objects with jet substructure

    International Nuclear Information System (INIS)

    Freytsis, Marat; Volansky, Tomer; Walsh, Jonathan R.

    2017-01-01

    We present a new tagger which aims at identifying partially reconstructed objects, in which only some of the constituents are collected in a single jet. As an example, we focus on top decays in which either part of the hadronically decaying W or the b jet is soft or falls outside of the top jet cone. We construct an observable to identify remnant substructure from the decay and employ aggressive jet grooming to reject QCD backgrounds. The tagger is complementary to existing ones and works well in the intermediate boost regime where jet substructure techniques usually fail. It is anticipated that a similar tagger can be used to identify non-QCD hadronic jets, such as those expected from hidden valleys.

  8. Tagging partially reconstructed objects with jet substructure

    Science.gov (United States)

    Freytsis, Marat; Volansky, Tomer; Walsh, Jonathan R.

    2017-06-01

    We present a new tagger which aims at identifying partially reconstructed objects, in which only some of the constituents are collected in a single jet. As an example, we focus on top decays in which either part of the hadronically decaying W or the b jet is soft or falls outside of the top jet cone. We construct an observable to identify remnant substructure from the decay and employ aggressive jet grooming to reject QCD backgrounds. The tagger is complementary to existing ones and works well in the intermediate boost regime where jet substructure techniques usually fail. It is anticipated that a similar tagger can be used to identify non-QCD hadronic jets, such as those expected from hidden valleys.

  9. The hidden face of the petroleum

    International Nuclear Information System (INIS)

    Laurent, E.

    2006-02-01

    For the first time, a book reveals what that was hidden to the public opinions: why the petroleum crisis of 1973 what only a manipulation, an arrangement between the OPEC and the petroleum companies, why the data concerning the petroleum reserves are wrong and increased by the producers countries, how Washington used the Saudi petroleum weapon to create the Soviet Union fall, and why from march 2001 maps of the Iraq (where were drawn the future petroleum explorations) were working documents for the vice President Cheney and petroleum managers for the ''secret society''. (A.L.B.)

  10. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  11. A masking index for quantifying hidden glitches

    OpenAIRE

    Berti-Equille, Laure; Loh, J. M.; Dasu, T.

    2015-01-01

    Data glitches are errors in a dataset. They are complex entities that often span multiple attributes and records. When they co-occur in data, the presence of one type of glitch can hinder the detection of another type of glitch. This phenomenon is called masking. In this paper, we define two important types of masking and propose a novel, statistically rigorous indicator called masking index for quantifying the hidden glitches. We outline four cases of masking: outliers masked by missing valu...

  12. Cold dark matter from the hidden sector

    International Nuclear Information System (INIS)

    Arias, Paola; Pontificia Univ. Catolica de Chile, Santiago

    2012-02-01

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  13. Cold dark matter from the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Arias, Paola [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Pontificia Univ. Catolica de Chile, Santiago (Chile). Facultad de Fisica

    2012-02-15

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  14. New diagnostic technology and hidden pits and fissures caries

    Directory of Open Access Journals (Sweden)

    Fabrizio Guerra

    2015-10-01

    Full Text Available The accuracy in pits and fissures caries detection is of paramount importance in dental caries primary and secondary prevention. A combination of visual examination and probing is currently the mainstay of occlusal caries diagnosis. Unfortunately, these types of inspection alone may leave a certain number of pit and fissure caries undetected. The Vista Cam iX fluorescence camera (Durr Dental, Bietigheim-Bissingen, Germany is a novel dental diagnostic tool for quantitative assessment of dental caries with high specificity for carious lesions detection. In the presented cases photographic images, representing the visual diagnostic approach, are applied as integration to VistaCam iX Proof images. A step-by-step sequence of inspection and assessment of operative treatment need is presented in a case of hidden pit and fissure caries on a permanent molar. Based on the reported case, it could be observed that VistaCam iX Proof shows promising results in hidden pits and fissures caries detection and could be considered a non-invasive examination method that facilitate the detection of early lesions and a potential diagnostic aid.

  15. The hidden X-ray breaks in afterglow light curves

    International Nuclear Information System (INIS)

    Curran, P. A.; Wijers, R. A. M. J.; Horst, A. J. van der; Starling, R. L. C.

    2008-01-01

    Gamma-Ray Burst (GRB) afterglow observations in the Swift era have a perceived lack of achromatic jet breaks compared to the BeppoSAX, or pre-Swift era. Specifically, relatively few breaks, consistent with jet breaks, are observed in the X-ray light curves of these bursts. If these breaks are truly missing, it has serious consequences for the interpretation of GRB jet collimation and energy requirements, and the use of GRBs as standard candles.Here we address the issue of X-ray breaks which are possibly 'hidden' and hence the light curves are misinterpreted as being single power-laws. We show how a number of precedents, including GRB 990510 and GRB 060206, exist for such hidden breaks and how, even with the well sampled light curves of the Swift era, these breaks may be left misidentified. We do so by synthesising X-ray light curves and finding general trends via Monte Carlo analysis. Furthermore, in light of these simulations, we discuss how to best identify achromatic breaks in afterglow light curves via multi-wavelength analysis

  16. Automatic Hidden-Web Table Interpretation by Sibling Page Comparison

    Science.gov (United States)

    Tao, Cui; Embley, David W.

    The longstanding problem of automatic table interpretation still illudes us. Its solution would not only be an aid to table processing applications such as large volume table conversion, but would also be an aid in solving related problems such as information extraction and semi-structured data management. In this paper, we offer a conceptual modeling solution for the common special case in which so-called sibling pages are available. The sibling pages we consider are pages on the hidden web, commonly generated from underlying databases. We compare them to identify and connect nonvarying components (category labels) and varying components (data values). We tested our solution using more than 2,000 tables in source pages from three different domains—car advertisements, molecular biology, and geopolitical information. Experimental results show that the system can successfully identify sibling tables, generate structure patterns, interpret tables using the generated patterns, and automatically adjust the structure patterns, if necessary, as it processes a sequence of hidden-web pages. For these activities, the system was able to achieve an overall F-measure of 94.5%.

  17. Revealing the hidden faults in the SE flank of Mt. Etna using radon in-soil gas measurement.

    Science.gov (United States)

    Johnová, K; Thinová, L; Giammanco, S

    2014-07-01

    Although there are many methods for investigating tectonic structures, many faults remain hidden, and they can endanger the life and property of people living along them. The slopes of volcanoes are covered with such hidden faults, near which strong earthquakes and gas releases can appear. Revealing hidden faults can therefore contribute significantly to the protection of people living in volcanic areas. In the study, seven different techniques were used for making measurements of in-soil radon concentrations in order to search for hidden faults on the SE flank of the Mt. Etna volcano. These reported methods had previously been proved to be useful tools for investigating fault structures. The main aim of the experiment presented here was to evaluate the usability of these methods in the geological conditions of the Mt. Etna region, and to find the best place for continual radon monitoring using a permanent station in the near future. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Interpretation of non-Markovian stochastic Schroedinger equations as a hidden-variable theory

    International Nuclear Information System (INIS)

    Gambetta, Jay; Wiseman, H.M.

    2003-01-01

    Do diffusive non-Markovian stochastic Schroedinger equations (SSEs) for open quantum systems have a physical interpretation? In a recent paper [Phys. Rev. A 66, 012108 (2002)] we investigated this question using the orthodox interpretation of quantum mechanics. We found that the solution of a non-Markovian SSE represents the state the system would be in at that time if a measurement was performed on the environment at that time, and yielded a particular result. However, the linking of solutions at different times to make a trajectory is, we concluded, a fiction. In this paper we investigate this question using the modal (hidden variable) interpretation of quantum mechanics. We find that the noise function z(t) appearing in the non-Markovian SSE can be interpreted as a hidden variable for the environment. That is, some chosen property (beable) of the environment has a definite value z(t) even in the absence of measurement on the environment. The non-Markovian SSE gives the evolution of the state of the system 'conditioned' on this environment hidden variable. We present the theory for diffusive non-Markovian SSEs that have as their Markovian limit SSEs corresponding to homodyne and heterodyne detection, as well as one which has no Markovian limit

  19. Two-Stage Hidden Markov Model in Gesture Recognition for Human Robot Interaction

    Directory of Open Access Journals (Sweden)

    Nhan Nguyen-Duc-Thanh

    2012-07-01

    Full Text Available Hidden Markov Model (HMM is very rich in mathematical structure and hence can form the theoretical basis for use in a wide range of applications including gesture representation. Most research in this field, however, uses only HMM for recognizing simple gestures, while HMM can definitely be applied for whole gesture meaning recognition. This is very effectively applicable in Human-Robot Interaction (HRI. In this paper, we introduce an approach for HRI in which not only the human can naturally control the robot by hand gesture, but also the robot can recognize what kind of task it is executing. The main idea behind this method is the 2-stages Hidden Markov Model. The 1st HMM is to recognize the prime command-like gestures. Based on the sequence of prime gestures that are recognized from the 1st stage and which represent the whole action, the 2nd HMM plays a role in task recognition. Another contribution of this paper is that we use the output Mixed Gaussian distribution in HMM to improve the recognition rate. In the experiment, we also complete a comparison of the different number of hidden states and mixture components to obtain the optimal one, and compare to other methods to evaluate this performance.

  20. Phenomenological constraints imposed by the hidden sector in the flipped SU(5)xU(1) superstring model

    Energy Technology Data Exchange (ETDEWEB)

    Leontaris, G.K.; Rizos, J.; Tamvakis, K. (Ioannina Univ. (Greece). Theoretical Physics Div.)

    1990-06-28

    We calculate the trilinear superpotential of the hidden sector of the three generation flipped SU(5)xU(1)xU(1){sup 4}xSO(10)xSU(4) superstring model. We perform a renormalization group analysis of the model taking into account the hidden sector. We find that, in all relevant cases, fractionally charged tetraplets of the hidden SO(6) gauge group are confined at a high scale. Nevertheless, their contribution to the observable U(1) gauge coupling evolution results in a drastic reduction of the available freedom in the values of a{sub 3}(m{sub w}), sin{sup 2}{theta}{sub w} and M{sub x} that allow superunification. (orig.).

  1. Artificial emotion triggered stochastic behavior transitions with motivational gain effects for multi-objective robot tasks

    Science.gov (United States)

    Dağlarli, Evren; Temeltaş, Hakan

    2007-04-01

    This paper presents artificial emotional system based autonomous robot control architecture. Hidden Markov model developed as mathematical background for stochastic emotional and behavior transitions. Motivation module of architecture considered as behavioral gain effect generator for achieving multi-objective robot tasks. According to emotional and behavioral state transition probabilities, artificial emotions determine sequences of behaviors. Also motivational gain effects of proposed architecture can be observed on the executing behaviors during simulation.

  2. The hidden costs of installing xpert machines in a tuberculosis high ...

    African Journals Online (AJOL)

    The hidden costs of installing xpert machines in a tuberculosis high-burden country: experiences from Nigeria. Saddiq Tsimiri Abdurrahman, Nnamdi Emenyonu, Olusegun Joshua Obasanya, Lovett Lawson, Russell Dacombe, Muhammad Muhammad, Olanrewaju Oladimeji, Luis Eduardo Cuevas ...

  3. Hidden Broad Line Seyfert 2 Galaxies in the CfA and 12micron Samples

    OpenAIRE

    Tran, Hien D.

    2001-01-01

    We report the results of a spectropolarimetric survey of the CfA and 12micron samples of Seyfert 2 galaxies (S2s). Polarized (hidden) broad line regions (HBLRs) are confirmed in a number of galaxies, and several new cases (F02581-1136, MCG -3-58-7, NGC 5995, NGC 6552, NGC 7682) are reported. The 12micron S2 sample shows a significantly higher incidence of HBLR (50%) than its CfA counterpart (30%), suggesting that the latter may be incomplete in hidden AGNs. Compared to the non-HBLR S2s, the H...

  4. A New Chaotic Flow with Hidden Attractor: The First Hyperjerk System with No Equilibrium

    Science.gov (United States)

    Ren, Shuili; Panahi, Shirin; Rajagopal, Karthikeyan; Akgul, Akif; Pham, Viet-Thanh; Jafari, Sajad

    2018-02-01

    Discovering unknown aspects of non-equilibrium systems with hidden strange attractors is an attractive research topic. A novel quadratic hyperjerk system is introduced in this paper. It is noteworthy that this non-equilibrium system can generate hidden chaotic attractors. The essential properties of such systems are investigated by means of equilibrium points, phase portrait, bifurcation diagram, and Lyapunov exponents. In addition, a fractional-order differential equation of this new system is presented. Moreover, an electronic circuit is also designed and implemented to verify the feasibility of the theoretical model.

  5. Book Review: "Hidden Markov Models for Time Series: An ...

    African Journals Online (AJOL)

    Hidden Markov Models for Time Series: An Introduction using R. by Walter Zucchini and Iain L. MacDonald. Chapman & Hall (CRC Press), 2009. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/saaj.v10i1.61717 · AJOL African Journals Online.

  6. Charm and Hidden Charm Scalar Resonances in Nuclear Matter

    NARCIS (Netherlands)

    Tolos, Laura; Molina, Raquel; Gamermann, Daniel; Oset, Eulogio

    2009-01-01

    We study the properties of the scalar charm resonances D(s0)(2317) and D(0)(2400), and the theoretical hidden charm state X(3700) in nuclear matter. We find that for the D(s0)(2317) and X(3700) resonances, with negligible and small width at zero density, respectively, the width becomes about 100 MeV

  7. Hidden order and disorder effects in URu2Si2

    Science.gov (United States)

    Bernal, O. O.; Moroz, M. E.; Ishida, K.; Murakawa, H.; Reyes, A. P.; Kuhns, P. L.; MacLaughlin, D. E.; Mydosh, J. A.; Gortenmulder, T. J.

    2006-05-01

    NMR experiments at ambient pressure in URu 2Si 2 demonstrate a linewidth enhancement effect below the hidden order transition temperature T0. We present single-crystal 29Si NMR parameters for various temperatures and for an applied magnetic field perpendicular to the crystal c-axis. By comparing oriented-powder and single-crystal data, we observe that the size of the linewidth enhancement below T0 correlates with the size of the high- T broadening. We measure a 29Si up-field line shift below T0 which indicates the presence of an internal-field average for the entire crystal. This shift also correlates with the high-temperature width. The 101Ru NQR frequency as a function of temperature was also measured. No strong effect on the NQR frequency is observed at T0. Both NMR and NQR measurements suggest a connection between linewidth/disorder effects and the transition to hidden order.

  8. Enhanced Map-Matching Algorithm with a Hidden Markov Model for Mobile Phone Positioning

    Directory of Open Access Journals (Sweden)

    An Luo

    2017-10-01

    Full Text Available Numerous map-matching techniques have been developed to improve positioning, using Global Positioning System (GPS data and other sensors. However, most existing map-matching algorithms process GPS data with high sampling rates, to achieve a higher correct rate and strong universality. This paper introduces a novel map-matching algorithm based on a hidden Markov model (HMM for GPS positioning and mobile phone positioning with a low sampling rate. The HMM is a statistical model well known for providing solutions to temporal recognition applications such as text and speech recognition. In this work, the hidden Markov chain model was built to establish a map-matching process, using the geometric data, the topologies matrix of road links in road network and refined quad-tree data structure. HMM-based map-matching exploits the Viterbi algorithm to find the optimized road link sequence. The sequence consists of hidden states in the HMM model. The HMM-based map-matching algorithm is validated on a vehicle trajectory using GPS and mobile phone data. The results show a significant improvement in mobile phone positioning and high and low sampling of GPS data.

  9. A realistic extension of gauge-mediated SUSY-breaking model with superconformal hidden sector

    International Nuclear Information System (INIS)

    Asano, Masaki; Hisano, Junji; Okada, Takashi; Sugiyama, Shohei

    2009-01-01

    The sequestering of supersymmetry (SUSY) breaking parameters, which is induced by superconformal hidden sector, is one of the solutions for the μ/B μ problem in gauge-mediated SUSY-breaking scenario. However, it is found that the minimal messenger model does not derive the correct electroweak symmetry breaking. In this Letter we present a model which has the coupling of the messengers with the SO(10) GUT-symmetry breaking Higgs fields. The model is one of the realistic extensions of the gauge mediation model with superconformal hidden sector. It is shown that the extension is applicable for a broad range of conformality breaking scale

  10. Bosonization, dual transformation and non-local hidden symmetry in two dimensions

    International Nuclear Information System (INIS)

    Hata, Hiroyuki

    1985-01-01

    The non-local hidden symmetry is investigated in the bosonized non-abelian Thirring model and the dual representation of the chiral model. In these representations the first non-local symmetry is spontaneously broken in naive pertubation theory. (orig.)

  11. The Hidden Diversity of Flagellated Protists in Soil.

    Science.gov (United States)

    Venter, Paul Christiaan; Nitsche, Frank; Arndt, Hartmut

    2018-07-01

    Protists are among the most diverse and abundant eukaryotes in soil. However, gaps between described and sequenced protist morphospecies still present a pending problem when surveying environmental samples for known species using molecular methods. The number of sequences in the molecular PR 2 database (∼130,000) is limited compared to the species richness expected (>1 million protist species) - limiting the recovery rate. This is important, since high throughput sequencing (HTS) methods are used to find associative patterns between functional traits, taxa and environmental parameters. We performed HTS to survey soil flagellates in 150 grasslands of central Europe, and tested the recovery rate of ten previously isolated and cultivated cercomonad species, among locally found diversity. We recovered sequences for reference soil flagellate species, but also a great number of their phylogenetically evaluated genetic variants, among rare and dominant taxa with presumably own biogeography. This was recorded among dominant (cercozoans, Sandona), rare (apusozoans) and a large hidden diversity of predominantly aquatic protists in soil (choanoflagellates, bicosoecids) often forming novel clades associated with uncultured environmental sequences. Evaluating the reads, instead of the OTUs that individual reads are usually clustered into, we discovered that much of this hidden diversity may be lost due to clustering. Copyright © 2018 Elsevier GmbH. All rights reserved.

  12. Market impact and trading profile of hidden orders in stock markets.

    Science.gov (United States)

    Moro, Esteban; Vicente, Javier; Moyano, Luis G; Gerig, Austin; Farmer, J Doyne; Vaglica, Gabriella; Lillo, Fabrizio; Mantegna, Rosario N

    2009-12-01

    We empirically study the market impact of trading orders. We are specifically interested in large trading orders that are executed incrementally, which we call hidden orders. These are statistically reconstructed based on information about market member codes using data from the Spanish Stock Market and the London Stock Exchange. We find that market impact is strongly concave, approximately increasing as the square root of order size. Furthermore, as a given order is executed, the impact grows in time according to a power law; after the order is finished, it reverts to a level of about 0.5-0.7 of its value at its peak. We observe that hidden orders are executed at a rate that more or less matches trading in the overall market, except for small deviations at the beginning and end of the order.

  13. WISPers from the dark side. Radio probes of axions and hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Horns, Dieter [Hamburg Univ. (Germany). Inst. fuer Experimentalphysik; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Lobanov, Andrei [Max-Planck-Institut fuer Radioastronomie, Bonn (Germany); Hamburg Univ. (Germany). Inst. fuer Experimentalphysik

    2013-09-15

    Measurements in the radio regime embrace a number of effective approaches for WISP searches, often covering unique or highly complementary ranges of the parameter space compared to those explored in other research domains. These measurements can be used to search for electromagnetic tracers of the hidden photon and axion oscillations, extending down to {proportional_to} 10{sup -19} eV the range of the hidden photon mass probed, and closing the last gaps in the strongly favoured 1-5 {mu}eV range for axion dark matter. This provides a strong impetus for several new initiatives in the field, including the WISP Dark Matter eXperiment (WISPDMX) and novel conceptual approaches for broad-band WISP searches in the 0.1-1000 {mu}eV range.

  14. Basic problems solving for two-dimensional discrete 3 × 4 order hidden markov model

    International Nuclear Information System (INIS)

    Wang, Guo-gang; Gan, Zong-liang; Tang, Gui-jin; Cui, Zi-guan; Zhu, Xiu-chang

    2016-01-01

    A novel model is proposed to overcome the shortages of the classical hypothesis of the two-dimensional discrete hidden Markov model. In the proposed model, the state transition probability depends on not only immediate horizontal and vertical states but also on immediate diagonal state, and the observation symbol probability depends on not only current state but also on immediate horizontal, vertical and diagonal states. This paper defines the structure of the model, and studies the three basic problems of the model, including probability calculation, path backtracking and parameters estimation. By exploiting the idea that the sequences of states on rows or columns of the model can be seen as states of a one-dimensional discrete 1 × 2 order hidden Markov model, several algorithms solving the three questions are theoretically derived. Simulation results further demonstrate the performance of the algorithms. Compared with the two-dimensional discrete hidden Markov model, there are more statistical characteristics in the structure of the proposed model, therefore the proposed model theoretically can more accurately describe some practical problems.

  15. Social exclusion, health and hidden homelessness.

    Science.gov (United States)

    Watson, J; Crawley, J; Kane, D

    2016-10-01

    Homelessness and poverty are extreme forms of social exclusion which extend beyond the lack of physical or material needs. The purpose of this study was to explore and expand the concept of social exclusion within the social determinants of health perspective - to understand how the social environment, health behaviours and health status are associated with material and social deprivation. Fundamental qualitative description with tones of focused ethnography. Participants who identified as hidden homeless described their everyday living conditions and how these everyday conditions were impacted and influenced by their social environments, coping/health behaviours and current health status. Research Ethics Board approval was granted and informed consents were obtained from 21 participants prior to the completion of individual interviews. Qualitative content analysis examined the descriptions of men and women experiencing hidden homelessness. Participants described the 'lack of quality social interactions and supports' and their 'daily struggles of street life'. They also shared the 'pain of addiction' and how coping strategies influenced health. Participants were hopeful that their insights would 'better the health of homeless people' by helping shape public policy and funding of community resources that would reduce barriers and improve overall health. Health professionals who understand health behaviours as coping mechanisms for poor quality social environments can provide more comprehensive and holistic care. The findings of this study can be used to support the importance of housing as a key factor in the health and well-being of people experiencing poverty, homelessness and social exclusion; and consequently, reinforces the need for a national housing strategy. Copyright © 2016 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  16. A hidden Ising model for ChIP-chip data analysis

    KAUST Repository

    Mo, Q.

    2010-01-28

    Motivation: Chromatin immunoprecipitation (ChIP) coupled with tiling microarray (chip) experiments have been used in a wide range of biological studies such as identification of transcription factor binding sites and investigation of DNA methylation and histone modification. Hidden Markov models are widely used to model the spatial dependency of ChIP-chip data. However, parameter estimation for these models is typically either heuristic or suboptimal, leading to inconsistencies in their applications. To overcome this limitation and to develop an efficient software, we propose a hidden ferromagnetic Ising model for ChIP-chip data analysis. Results: We have developed a simple, but powerful Bayesian hierarchical model for ChIP-chip data via a hidden Ising model. Metropolis within Gibbs sampling algorithm is used to simulate from the posterior distribution of the model parameters. The proposed model naturally incorporates the spatial dependency of the data, and can be used to analyze data with various genomic resolutions and sample sizes. We illustrate the method using three publicly available datasets and various simulated datasets, and compare it with three closely related methods, namely TileMap HMM, tileHMM and BAC. We find that our method performs as well as TileMap HMM and BAC for the high-resolution data from Affymetrix platform, but significantly outperforms the other three methods for the low-resolution data from Agilent platform. Compared with the BAC method which also involves MCMC simulations, our method is computationally much more efficient. Availability: A software called iChip is freely available at http://www.bioconductor.org/. Contact: moq@mskcc.org. © The Author 2010. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org.

  17. Inferring hidden causal relations between pathway members using reduced Google matrix of directed biological networks

    Science.gov (United States)

    2018-01-01

    Signaling pathways represent parts of the global biological molecular network which connects them into a seamless whole through complex direct and indirect (hidden) crosstalk whose structure can change during development or in pathological conditions. We suggest a novel methodology, called Googlomics, for the structural analysis of directed biological networks using spectral analysis of their Google matrices, using parallels with quantum scattering theory, developed for nuclear and mesoscopic physics and quantum chaos. We introduce analytical “reduced Google matrix” method for the analysis of biological network structure. The method allows inferring hidden causal relations between the members of a signaling pathway or a functionally related group of genes. We investigate how the structure of hidden causal relations can be reprogrammed as a result of changes in the transcriptional network layer during cancerogenesis. The suggested Googlomics approach rigorously characterizes complex systemic changes in the wiring of large causal biological networks in a computationally efficient way. PMID:29370181

  18. Lake-sediment evidence for the date of deglaciation of the Hidden Lake area, Kenai Peninsula, Alaska

    Science.gov (United States)

    Rymer, Michael J.; Sims, John D.

    1982-06-01

    An abrupt environmental change is reflected in a core from Hidden Lake, Alaska, by differences in sediment type, chlorite crystallinity, and content of organic carbon and water of the sediments. This abrupt change in the sedimentary record occurred about 14,500 14C yr ago and probably marks the time of recession of the glacier from the Hidden Lake drainage basin. Deglaciation of the area was then underway, and rock flour was being deposited in the lake. After recession of the glacier from the Hidden Lake drainage basin, rock flour was no longer introduced, and organic-matter content of the sediment increased. By the dating of these changes in sediment type, we show that retreat of glaciers in this area took place significantly earlier than previously estimated; this agrees with the timing of retreat of alpine glaciers elsewhere in western North America.

  19. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  20. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... Worlds Revealed,'' imported from abroad for temporary exhibition within the United States, are of... custodians. I also determine that the exhibition or display of the exhibit objects at The Science Museum of... Denver Museum of Nature and Science in Denver, Colorado from on or about February 14, 2014 until on or...

  1. Early Removal of Drainage Tube after Fast-Track Primary Total Knee Arthroplasty.

    Science.gov (United States)

    Zhang, Shaoyun; Xu, Bin; Huang, Qiang; Yao, Huan; Xie, Jinwei; Pei, Fuxing

    2017-07-01

    There is no consensus as to whether drainage tube should be used and how long it should remain in use after primary total knee arthroplasty (TKA). As fast-track (FT) program has been implemented in TKA, whether drainage tube could be removed early, and the ideal timing for removal after FT primary TKA has been a new topic. The purpose of this prospective cohort study was to evaluate the safety and feasibility of early removal of drainage tube when FT program was implemented in primary TKA. A total of 101 patients undergoing FT primary TKA were prospectively allocated into three groups. Patients in group A (31 patients) indwelled wound drainage tube for 6 hours after surgery while group B (34 patients) for 12 hours and group C (36 patients) for 18 hours. The knee circumference, resting and moving visual analogue score (VAS), hemoglobin (Hb), hematocrit, white blood count (WBC), erythrocyte sedimentation rate (ESR), C-reactive protein (CRP), interleukin-6 (IL-6), the volume of blood loss and drainage, and postoperative length of stay (LOS) among three groups were recorded and compared. There was no statistically significant difference in the volume of total and hidden blood loss among three groups ( p  > 0.05), but as the time of drainage prolonged, total volume of drainage and dominant blood loss increased gradually ( p   0.05), the decrease of Hb in the perioperative period and postoperative LOS as well. Early removal of wound drainage tube could drain the hematocele and reduce the risk of infection, and it doesn't increase the sense of pain, inflammatory reaction, limb swelling, and total blood loss. It's safe and feasible to remove the drainage tube within 6 to 12 hours after FT primary TKA. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  2. Plasma Decontamination of Uranium From the Interior of Aluminum Objects

    International Nuclear Information System (INIS)

    Veilleux, J.M.; Munson, C.; Fitzpatrick, J.; Chamberlin, E.P.; El-Genk, M.S.

    1997-01-01

    RF plasma glow discharges are being investigated for removing and recovering radioactive elements from contaminated objects, especially those contaminated with transuranic (TRU) materials. These plasmas, using nitrogen trifluoride as the working gas, have been successful at removing uranium and plutonium contaminants from test coupons of stainless steel and aluminum surfaces, including small cracks and crevices, and the interior surfaces of relatively hard to reach aluminum pipes. Contaminant removal exceeded 99.9% from simple surfaces and contaminant recovery using cryogenic traps has exceeded 50%. Work continues with the objective of demonstrating that transuranic contaminated waste can be transformed to low level waste (LLW) and to better understand the physics of the interaction between plasma and surface contaminants. This work summarizes the preliminary results from plasma decontamination from the interior of aluminum objects--the nooks and crannies experiments

  3. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  4. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  5. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The estimation of the HMM is conducted using a variant of the Iterative Conditional Expectation-Generalized Mixture (ICE-GEMI) algorithm proposed by Delignon et al. (1997), that permits analysis of the conditional distributions of economic data and allows for different functional forms across regimes...

  6. Hidden-Markov-Model Analysis Of Telemanipulator Data

    Science.gov (United States)

    Hannaford, Blake; Lee, Paul

    1991-01-01

    Mathematical model and procedure based on hidden-Markov-model concept undergoing development for use in analysis and prediction of outputs of force and torque sensors of telerobotic manipulators. In model, overall task broken down into subgoals, and transition probabilities encode ease with which operator completes each subgoal. Process portion of model encodes task-sequence/subgoal structure, and probability-density functions for forces and torques associated with each state of manipulation encode sensor signals that one expects to observe at subgoal. Parameters of model constructed from engineering knowledge of task.

  7. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  8. Ship Track for The Hidden Ocean Arctic 2005 - Office of Ocean Exploration

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Ship track of the US Coast Guard icebreaker Healy during the "Hidden Ocean Arctic 2005" expedition sponsored by the National Oceanic and Atmospheric Administration...

  9. Unraveling the hidden heterogeneities of breast cancer based on functional miRNA cluster.

    Directory of Open Access Journals (Sweden)

    Li Li

    Full Text Available It has become increasingly clear that the current taxonomy of clinical phenotypes is mixed with molecular heterogeneity, which potentially affects the treatment effect for involved patients. Defining the hidden molecular-distinct diseases using modern large-scale genomic approaches is therefore useful for refining clinical practice and improving intervention strategies. Given that microRNA expression profiling has provided a powerful way to dissect hidden genetic heterogeneity for complex diseases, the aim of the study was to develop a bioinformatics approach that identifies microRNA features leading to the hidden subtyping of complex clinical phenotypes. The basic strategy of the proposed method was to identify optimal miRNA clusters by iteratively partitioning the sample and feature space using the two-ways super-paramagnetic clustering technique. We evaluated the obtained optimal miRNA cluster by determining the consistency of co-expression and the chromosome location among the within-cluster microRNAs, and concluded that the optimal miRNA cluster could lead to a natural partition of disease samples. We applied the proposed method to a publicly available microarray dataset of breast cancer patients that have notoriously heterogeneous phenotypes. We obtained a feature subset of 13 microRNAs that could classify the 71 breast cancer patients into five subtypes with significantly different five-year overall survival rates (45%, 82.4%, 70.6%, 100% and 60% respectively; p = 0.008. By building a multivariate Cox proportional-hazards prediction model for the feature subset, we identified has-miR-146b as one of the most significant predictor (p = 0.045; hazard ratios = 0.39. The proposed algorithm is a promising computational strategy for dissecting hidden genetic heterogeneity for complex diseases, and will be of value for improving cancer diagnosis and treatment.

  10. A methodology for selective removal of orbital debris

    Science.gov (United States)

    Ash, R. L.; Odonoghue, P. J.; Chambers, E. J.; Raney, J. P.

    1992-01-01

    Earth-orbiting objects, large enough to be tracked, were surveyed for possible systematic debris removal. Based upon the statistical collision studies of others, it was determined that objects in orbits approximately 1000 km above the Earth's surface are at greatest collisional risk. Russian C-1B boosters were identified as the most important target of opportunity for debris removal. Currently, more than 100 in tact boosters are orbiting the Earth with apogees between 950 km and 1050 km. Using data provided by Energia USA, specific information on the C-1B booster, in terms of rendezvous and capture strategies, was discussed.

  11. Development of Piagetian object permanence in a grey parrot (Psittacus erithacus).

    Science.gov (United States)

    Pepperberg, I M; Willner, M R; Gravitz, L B

    1997-03-01

    The authors evaluated the ontogenetic performance of a grey parrot (Psittacus erithacus) on object permanence tasks designed for human infants. Testing began when the bird was 8 weeks old, prior to fledging and weaning. Because adult grey parrots understand complex invisible displacements (I. M. Pepperberg & F. A. Kozak, 1986), the authors continued weekly testing until the current subject completed all of I. C. Uzgiris and J. Hunt's (1975) Scale 1 tasks. Stage 6 object permanence with respect to these tasks emerged at 22 weeks, after the bird had fledged but before it was completely weaned. Although the parrot progressed more rapidly overall than other species that have been tested ontogenetically, the subject similarly exhibited a behavioral plateau part way through the study. Additional tests, administered at 8 and 12 months as well as to an adult grey parrot, demonstrated, respectively, that these birds have some representation of a hidden object and understand advanced invisible displacements.

  12. Ray-optics cloaking devices for large objects in incoherent natural light

    Science.gov (United States)

    Chen, Hongsheng; Zheng, Bin; Shen, Lian; Wang, Huaping; Zhang, Xianmin; Zheludev, Nikolay I.; Zhang, Baile

    2013-10-01

    A cloak that can hide living creatures from sight is a common feature of mythology but still remains unrealized as a practical device. To preserve the wave phase, the previous cloaking solution proposed by Pendry and colleagues required transformation of the electromagnetic space around the hidden object in such a way that the rays bending around the object inside the cloak region have to travel faster than those passing it by. This difficult phase preservation requirement is the main obstacle for building a broadband polarization-insensitive cloak for large objects. Here we propose a simplified version of Pendry’s cloak by abolishing the requirement for phase preservation, as it is irrelevant for observation using incoherent natural light with human eyes, which are phase and polarization insensitive. This allows for a cloak design on large scales using commonly available materials. We successfully demonstrate the cloaking of living creatures, a cat and a fish, from the eye.

  13. Towards the establishment of nonlinear hidden symmetries of the Skyrme model

    International Nuclear Information System (INIS)

    Herrera-Aguilar, A.; Kanakoglou, K.; Paschalis, J. E.

    2006-01-01

    We present a preliminary attempt to establish the existence of hidden nonlinear symmetries of the SU(N) Skyrme model which could, in principle, lead to the further integration of the system. An explicit illustration is given for the SU(2) symmetry group

  14. The Lenten Pastoral Letter: a first public declaration of the hidden ...

    African Journals Online (AJOL)

    Finally, it has been recorded that when asked about the origins of the Pastoral. Letter, one of.the ... voice of the poor. This state of affairs would explain ... discusses the terms 'public' and 'hidden' in the context of power relations and discourse.

  15. Chaotic secure content-based hidden transmission of biometric templates

    International Nuclear Information System (INIS)

    Khan, Muhammad Khurram; Zhang Jiashu; Tian Lei

    2007-01-01

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature

  16. Chaotic secure content-based hidden transmission of biometric templates

    Energy Technology Data Exchange (ETDEWEB)

    Khan, Muhammad Khurram [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China)]. E-mail: khurram.khan@scientist.com; Zhang Jiashu [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China); Tian Lei [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China)

    2007-06-15

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature.

  17. Recent Developments in Supersymmetric and Hidden Sector Dark Matter

    International Nuclear Information System (INIS)

    Feldman, Daniel; Liu Zuowei; Nath, Pran

    2008-01-01

    New results which correlate SUSY dark matter with LHC signals are presented, and a brief review of recent developments in supersymmetric and hidden sector dark matter is given. It is shown that the direct detection of dark matter is very sensitive to the hierarchical SUSY sparticle spectrum and the spectrum is very useful in distinguishing models. It is shown that the prospects of the discovery of neutralino dark matter are very bright on the 'Chargino Wall' due to a copious number of model points on the Wall, where the NLSP is the Chargino, and the spin independent neutralino-proton cross section is maintained at high values in the 10 -44 cm 2 range for neutralino masses up to ∼850 GeV. It is also shown that the direct detection of dark matter along with lepton plus jet signatures and missing energy provide dual, and often complementary, probes of supersymmetry. Finally, we discuss an out of the box possibility for dark matter, which includes dark matter from the hidden sector, which could either consist of extra weakly interacting dark matter (a Stino XWIMP), or milli-charged dark matter arising from the Stueckelberg extensions of the MSSM or the SM.

  18. Detection of hidden explosives by fast neutron activation analysis

    International Nuclear Information System (INIS)

    Li Xinnian; Guo Junpeng; Luo Wenyun; Wang Chuanshan; Fang Xiaoming; Yu Tailiu

    2008-01-01

    The paper describes the method and principle for detection of hidden explosive by fast neutron activation analysis (FNAA). The method of detection of explosives by FNAA has the specific properties of simple determination equipments, high reliability, and low detecting cost, and would be beneficial to the applicability and popularization in the field of protecting and securing nation. The contents of nitrogen and oxygen in four explosives, more then ten common materials and TNT samples covered with soil, were measured by FNAA. 14 MeV fast neutrons were generated from (d, t) reaction with a 400 kV Cockcroft Walton type accelerator. The two-dimension distributions for nitro- gen and oxygen counting rates per unit mass of determined matters were obtained, and the characteristic area of explosives and non-explosives can be defined. By computer aided pattern recognition, the samples were identified with low false alarm or omission rates. The Monte-Carlo simulation indicates that there is no any radiation at 15 m apart from neutron source and is safe for irradiation after 1 h. It is suggested that FNAA may be potential in remote controlling for detection hidden explosive system with multi-probe large array. (authors)

  19. Strong Law of Large Numbers for Hidden Markov Chains Indexed by an Infinite Tree with Uniformly Bounded Degrees

    Directory of Open Access Journals (Sweden)

    Huilin Huang

    2014-01-01

    Full Text Available We study strong limit theorems for hidden Markov chains fields indexed by an infinite tree with uniformly bounded degrees. We mainly establish the strong law of large numbers for hidden Markov chains fields indexed by an infinite tree with uniformly bounded degrees and give the strong limit law of the conditional sample entropy rate.

  20. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were...... available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...