WorldWideScience

Sample records for hidden subgroup minicourse

  1. The Hidden Subgroup Problem

    CERN Document Server

    Wang, Frédéric

    2010-01-01

    We give an overview of the Hidden Subgroup Problem (HSP) as of July 2010, including new results discovered since the survey of arXiv:quant-ph/0411037v1. We recall how the problem provides a framework for efficient quantum algorithms and present the standard methods based on coset sampling. We study the Dihedral and Symmetric HSPs and how they relate to hard problems on lattices and graphs. Finally, we conclude with the known solutions and techniques, describe connections with efficient algorithms as well as miscellaneous variants of HSP. We also bring various contributions to the topic. We show that in theory, we can solve HSP over a given group inductively: the base case is solving HSP over its simple factor groups and the inductive step is building efficient oracles over a normal subgroup N and over the factor group G/N. We apply this analysis to the Dedekindian HSP to get an alternative abelian HSP algorithm based on a change of the underlying group. We also propose a quotient reduction by the normal group...

  2. On quantum algorithms for noncommutative hidden subgroups

    Energy Technology Data Exchange (ETDEWEB)

    Ettinger, M. [Los Alamos National Lab., NM (United States); Hoeyer, P. [Odense Univ. (Denmark)

    1998-12-01

    Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. The authors present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of calls to the input function. They also explore the difficulties of developing an algorithm to process the data to explicitly calculate a generating set for the subgroup. A general framework for the noncommutative hidden subgroup problem is discussed and they indicate future research directions.

  3. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  4. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  5. For Distinguishing Conjugate Hidden Subgroups, the Pretty Good Measurement is as Good as it Gets

    CERN Document Server

    Moore, Cristopher; Moore, Cristopher; Russell, Alexander

    2005-01-01

    Recently Bacon, Childs and van Dam showed that the ``pretty good measurement'' (PGM) is optimal for the Hidden Subgroup Problem on the dihedral group D_n in the case where the hidden subgroup is chosen uniformly from the n involutions. We show that, for any group and any subgroup H, the PGM is the optimal one-register experiment in the case where the hidden subgroup is a uniformly random conjugate of H. We go on to show that when H forms a Gel'fand pair with its parent group, the PGM is the optimal measurement for any number of registers. In both cases we bound the probability that the optimal measurement succeeds. This generalizes the case of the dihedral group, and includes a number of other examples of interest.

  6. The Hidden Subgroup Problem in Affine Groups Basis Selection in Fourier Sampling

    CERN Document Server

    Moore, Cristopher; Russell, A; Schulman, L; Moore, Cristopher; Rockmore, Daniel; Russell, Alexander; Schulman, Leonard

    2002-01-01

    Some quantum algorithms, including Shor's celebrated factoring and discrete log algorithms, proceed by reduction to a hidden subgroup problem, in which a subgroup H of a group G must be determined from a quantum state uniformly supported on a left coset of H. These hidden subgroup problems are then solved by Fourier sampling: the quantum Fourier transform of the state is computed and measured. When the underlying group is non-Abelian, two important variants of the Fourier sampling paradigm have been identified: the weak standard method, where only representation names are measured, and the strong standard method, where full measurement occurs. It has remained open whether the strong standard method is indeed stronger, that is, whether there are hidden subgroups which can be reconstructed via the strong method by not by the weak, or any other known, method. In this article, we settle this question in the affirmative. We show that hidden subgroups of semidirect products of Z/p by Z/q, where q | (p-1) and q >= p...

  7. Explicit Multiregister Measurements for Hidden Subgroup Problems; or, Fourier Sampling Strikes Back

    CERN Document Server

    Moore, Cristopher; Moore, Cristopher; Russell, Alexander

    2005-01-01

    We present an explicit measurement in the Fourier basis that solves an important case of the Hidden Subgroup Problem, including the case to which Graph Isomorphism reduces. This entangled measurement uses k=log_2 |G| registers, and each of the 2^k subsets of the registers contributes some information.

  8. Subexponential-Time Algorithms for Hidden Subgroup Problems Over Product Groups

    CERN Document Server

    Alagic, G; Russell, A; Alagic, Gorjan; Moore, Cristopher; Russell, Alexander

    2006-01-01

    We study the hidden subgroup problem (HSP) over groups of the form G^n where G is a group of constant size. While these groups are structurally simpler than the symmetric groups S_n, for which solving the HSP would yield a quantum algorithm for Graph Isomorphism, they share an important property with S_n: almost all of their irreducible representations are exponentially large. As a consequence, recent negative results show that any quantum algorithm that attempts to solve the HSP over these groups by measuring coset states must perform highly entangled measurements on \\Omega(n) registers. This distinguishes them from, say, the dihedral groups, whose representations are of constant size and where single-register Fourier sampling provides sufficient information to solve the HSP. Here we give quantum algorithms for many groups of this form, which distinguish an order-2 subgroup from the trivial subgroup in time 2^{O(\\sqrt{n \\log n})}. Our algorithm combines the general idea behind Kuperberg's sieve for dihedral ...

  9. Anatomy of a Minicourse. Audiovisual Kit.

    Science.gov (United States)

    Meyer, Rex

    This kit explains the use of minicourses at Macquarie University in New South Wales, Australia, which were designed for the inservice training of teachers. The kit contains the script of the audio commentary, a cassette tape, color slides, and a booklet entitled "Anatomy of the Minicourse." The tape briefly describes the minicourses in general and…

  10. A minicourse on stochastic partial differential equations

    CERN Document Server

    Rassoul-Agha, Firas

    2009-01-01

    In May 2006, The University of Utah hosted an NSF-funded minicourse on stochastic partial differential equations. The goal of this minicourse was to introduce graduate students and recent Ph.D.s to various modern topics in stochastic PDEs, and to bring together several experts whose research is centered on the interface between Gaussian analysis, stochastic analysis, and stochastic partial differential equations. This monograph contains an up-to-date compilation of many of those lectures. Particular emphasis is paid to showcasing central ideas and displaying some of the many deep connections between the mentioned disciplines, all the time keeping a realistic pace for the student of the subject.

  11. Minicourses in Astrophysics, Modular Approach, Vol. I.

    Science.gov (United States)

    Illinois Univ., Chicago.

    This is the first volume of a two-volume minicourse in astrophysics. It contains chapters on the following topics: planetary atmospheres; X-ray astronomy; radio astrophysics; molecular astrophysics; and gamma-ray astrophysics. Each chapter gives much technical discussion, mathematical treatment, diagrams, and examples. References are included with…

  12. Minicourses in Astrophysics, Modular Approach, Vol. II.

    Science.gov (United States)

    Illinois Univ., Chicago.

    This is the second of a two-volume minicourse in astrophysics. It contains chapters on the following topics: stellar nuclear energy sources and nucleosynthesis; stellar evolution; stellar structure and its determination; and pulsars. Each chapter gives much technical discussion, mathematical treatment, diagrams, and examples. References are…

  13. Sorry, Dr. Silberman! Mini-Courses in the High School

    Science.gov (United States)

    Stern, Adele

    1972-01-01

    A teacher describes the informal curriculum" of mini-courses which are presented in addition to the regular curriculum. The author is hopeful that the skills and feelings that are developed will spill over into that other curriculum that has us all enmeshed." (Author/SP)

  14. Sorry, Dr. Silberman! Mini-Courses in the High School

    Science.gov (United States)

    Stern, Adele

    1972-01-01

    A teacher describes the informal curriculum" of mini-courses which are presented in addition to the regular curriculum. The author is hopeful that the skills and feelings that are developed will spill over into that other curriculum that has us all enmeshed." (Author/SP)

  15. Minicourses for Deaf Students in the Intermediate Grades

    Science.gov (United States)

    Anderson, Peter E.; Shepard, Charlotte H.

    1977-01-01

    A minicourse program with students from grades four through eight at the Oregon State School for the Deaf has been rewarding for teachers and students by serving to develop skills in immediate practical areas of the student's experience as well as in developing recreational skills and interests in such activities as chess, mime, and karate, and…

  16. Radioactivity and Man Minicourse, Career Oriented Pre-Technical Physics.

    Science.gov (United States)

    Dallas Independent School District, TX.

    This instructional guide, intended for student use, develops the subject of radioactivity and man through a series of sequential activities. A technical development of the subject is pursued with examples stressing practical aspects of the concepts. Included in the minicourse are: (1) the rationale, (2) terminal behavioral objectives, (3) enabling…

  17. English Mini-Course World Literature (Preliminary, Unedited Version).

    Science.gov (United States)

    Pittsburgh Board of Public Education, PA.

    This curriculum guide to a mini-course in world literature for high school students is restricted to the study of five short novels written in the twentieth century: "Demian" and "Siddhartha" by Hesse, "Platero and I" by Jimenez, "We Never Make Mistakes" by Solzhenitsyn, and "Portrait of the Artist as a Young Man" by Joyce. The objectives of the…

  18. Audio-Tutorial Minicourses for College Algebra and Trigonometry: A Progress Report.

    Science.gov (United States)

    Svoboda, Rudy G.

    Preliminary results are reported for courses in college algebra and trigonometry based on the Postlethwait audio-tutorial minicourse system which were developed at Indiana University-Purdue University at Fort Wayne (IPFW). Two IPFW faculty members, two secondary teachers, and two undergraduate mathematics majors formed a minicourse project team…

  19. Science and Superstition Minicourse, Career Oriented Pre-Technical Physics. Preliminary Edition.

    Science.gov (United States)

    Bullock, Bob; And Others

    This minicourse was prepared for use with secondary physics students in the Dallas Independent School District and is one option in a physics program which provides for the selection of topics on the basis of student career needs and interests. This minicourse was aimed at providing the student with the opportunity to compare scientific theory…

  20. Effects of Training with "Minicourse 18" on Inservice and Preservice Teacher Behavior and Pupil Performance.

    Science.gov (United States)

    Strickler, Darryl J.

    The purposes of this study were to determine the effects of Minicourse 18 on the development of 27 specific teacher behaviors related to teaching reading decoding skills by a group of inservice and preservice teachers of primary grade children, and to determine the effects of the teacher training upon pupil performance in reading. Minicourse 18…

  1. Distributed Cognition Minicourse: An Instructional Intervention to Improve the Effectiveness of One-Day Environmental Education Camps

    Science.gov (United States)

    Broyles, Iris A.

    2011-01-01

    This study evaluated the effectiveness of a distributed cognition hybrid minicourse in increasing a 1-day camp's ability to effect long-term knowledge retention and pro-environment attitudes and behaviors in sixth graders. The preevent-postevent minicourse was designed to reduce cognitive overload generated by an intense immersion into the…

  2. CH 1 Introduction to Chemistry. Study Guide to Minicourse I - 13 Chemical Reaction Principles.

    Science.gov (United States)

    Schlenker, Richard

    Provided is a study guide for an introductory minicourse to the principles of chemical reactions. This written text is designed to accompany a series of audio tapes and 35mm slides which the student studies at his own pace. The course presents chemical kinetics, reaction mechanisms, reaction rates, and equilibrium. (SL)

  3. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  4. Subgroup Balancing Propensity Score

    OpenAIRE

    DONG, JING; Zhang, Junni L; Li, Fan

    2017-01-01

    We investigate the estimation of subgroup treatment effects with observational data. Existing propensity score matching and weighting methods are mostly developed for estimating overall treatment effect. Although the true propensity score should balance covariates for the subgroup populations, the estimated propensity score may not balance covariates for the subgroup samples. We propose the subgroup balancing propensity score (SBPS) method, which selects, for each subgroup, to use either the ...

  5. Long-term efficacy of a mini-course in radiation-reducing techniques in invasive cardiology

    Energy Technology Data Exchange (ETDEWEB)

    Kuon, E. [Klinik Fraenkische Schweiz, Ebermannstadt (Germany). Abt. fuer Kardiologie; Empen, K.; Hummel, A.; Doerr, M.; Reffelmann, T.; Felix, S.B. [Ernst-Moritz-Arndt-Universitaet, Greifswald (Germany). Abt. fuer Innere Medizin B; Weitmann, K.; Hoffmann, W. [Ernst-Moritz-Arndt-Universitaet, Greifswald (Germany). Inst. fuer Versorgungsmedizin; Staudt, A. [Helios Kliniken, Schwerin (Germany). Abt. fuer Kardiologie und Angiologie

    2013-08-15

    Purpose: To validate the long-term efficacy of a 90-min. educational mini-course in less-irradiating cardiac interventional techniques. Materials and Methods: Before, two months after, and two years after the mini-course (periods I, II, and III), we analyzed the following radiation dose parameters for ten coronary angiographies (CA), performed by each of 7 cardiologists: total dose-area product (DAP), radiographic and fluoroscopic DAP fractions, number of radiographic frames and runs, and fluoroscopy time. Results: The median patient DAP for periods I, II and III was 31.4, 15.8 and 8.5 Gy x cm{sup 2}, respectively. The long-term effect was related to shorter median fluoroscopy times (180, 172, and 120 s), shorter (57, 52, and 45) and fewer (12, 12, and 10) radiographic runs, consistent collimation and restriction to an adequate image quality. Both radiographic DAP/frame (28.7, 17.0, and 18.4 mGy x cm{sup 2}) and fluoroscopic DAP/second (45.7, 24.2, and 10.0 mGy x cm{sup 2}) decreased significantly. The multivariate linear regression analysis confirmed the increasing efficacy of the mini-course itself (-44.6 and -60.7 %), and revealed a decreasing influence of the interventionalist's experience (-8.6 % and -4.9 % per 1,000 CAs, lifelong performed until the mini-course). The number of CAs performed after the mini-course did not influence the long-term DAP results. Conclusion: The presented educational mini-course allows a significant, long-lasting, and apparently ongoing reduction of patient radiation exposure due to CA. A self-surveillant documentation of relevant radiation parameters is well suited to monitor and improve each operator's individual long-term radiation-reducing efforts. (orig.)

  6. The stable subgroup graph

    Directory of Open Access Journals (Sweden)

    Behnaz Tolue

    2018-07-01

    Full Text Available In this paper we introduce stable subgroup graph associated to the group $G$. It is a graph with vertex set all subgroups of $G$ and two distinct subgroups $H_1$ and $H_2$ are adjacent if $St_{G}(H_1\\cap H_2\

  7. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  8. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  9. Humanities mini-course curricula for midcareer health professionals at the Penn State Milton S. Hershey Medical Center.

    Science.gov (United States)

    Myers, Kimberly R; George, Daniel R

    2012-08-01

    The field of medical humanities has traditionally focused on medical students and, more recently, on premedical undergraduates. Comparatively little formal humanities pedagogy has been dedicated to midcareer health professionals. To address this lack, the Department of Humanities at the Pennsylvania State University College of Medicine and the Milton S. Hershey Medical Center designed eight annual humanities mini-courses for faculty and staff throughout the college and medical center.These mini-courses fell into four categories: reading, reflection, and discussion; creative expression; technology; and ethics. They were geared toward midcareer health professionals who were seeking new intellectual and creative stimulation and variety in daily routine. They also provided humanities faculty the opportunity to devote attention to topics that capitalize on their professional training and that interest them personally.Participants indicated a high degree of satisfaction with the mini-courses for four principal reasons: (1) learning the tools and methodologies of a new discipline or domain other than biomedicine, (2) using their minds and training in uncustomary ways, (3) forming new alliances with colleagues (which served to lessen the sense of professional isolation), and (4) enjoying a respite from the stressful flow of the workday. Humanities faculty facilitators provided more mixed responses but agreed that conducting the mini-courses had been a positive overall experience.Although this article provides a foundational framework for the development of a humanities mini-course series, the authors encourage others to replicate these curricula in other medical settings as an important step toward a robust pedagogy designed for midcareer health care professionals.

  10. Finite groups all of whose minimal subgroups are *-subgroups

    Indian Academy of Sciences (India)

    Yonggang Li; Xianggui Zhong

    2014-11-01

    Let be a finite group. A subgroup of is called an -subgroup of if it satisfies $H^G \\cap N_{G}(H) = H$. A subgroup of is said to be a *-subgroup of if there exists a subnormal subgroup of such that = and $H \\cap T$ is a -subgroup of . In this article, we investigate the structure of under the assumption that subgroups of prime order are *-subgroups of . The finite groups, all of whose minimal subgroups of the generalized Fitting subgroup are *-subgroups are classified.

  11. The Congruence Subgroup Problem

    Indian Academy of Sciences (India)

    M S Raghunathan

    2004-11-01

    This is a short survey of the progress on the congruence subgroup problem since the sixties when the first major results on the integral unimodular groups appeared. It is aimed at the non-specialists and avoids technical details.

  12. Subgroups Among Opiate Addicts

    Science.gov (United States)

    Berzins, Juris I.; And Others

    1974-01-01

    The principal objective of the present investigation was to delineate homogeneous MMPI profile subgroups (types) through multivariate clustering procedures and to compare the derived (replicable) types on measures of the components of "sociopathy" as well as on other psychometric devices. (Author)

  13. Subgroups Among Opiate Addicts

    Science.gov (United States)

    Berzins, Juris I.; And Others

    1974-01-01

    The principal objective of the present investigation was to delineate homogeneous MMPI profile subgroups (types) through multivariate clustering procedures and to compare the derived (replicable) types on measures of the components of "sociopathy" as well as on other psychometric devices. (Author)

  14. FINITE GROUPS WHOSE MINIMAL SUBGROUPS ARE WEAKLY H-SUBGROUPS

    Institute of Scientific and Technical Information of China (English)

    M.M.Al-Mosa Al-Shomrani; M.Ramadan; A.A.Heliel

    2012-01-01

    Let G be a finite group.A subgroup H of G is called an H-subgroup in G if NG(H) ∩H9 ≤ H for all g ∈ G.A subgroup H of G is called a weakly H-subgroup in G if there exists a normal subgroup K of G such that G =HK and H ∩ K is an H-subgroup in G.In this paper,we investigate the structure of the finite group G under the assumption that every subgroup of G of prime order or of order 4 is a weakly H-subgroup in G.Our results improve and generalize several recent results in the literature.

  15. An Introduction to Chemistry for Merchant Marine Oriented Individuals (Ch-1 and Ch-1C). A Study Guide to Minicourse D-1, Elementary Background.

    Science.gov (United States)

    Schlenker, Richard M.; Dillon, Timothy

    This document contains lab activities, problem sets, and a tape script to be accompanied by a slide show. The minicourse covers the following topics of general chemistry: kinetic-molecular theory, the Bohr atom, acids, bases, and salts, the periodic table, bonding, chemical equations, the metric system, computation of density, mass, and volume,…

  16. Teacher Behavior and Pupil Performance Related to a Training Program for In-Service and Preservice Teachers Based Upon Minicourse Eighteen: "Teaching Reading as Decoding."

    Science.gov (United States)

    Strickler, Darryl J.

    The objectives of this investigation were (1) to study the effects of Minicourse Eighteen, "Teaching Reading as Decoding," upon the development of 27 specific teacher behaviors related to teaching reading decoding skills in a panel of 33 inservice and preservice teachers; and (2) to study the effects of teacher training, or lack of training, with…

  17. Maximal subgroups of finite groups

    Directory of Open Access Journals (Sweden)

    S. Srinivasan

    1990-01-01

    Full Text Available In finite groups maximal subgroups play a very important role. Results in the literature show that if the maximal subgroup has a very small index in the whole group then it influences the structure of the group itself. In this paper we study the case when the index of the maximal subgroups of the groups have a special type of relation with the Fitting subgroup of the group.

  18. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  19. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  20. Congruence Subgroups of Hecke Groups

    Institute of Scientific and Technical Information of China (English)

    Bo CHEN; Ping Zhi YUAN

    2009-01-01

    Hecke groups are an important tool in investigating functional equations, and congruence subgroups of Hecke groups play an important rule in research of the solutions of the Dirichlet series.When q, m are two primes, congruence subgroups and the principal congruence subgroups of level m of the Hecke group H(√q) have been investigated in many papers. In this paper, we generalize these results to the case where q is a positive integer with q ≥ 5, √q ¢ Z and m is a power of an odd prime.

  1. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  2. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  3. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  4. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  5. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  6. Finite Groups with Some -Supplemented Subgroups

    Directory of Open Access Journals (Sweden)

    Guo Zhong

    2013-01-01

    Full Text Available Let be a subgroup of a finite group , a prime dividing the order of , and a Sylow -subgroup of for prime We say that is -supplemented in if there is a subgroup of such that and where denotes the subgroup of generated by all those subgroups of which are -quasinormally embedded in In this paper, we characterize -nilpotency and supersolvability of under the assumption that all maximal subgroups of are -supplemented in .

  7. Soft n-Ary Subgroups

    Directory of Open Access Journals (Sweden)

    D.R. Prince Williams

    2015-09-01

    Full Text Available Soft set theory plays a vital role in solving many complicated problems with inherited uncertainty. An n-ary algebraic systems is a generalization of algebraic structures and it is the most natural way for the further development, deeper understanding of their properties. In this paper, we apply soft set theory to an n-ary algebraic systems and introduce the notions of soft n-ary groups and soft n-ary subgroups. Further, some operations on soft sets are extended to the former. Finally, we provide the characterization of soft n-ary subgroups over an n-ary group (G,f and study their related properties.

  8. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  9. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  10. Virtual Amalgamation of Relatively Quasiconvex Subgroups

    CERN Document Server

    Martinez-Pedroza, Eduardo

    2012-01-01

    For relatively hyperbolic groups, we investigate conditions guaranteeing that the subgroup generated by two relatively quasiconvex subgroups $Q_1$ and $Q_2$ is relatively quasiconvex and isomorphic to $Q_1 \\ast_{Q_1 \\cap Q_2} Q_2$. The main theorem extends results for quasiconvex subgroups of word-hyperbolic groups, and results for discrete subgroups of isometries of hyperbolic spaces.

  11. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  12. Finite groups in which some particular subgroups are TI-subgroups

    DEFF Research Database (Denmark)

    Shi, Jiangtao; Zhang, Cui

    2013-01-01

    We prove that G is a group in which all noncyclic subgroups are TI-subgroups if and only if all noncyclic subgroups of G are normal in G. Moreover, we classify groups in which all subgroups of even order are TI-subgroups....

  13. The impact of subgroup type and subgroup configurational properties on work team performance.

    Science.gov (United States)

    Carton, Andrew M; Cummings, Jonathon N

    2013-09-01

    Scholars have invoked subgroups in a number of theories related to teams, yet certain tensions in the literature remain unresolved. In this article, we address 2 of these tensions, both relating to how subgroups are configured in work teams: (a) whether teams perform better with a greater number of subgroups and (b) whether teams perform better when they have imbalanced subgroups (majorities and minorities are present) or balanced subgroups (subgroups are of equal size). We predict that the impact of the number and balance of subgroups depends on the type of subgroup-whether subgroups are formed according to social identity (i.e., identity-based subgroups) or information processing (i.e., knowledge-based subgroups). We first propose that teams are more adversely affected by 2 identity-based subgroups than by any other number, yet the uniquely negative impact of a 2-subgroup configuration is not apparent for knowledge-based subgroups. Instead, a larger number of knowledge-based subgroups is beneficial for performance, such that 2 subgroups is worse for performance when compared with 3 or more subgroups but better for performance when compared with no subgroups or 1 subgroup. Second, we argue that teams perform better when identity-based subgroups are imbalanced yet knowledge-based subgroups are balanced. We also suggest that there are interactive effects between the number and balance of subgroups-however, the nature of this interaction depends on the type of subgroup. To test these predictions, we developed and validated an algorithm that measures the configurational properties of subgroups in organizational work teams. Results of a field study of 326 work teams from a multinational organization support our predictions.

  14. Subgroup finding via Bayesian additive regression trees.

    Science.gov (United States)

    Sivaganesan, Siva; Müller, Peter; Huang, Bin

    2017-03-09

    We provide a Bayesian decision theoretic approach to finding subgroups that have elevated treatment effects. Our approach separates the modeling of the response variable from the task of subgroup finding and allows a flexible modeling of the response variable irrespective of potential subgroups of interest. We use Bayesian additive regression trees to model the response variable and use a utility function defined in terms of a candidate subgroup and the predicted response for that subgroup. Subgroups are identified by maximizing the expected utility where the expectation is taken with respect to the posterior predictive distribution of the response, and the maximization is carried out over an a priori specified set of candidate subgroups. Our approach allows subgroups based on both quantitative and categorical covariates. We illustrate the approach using simulated data set study and a real data set. Copyright © 2017 John Wiley & Sons, Ltd.

  15. Prevalence and clinical value of IgA and hidden rheumatoid factors ...

    African Journals Online (AJOL)

    Ehab

    diagnosed early and a small subgroup of patients has positive IgM rheumatoid factor (RF) ... systemic lupus erythematosus patients and 32 healthy subjects were studied as controls. ... Key words: juvenile rheumatoid arthritis, rheumatoid factors, IgA-RF, hidden. RF, SLE. ... examination, systemic manifestations and current.

  16. ON COMPLEMENTED SUBGROUPS OF FINITE GROUPS

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A subgroup H of a finite group G is said to be complemented in G if there exists a subgroup K of G such that G = HK and H ∩ K = 1. In this case, K is called a complement of H in G.In this note some results on complemented subgroups of finite groups are obtained.

  17. Research methods for subgrouping low back pain

    DEFF Research Database (Denmark)

    Kent, Peter; Keating, Jennifer L; Leboeuf-Yde, Charlotte

    2010-01-01

    important distinctions in their treatment needs or prognoses. Due to a proliferation of research methods and variability in how subgrouping results are interpreted, it is timely to open discussion regarding a conceptual framework for the research designs and statistical methods available for subgrouping...... studies (a method framework). The aims of this debate article are: (1) to present a method framework to inform the design and evaluation of subgrouping research in low back pain, (2) to describe method options when investigating prognostic effects or subgroup treatment effects, and (3) to discuss...... the strengths and limitations of research methods suitable for the hypothesis-setting phase of subgroup studies....

  18. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  19. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  20. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  1. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  2. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  3. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group.......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  4. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of offshor...... of our study is to suggest how hidden costs of offshoring can be mitigated through an explicit orientation towards improving organizational processes and structures as well as experience with offshoring.......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  5. Genetic markers for schizophrenic subgroups.

    Science.gov (United States)

    Lange, V

    1982-01-01

    By the study of hereditary serum protein markers in psychotic patients and normal controls, a surplus of Gc 1-1 (p less than 0.01) and transferrin B variants (p less than 0.0027) has been established in schizophrenias. Affective psychoses are characterized by an excess of the haptoglobin (Hp) serum type 2-2 (p less than 0.001). These general statements have to be modified in regard to the clinical and psychopathological subdivision beyond the traditional classification into two major groups of endogenous mental disease. Using Leonhard's criteria, the prevalence of Gc 1-1 is restricted to the systematic schizophrenias reaching its highest value in hebephrenias, which are followed by paraphrenic and catatonic forms in this trait. In contrast to this, periodical catatonia and affective paraphrenia, classified as subgroups of the unsystematic schizophrenias, have Gc 1-1 frequencies like healthy controls. On the other hand, the Hp 2-2 value is not increased in the systematic schizophrenias, but it displays a relative overplus in the unsystematic forms. Concerning the Hp 2-2 and Gc 1-1 frequencies a certain similarity can be observed between affective paraphrenia and the paranoid psychoses with late onset, it they are characterized by a cyclic axis syndrome as described by the Vienna school. The cycloid psychoses are marked by an extreme surplus of Hp 2-2 (p less than 0.001) and an overweight of Gc 1-1 (p less than 0.05). Probably the Gc and Hp alleles play a role as risk factors or accidental effectors in the multifactorial genetic systems responsible for the biological background of psychoses. For both serum systems a selective interaction is discussed considering the vitamin D transport by the Gc proteins with the relation to neuronal consolidation and the possible influence of Hp 2-2 on transport and receptor functions.

  6. Maximal Subgroups of Skew Linear Groups

    Institute of Scientific and Technical Information of China (English)

    M. Mahdavi-Hezavehi

    2002-01-01

    Let D be an infinite division algebra of finite dimension over its centre Z(D) = F, and n a positive integer. The structure of maximal subgroups of skew linear groups are investigated. In particular, assume N is a normal subgroup of GLn(D) and M is a maximal subgroup of N containing Z(N). It is shown that if M/Z(N) is finite, then N is central.

  7. The Power of Strong Fourier Sampling: Quantum Algorithms for Affine Groups and Hidden Shifts

    CERN Document Server

    Moore, Cristopher; Russell, A; Schulman, L J; Moore, Cristopher; Rockmore, Daniel; Russell, Alexander; Schulman, Leonard J.

    2005-01-01

    Many quantum algorithms, including Shor's celebrated factoring and discrete log algorithms, proceed by reduction to a Hidden Subgroup problem, in which an unknown subgroup H of a group G must be determined from a uniform superposition on a left coset of H. These hidden subgroup problems are typically solved by Fourier sampling. When G is nonabelian, two important variants of Fourier sampling have been identified: the weak standard method, where only representation names are measured, and the strong standard method, where full measurement (i.e., the row and column of the representation, in a suitably chosen basis) occurs. It has remained open whether the strong standard method is indeed stronger. In this article, we settle this question in the affirmative. We show that hidden subgroups H of the q-hedral groups, i.e., semidirect products Z_q \\ltimes Z_p where q | (p-1), and in particular the affine groups A_p, can be information-theoretically reconstructed using the strong standard method. Moreover, if |H| = p/...

  8. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  9. Existence of a dictatorial subgroup in social choice with independent subgroup utility scales, an alternative proof

    NARCIS (Netherlands)

    Khmelnitskaya, Anna Borisovna; van Deemen, Adrian; Rusinowska, Agnieszka

    2010-01-01

    Social welfare orderings for different scales of individual utility measurement in distinct population subgroups are studied. In Khmelnitskaya (2000), employing the continuous version of Arrow’s impossibility theorem, it was shown that for combinations of independent subgroups scales every

  10. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  11. Class-Preserving Coleman Automorphisms of Finite Groups Whose Second Maximal Subgroups Are TI-Subgroups

    Institute of Scientific and Technical Information of China (English)

    Zhengxing LI; Jinke HAI

    2013-01-01

    Recall that a subgroup H of a finite group G is called a TI-subgroup if H ∩ Hg =1or H for each g ∈ G.Suppose that G is a finite group whose second maximal subgroups are TI-subgroups.It is shown that every class-preserving Coleman automorphism of G is an inner automorphism.As an immediate consequence of this result,we obtain that the normalizer property holds for G.

  12. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  13. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  14. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  15. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  16. Subgroup effects despite homogeneous heterogeneity test results

    Directory of Open Access Journals (Sweden)

    Lubsen Jacobus

    2010-05-01

    Full Text Available Abstract Background Statistical tests of heterogeneity are very popular in meta-analyses, as heterogeneity might indicate subgroup effects. Lack of demonstrable statistical heterogeneity, however, might obscure clinical heterogeneity, meaning clinically relevant subgroup effects. Methods A qualitative, visual method to explore the potential for subgroup effects was provided by a modification of the forest plot, i.e., adding a vertical axis indicating the proportion of a subgroup variable in the individual trials. Such a plot was used to assess the potential for clinically relevant subgroup effects and was illustrated by a clinical example on the effects of antibiotics in children with acute otitis media. Results Statistical tests did not indicate heterogeneity in the meta-analysis on the effects of amoxicillin on acute otitis media (Q = 3.29, p = 0.51; I2 = 0%; T2 = 0. Nevertheless, in a modified forest plot, in which the individual trials were ordered by the proportion of children with bilateral otitis, a clear relation between bilaterality and treatment effects was observed (which was also found in an individual patient data meta-analysis of the included trials: p-value for interaction 0.021. Conclusions A modification of the forest plot, by including an additional (vertical axis indicating the proportion of a certain subgroup variable, is a qualitative, visual, and easy-to-interpret method to explore potential subgroup effects in studies included in meta-analyses.

  17. Subgroup identification from randomized clinical trial data.

    Science.gov (United States)

    Foster, Jared C; Taylor, Jeremy M G; Ruberg, Stephen J

    2011-10-30

    We consider the problem of identifying a subgroup of patients who may have an enhanced treatment effect in a randomized clinical trial, and it is desirable that the subgroup be defined by a limited number of covariates. For this problem, the development of a standard, pre-determined strategy may help to avoid the well-known dangers of subgroup analysis. We present a method developed to find subgroups of enhanced treatment effect. This method, referred to as 'Virtual Twins', involves predicting response probabilities for treatment and control 'twins' for each subject. The difference in these probabilities is then used as the outcome in a classification or regression tree, which can potentially include any set of the covariates. We define a measure Q(Â) to be the difference between the treatment effect in estimated subgroup  and the marginal treatment effect. We present several methods developed to obtain an estimate of Q(Â), including estimation of Q(Â) using estimated probabilities in the original data, using estimated probabilities in newly simulated data, two cross-validation-based approaches, and a bootstrap-based bias-corrected approach. Results of a simulation study indicate that the Virtual Twins method noticeably outperforms logistic regression with forward selection when a true subgroup of enhanced treatment effect exists. Generally, large sample sizes or strong enhanced treatment effects are needed for subgroup estimation. As an illustration, we apply the proposed methods to data from a randomized clinical trial.

  18. Clinically relevant subgroups in COPD and asthma

    Directory of Open Access Journals (Sweden)

    Alice M. Turner

    2015-06-01

    Full Text Available As knowledge of airways disease has grown, it has become apparent that neither chronic obstructive pulmonary disease (COPD nor asthma is a simple, easily defined disease. In the past, treatment options for both diseases were limited; thus, there was less need to define subgroups. As treatment options have grown, so has our need to predict who will respond to new drugs. To date, identifying subgroups has been largely reported by detailed clinical characterisation or differences in pathobiology. These subgroups are commonly called “phenotypes”; however, the problem of defining what constitutes a phenotype, whether this should include comorbid diseases and how to handle changes over time has led to the term being used loosely. In this review, we describe subgroups of COPD and asthma patients whose clinical characteristics we believe have therapeutic or major prognostic implications specific to the lung, and whether these subgroups are constant over time. Finally, we will discuss whether the subgroups we describe are common to both asthma and COPD, and give some examples of how treatment might be tailored in patients where the subgroup is clear, but the label of asthma or COPD is not.

  19. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  20. Identification of subgroups among fibromyalgia patients

    Directory of Open Access Journals (Sweden)

    D. Chaleil

    2012-09-01

    Full Text Available This paper presents some hypotheses concerning the identification of homogeneous subgroups among fibromyalgia (FM patients in order to improve the management of the disease. It also reviews the available literature about this subject. Three methods for subgrouping are discussed according to clinical features, biomarkers, and gait analysis. Clinical subgrouping based on cluster analysis has been used for the identification of homogeneous subgroups of patients and, more recently, homogeneous clinical features. So far, longitudinal studies using clinical subgroups to direct treatment and predict outcome are still required. Biomarkers in FM, which is a neurobiological disease, are of promising interest, nevertheless currently, none of them can be used to subgroup FM patients. Due to the fact that cortical and subcortical mechanisms of gait control share some cognitive functions which are involved in FM, gait markers have been proposed to evaluate and to subgroup FM patients, in clinical settings. Three out of 4 core FM symptoms are linked to gait markers. Kinesia measured by means of cranio-caudal power is correlated to pain, and could be proposed to assess pain behavior (kinesiophobia. Stride frequency, which is linked to physical component, allows the identification of a hyperkinetic subgroup. Moreover, SF has been correlated to fatigue during the 6 minute walking test. Stride regularity, which expresses the unsteadiness of gait, is correlated to cognitive dysfunction in FM. Decreased stride regularity allows the recognition of a homogeneous subgroup characterized by an increased anxiety and depression, and decreased cognitive functions. These results need further studies to be validated and so used in the daily clinical practice.

  1. Identification of subgroups among fibromyalgia patients.

    Science.gov (United States)

    Auvinet, B; Chaleil, D

    2012-09-28

    This paper presents some hypotheses concerning the identification of homogeneous subgroups among fibromyalgia (FM) patients in order to improve the management of the disease. It also reviews the available literature about this subject. Three methods for subgrouping are discussed according to clinical features, biomarkers, and gait analysis. Clinical subgrouping based on cluster analysis has been used for the identification of homogeneous subgroups of patients and, more recently, homogeneous clinical features. So far, longitudinal studies using clinical subgroups to direct treatment and predict outcome are still required. Biomarkers in FM, which is a neurobiological disease, are of promising interest, nevertheless currently, none of them can be used to subgroup FM patients. Due to the fact that cortical and subcortical mechanisms of gait control share some cognitive functions which are involved in FM, gait markers have been proposed to evaluate and to subgroup FM patients, in clinical settings. Three out of 4 core FM symptoms are linked to gait markers. Kinesia measured by means of cranio-caudal power is correlated to pain, and could be proposed to assess pain behavior (kinesiophobia). Stride frequency, which is linked to physical component, allows the identification of a hyperkinetic subgroup. Moreover, SF has been correlated to fatigue during the 6 minute walking test. Stride regularity, which expresses the unsteadiness of gait, is correlated to cognitive dysfunction in FM. Decreased stride regularity allows the recognition of a homogeneous subgroup characterized by an increased anxiety and depression, and decreased cognitive functions. These results need further studies to be validated and so used in the daily clinical practice.

  2. SUBGR: A Program to Generate Subgroup Data for the Subgroup Resonance Self-Shielding Calculation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kang Seog [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-06-06

    The Subgroup Data Generation (SUBGR) program generates subgroup data, including levels and weights from the resonance self-shielded cross section table as a function of background cross section. Depending on the nuclide and the energy range, these subgroup data can be generated by (a) narrow resonance approximation, (b) pointwise flux calculations for homogeneous media; and (c) pointwise flux calculations for heterogeneous lattice cells. The latter two options are performed by the AMPX module IRFFACTOR. These subgroup data are to be used in the Consortium for Advanced Simulation of Light Water Reactors (CASL) neutronic simulator MPACT, for which the primary resonance self-shielding method is the subgroup method.

  3. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  4. Pentaquark states with hidden charm

    Science.gov (United States)

    Bijker, Roelof

    2017-07-01

    I develop an extension of the usual three-flavor quark model to four flavors (u, d, s and c), and discuss the classification of pentaquark states with hidden charm. This work is motivated by the recent observation of such states by the LHCb Collatoration at CERN.

  5. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  6. Current Activities of the ASME Subgroup NUPACK

    Energy Technology Data Exchange (ETDEWEB)

    Gerald M. Foster; D. Keith Morton; Paul McConnell

    2007-10-01

    Current activities of the American Society of Mechanical Engineers (ASME), Section III Subgroup on Containment Systems for Spent Fuel High-Level Waste Transport Packagings (also known as Subgroup NUPACK) are reviewed with emphasis on the recent revision of Subsection WB. Also, brief insightson new proposals for the development of rules for internal support structures and for a strain-based acceptance criteria are provided.

  7. Constructing arithmetic subgroups of unipotent groups

    OpenAIRE

    de Graaf, Willem; Pavan, Andrea

    2008-01-01

    Let G be a unipotent algebraic subgroup of some GL_m(C) defined over Q. We describe an algorithm for finding a finite set of generators of the subgroup G(Z) = G \\cap GL_m(Z). This is based on a new proof of the result (in more general form due to Borel and Harish-Chandra) that such a finite generating set exists.

  8. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  9. Subgroup Discovery Algorithms:A Survey and Empirical Evaluation

    Institute of Scientific and Technical Information of China (English)

    Sumyea Helal

    2016-01-01

    Subgroup discovery is a data mining technique that discovers interesting associations among different variables with respect to a property of interest. Existing subgroup discovery methods employ different strategies for searching, pruning and ranking subgroups. It is very crucial to learn which features of a subgroup discovery algorithm should be considered for generating quality subgroups. In this regard, a number of reviews have been conducted on subgroup discovery. Although they provide a broad overview on some popular subgroup discovery methods, they employ few datasets and measures for subgroup evaluation. In the light of the existing measures, the subgroups cannot be appraised from all perspectives. Our work performs an extensive analysis on some popular subgroup discovery methods by using a wide range of datasets and by defining new measures for subgroup evaluation. The analysis result will help with understanding the major subgroup discovery methods, uncovering the gaps for further improvement and selecting the suitable category of algorithms for specific application domains.

  10. Rapid diagnosis of medulloblastoma molecular subgroups

    Science.gov (United States)

    Schwalbe, Ed C.; Lindsey, Janet C.; Straughton, Debbie; Hogg, Twala L.; Cole, Michael; Megahed, Hisham; Ryan, Sarra L.; Lusher, Meryl E.; Taylor, Michael D.; Gilbertson, Richard J.; Ellison, David W.; Bailey, Simon; Clifford, Steven C.

    2011-01-01

    PURPOSE Microarray studies indicate medulloblastoma comprises distinct molecular disease subgroups, which offer potential for improved clinical management. EXPERIMENTAL DESIGN Minimal mRNA expression signatures diagnostic for the Wnt/Wingless (WNT) and Sonic Hedgehog (SHH) subgroups were developed, validated and used to assign subgroup affiliation in 173 tumours from four independent cohorts, alongside a systematic investigation of subgroup clinical and molecular characteristics. RESULTS WNT tumours (12% (21/173)) were diagnosed >5 years of age (peak, 10 years), displayed classic histology, CTNNB1 mutation (19/20), associated chromosome 6 loss and have previously been associated with favourable prognosis. SHH cases (24% (42/173)) predominated in infants (<3 years) and showed an age-dependent relationship to desmoplastic/nodular pathology; all infant desmoplastic/nodular cases (previously associated with a good outcome) were SHH-positive, but these relationships broke down in non-infants. PTCH1 mutations were common (34%; 11/32), but PTCH1 exon1c hypermethylation, chromosome 9q and REN (KCTD11) genetic loss were not SHH-associated, and SMO or SUFU mutation, PTCH1 exon1a or SUFU hypermethylation did not play a role, indicating novel activating mechanisms in the majority of SHH cases. SHH tumours were associated with an absence of COL1A2 methylation. WNT/SHH-independent medulloblastomas (64% (110/173)) showed all histologies, peaked at 3-6 years, and were exclusively associated with chromosome 17p loss. CONCLUSIONS Medulloblastoma subgroups are characterised by distinct genomic, epigenomic and clinico-pathological features, and clinical outcomes. Validated array-independent gene expression assays for the rapid assessment of subgroup affiliation in small biopsies, provide a basis for their routine clinical application, in strategies including molecular disease-risk stratification and delivery of targeted therapeutics. PMID:21325292

  11. On c*-Normal Subgroups in Finite Groups

    Institute of Scientific and Technical Information of China (English)

    Hua Quan WEI; Wei Ping GU; Hong Fei PAN

    2012-01-01

    A subgroup H of a finitegroup G is called a c*-normal subgroup of G if there exists a normal subgroup K of G such that G =HK and H ∩ K is an S-quasinormal embedded subgroup of G.In this paper,the structure of a finite group G with some c*-normal maximal subgroups of Sylow subgroups is characterized and some known related results are generalized.

  12. Existence of a dictatorial subgroup in social choice with independent subgroup utility scales, an alternative proof

    NARCIS (Netherlands)

    Khmelnitskaya, Anna B.; Deemen, van Adrian; Rusinowska, Agnieszka

    2010-01-01

    Social welfare orderings for different scales of individual utility measurement in distinct population subgroups are studied. In Khmelnitskaya (2000), employing the continuous version of Arrow’s impossibility theorem, it was shown that for combinations of independent subgroups scales every correspon

  13. Interpretation of Subgroup Effects in Published Trials

    DEFF Research Database (Denmark)

    Hancock, Mark J; Kjær, Per; Korsholm, Lars;

    2013-01-01

    that report on treatment effect modifiers (subgroups) for specific physical therapy interventions. The key messages are: (1) point estimates of treatment modifier effect size (interaction effect) and their confidence intervals can be calculated using group-level data when individual patient-level data...

  14. Assessing Subgroup Differences in Item Response Times.

    Science.gov (United States)

    Schnipke, Deborah L.; Pashley, Peter J.

    Differences in test performance on time-limited tests may be due in part to differential response-time rates between subgroups, rather than real differences in the knowledge, skills, or developed abilities of interest. With computer-administered tests, response times are available and may be used to address this issue. This study investigates…

  15. Representations of Subgroups of Universal Triangle Groups

    Institute of Scientific and Technical Information of China (English)

    Jianguo Xia

    2007-01-01

    Let G be a universal triangle group, and H a subgroup of G such that the chamber system △H is a tight triangle geometryThen H, which is canonically isomorphic to the topological fundamental group π1(△H) of △ H, is a finitely presented group.For some H we give their representations.

  16. Zero-Sum Problems with Subgroup Weights

    Indian Academy of Sciences (India)

    S D Adhikari; A A Ambily; B Sury

    2010-06-01

    In this note, we generalize some theorems on zero-sums with weights from [1], [4] and [5] in two directions. In particular, we consider $\\mathbb{Z}^d_p$ for a general and subgroups of $Z^∗_p$ as weights.

  17. Attention Deficit Disorder (ADDH) and Delinquency Subgroups

    OpenAIRE

    J Gordon Millichap

    1988-01-01

    Two subgroups of hyperactive children (25 non-delinquent and 9 delinquent) and 1 group of 34 non-delinquent normal children were evaluated from childhood to adolescence at the National Center for Hyperactive Children, Encino, CA, using auditory evoked response potential (AERP) measures and EEG recordings.

  18. Enhancement of hidden symmetries and Chern-Simons couplings

    CERN Document Server

    Henneaux, Marc; Lekeu, Victor

    2015-01-01

    We study the role of Chern--Simons couplings for the appearance of enhanced symmetries of Cremmer--Julia type in various theories. It is shown explicitly that for generic values of the Chern--Simons coupling there is only a parabolic Lie subgroup of symmetries after reduction to three space-time dimensions but that this parabolic Lie group gets enhanced to the full and larger Cremmer--Julia Lie group of hidden symmetries if the coupling takes a specific value. This is heralded by an enhanced isotropy group of the metric on the scalar manifold. Examples of this phenomenon are discussed as well as the relation to supersymmetry. Our results are also connected with rigidity theorems of Borel-like algebras.

  19. A Note on TI-Subgroups of Finite Groups

    Indian Academy of Sciences (India)

    Jiakuan Lu; Linna Pang

    2012-02-01

    A subgroup of a finite group is called a TI-subgroup if $H\\cap H^x=1$ or for any $x\\in G$. In this short note, the finite groups all of whose nonabelian subgroups are TI-subgroups are classified.

  20. Finite Groups with c-Supplemented Minimal Subgroups

    Institute of Scientific and Technical Information of China (English)

    Yanming Wang; Yangming Li; Jingtong Wang

    2003-01-01

    A subgroup H is said to be c-supplemented in a finite group G if there exists a subgroup K of G such that HK = G and H∩K is contained in CoreG(H).We determine the structure of finite groups G with the minimal subgroup of the generalized Fitting subgroup of some normal subgroup of G c-supplemented in G.We also generalize some known results.

  1. Clinical subgroups in bilateral Meniere disease

    OpenAIRE

    2016-01-01

    Meniere disease (MD) is a heterogeneous clinical condition characterized by sensorineural hearing loss, episodic vestibular symptoms and tinnitus associated with several comorbidities such as migraine or autoimmune disorders (AD). The frequency of bilateral involvement may range from 5-50% and it depends on the duration of the disease. We have performed a two-step cluster analysis in 398 patients with bilateral MD to identify the best predictors to define clinical subgroups with a potential d...

  2. On an equivalence of fuzzy subgroups III

    Directory of Open Access Journals (Sweden)

    V. Murali

    2003-01-01

    Full Text Available This paper is the third in a series of papers studying equivalence classes of fuzzy subgroups of a given group under a suitable equivalence relation. We introduce the notion of a pinned flag in order to study the operations sum, intersection and union, and their behavior with respect to the equivalence. Further, we investigate the extent to which a homomorphism preserves the equivalence. Whenever the equivalences are not preserved, we have provided suitable counterexamples.

  3. MPACT Subgroup Self-Shielding Efficiency Improvements

    Energy Technology Data Exchange (ETDEWEB)

    Stimpson, Shane [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Liu, Yuxuan [Univ. of Michigan, Ann Arbor, MI (United States); Collins, Benjamin S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Clarno, Kevin T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-08-31

    Recent developments to improve the efficiency of the MOC solvers in MPACT have yielded effective kernels that loop over several energy groups at once, rather that looping over one group at a time. These kernels have produced roughly a 2x speedup on the MOC sweeping time during eigenvalue calculation. However, the self-shielding subgroup calculation had not been reevaluated to take advantage of these new kernels, which typically requires substantial solve time. The improvements covered in this report start by integrating the multigroup kernel concepts into the subgroup calculation, which are then used as the basis for further extensions. The next improvement that is covered is what is currently being termed as “Lumped Parameter MOC”. Because the subgroup calculation is a purely fixed source problem and multiple sweeps are performed only to update the boundary angular fluxes, the sweep procedure can be condensed to allow for the instantaneous propagation of the flux across a spatial domain, without the need to sweep along all segments in a ray. Once the boundary angular fluxes are considered to be converged, an additional sweep that will tally the scalar flux is completed. The last improvement that is investigated is the possible reduction of the number of azimuthal angles per octant in the shielding sweep. Typically 16 azimuthal angles per octant are used for self-shielding and eigenvalue calculations, but it is possible that the self-shielding sweeps are less sensitive to the number of angles than the full eigenvalue calculation.

  4. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  5. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  6. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  7. First finding of subgroup-E avian leukosis virus from wild ducks in China.

    Science.gov (United States)

    Hao, Ruijun; Han, Chunyan; Liu, Lanlan; Zeng, Xiangwei

    2014-10-10

    To analyze the status of avian leukosis virus subgroup E (ALV-E) in wild ducks in China, we collected 276 wild ducks, including 12 species, from four provinces of China. The PCR detection for ALV-E identified four samples as positive samples and the detection rate was 1.45%. The env sequences of ALV-E were cloned and sequenced. In gp85, genes of the four ALV-E strains showed a high homology (98.1-99.5%) with ev-1, ev-3, and SD0501 and more than 90% homology with other subgroup-A and subgroup-B avian leukosis viruses. However, they showed a slightly lower identity with subgroup-J (NX0101 and HPRS103), from 47.5 to 48.1%. Simultaneously, a further comparison with ALV-E representative isolates indicated that the amino acid substitutions of the four wild duck strains were distributed throughout the gp85. In total, these results suggested that the subgroup-E avian leukosis virus has been found in wild ducks in China.

  8. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  9. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  10. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  11. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  12. Expert-Guided Subgroup Discovery: Methodology and Application

    CERN Document Server

    Gamberger, D; 10.1613/jair.1089

    2011-01-01

    This paper presents an approach to expert-guided subgroup discovery. The main step of the subgroup discovery process, the induction of subgroup descriptions, is performed by a heuristic beam search algorithm, using a novel parametrized definition of rule quality which is analyzed in detail. The other important steps of the proposed subgroup discovery process are the detection of statistically significant properties of selected subgroups and subgroup visualization: statistically significant properties are used to enrich the descriptions of induced subgroups, while the visualization shows subgroup properties in the form of distributions of the numbers of examples in the subgroups. The approach is illustrated by the results obtained for a medical problem of early detection of patient risk groups.

  13. On Certain Distributive Lattices of Subgroups of Finite Soluble Groups

    Institute of Scientific and Technical Information of China (English)

    L.M.EZQUERRO; X. SOLER-ESCRIV(A)

    2007-01-01

    In this paper, we prove the following result. Let (S) be a saturated formation and ∑ a Hall system of a soluble group G. Let X be a w-solid set of maximal subgroups of G such that ∑ reduces into each element of X. Consider in G the following three subgroups: the (S)-normalizer D of G associated with ∑; the X-prefrattini subgroup W = W(G, X) of G; and a hypercentrally embedded subgroup T of G. Then the lattice (ε)(T, W, D) generated by T, D and W is a distributive lattice of pairwise permutable subgroups of G with the cover and avoidance property.This result remains true for the lattice (ε)(V, W, D), where V is a subgroup of G whose Sylow subgroups are also Sylow subgroups of hypercentrally embedded subgroups of G such that ∑ reduces into V.

  14. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  15. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  16. The ergodic theory of lattice subgroups

    CERN Document Server

    Gorodnik, Alexander

    2010-01-01

    The results established in this book constitute a new departure in ergodic theory and a significant expansion of its scope. Traditional ergodic theorems focused on amenable groups, and relied on the existence of an asymptotically invariant sequence in the group, the resulting maximal inequalities based on covering arguments, and the transference principle. Here, Alexander Gorodnik and Amos Nevo develop a systematic general approach to the proof of ergodic theorems for a large class of non-amenable locally compact groups and their lattice subgroups. Simple general conditions on the spectral theory of the group and the regularity of the averaging sets are formulated, which suffice to guarantee convergence to the ergodic mean

  17. Finite Groups with Seminormal Sylow Subgroups

    Institute of Scientific and Technical Information of China (English)

    Wen Bin GUO

    2008-01-01

    In this paper,we prove the following theorem:Let p be a prime number,P a Sylow psubgroup of a group G and π = π(G) \\ {p}.If P is seminormal in G,then the following statements hold:1) G is a p-soluble group and P' ≤Op(G); 2) lp(G) ≤ 2 and lπ(G) < 2; 3) if a π-Hall subgroup of G is q-supersoluble for some q ∈π,then G is q-supersoluble.

  18. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  19. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  20. Myasthenia gravis: subgroup classification and therapeutic strategies.

    Science.gov (United States)

    Gilhus, Nils Erik; Verschuuren, Jan J

    2015-10-01

    Myasthenia gravis is an autoimmune disease that is characterised by muscle weakness and fatigue, is B-cell mediated, and is associated with antibodies directed against the acetylcholine receptor, muscle-specific kinase (MUSK), lipoprotein-related protein 4 (LRP4), or agrin in the postsynaptic membrane at the neuromuscular junction. Patients with myasthenia gravis should be classified into subgroups to help with therapeutic decisions and prognosis. Subgroups based on serum antibodies and clinical features include early-onset, late-onset, thymoma, MUSK, LRP4, antibody-negative, and ocular forms of myasthenia gravis. Agrin-associated myasthenia gravis might emerge as a new entity. The prognosis is good with optimum symptomatic, immunosuppressive, and supportive treatment. Pyridostigmine is the preferred symptomatic treatment, and for patients who do not adequately respond to symptomatic therapy, corticosteroids, azathioprine, and thymectomy are first-line immunosuppressive treatments. Additional immunomodulatory drugs are emerging, but therapeutic decisions are hampered by the scarcity of controlled studies. Long-term drug treatment is essential for most patients and must be tailored to the particular form of myasthenia gravis.

  1. Subgrouping the autism "spectrum": reflections on DSM-5.

    Directory of Open Access Journals (Sweden)

    Meng-Chuan Lai

    Full Text Available DSM-5 has moved autism from the level of subgroups ("apples and oranges" to the prototypical level ("fruit". But making progress in research, and ultimately improving clinical practice, will require identifying subgroups within the autism spectrum.

  2. Groups Satisfying the Maximal Condition on Non-modular Subgroups

    Institute of Scientific and Technical Information of China (English)

    Maria De Falco; Carmela Musella

    2005-01-01

    In this paper, (generalized) soluble groups for which the set of non-modular subgroups verifies the maximal condition and groups for which the set of non-permutable subgroups satisfies the same property are classified.

  3. On Residual Separability of Subgroups in Split Extensions

    Directory of Open Access Journals (Sweden)

    A. A. Krjazheva

    2015-01-01

    Full Text Available In 1973, Allenby and Gregoras proved the following statement. Let G be a split extension of a finitely generated group A by the group B. 1 If in groups A and B all subgroups (all cyclic subgroups are finitely separable, then in group G all subgroups (all cyclic subgroups are finitely separable; 2 if in group A all subgroups are finitely separable, and in group B all finitely generated subgroups are finitely separable, then in group G all finitely generated subgroups are finitely separable. Recall that a group G is said to be a split extension of a group A by a group B, if the group A is a normal subgroup of G, B is a subgroup of G, G = AB and A ∩ B = 1. Recall also that the subgroup H of a group G is called finitely separable if for every element g of G, which does not belong to the subgroup H, there exists a homomorphism of G on a finite group in which the image of an element g does not belong to the image of the subgroup H. In this paper we obtained a generalization of the Allenby and Gregoras theorem by replacing the condition of the finitely generated group A by a more general one: for any natural number n the number of all subgroups of the group A of index n is finite. In fact, under this condition we managed to obtain a necessary and sufficient condition for finite separability of all subgroups (of all cyclic subgroups, of all finitely generated subgroups in the group G.

  4. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  5. 78 FR 35956 - Utah Resource Advisory Council Subgroup Conference Call

    Science.gov (United States)

    2013-06-14

    ... Bureau of Land Management Utah Resource Advisory Council Subgroup Conference Call AGENCY: Bureau of Land Management, Interior. ACTION: Conference Call. SUMMARY: In accordance with the Federal Land Policy and... Advisory Council (RAC) Subgroup will host a conference call. DATES: The Utah RAC Subgroup will host...

  6. Subgroup analysis in burnout : Relations between fatigue, anxiety, and depression.

    NARCIS (Netherlands)

    van Dam, A.

    2016-01-01

    Several authors have suggested that burned out patients do not form a homogeneous group and that subgroups should be considered. The identification of these subgroups may contribute to a better understanding of the burnout construct and lead to more specific therapeutic interventions. Subgroup

  7. On -Semipermutable Subgroups of Finite Groups and -Nilpotency

    Indian Academy of Sciences (India)

    Han Zhangjia

    2010-04-01

    A subgroup of a group is said to be -semipermutable in if it is permutable with every Sylow -subgroup of with $(p,|H|)=1$. Using the concept of -semipermutable subgroups, some new characterizations of -nilpotent groups are obtained and several results are generalized.

  8. Identifying Subgroups among Hardcore Smokers: a Latent Profile Approach

    NARCIS (Netherlands)

    Bommelé, J.; Kleinjan, M.; Schoenmakers, T.M.; Eijnden, R. van den; Mheen, D. van de

    2015-01-01

    Introduction: Hardcore smokers are smokers who have little to no intention to quit. Previous research suggests that there are distinct subgroups among hardcore smokers and that these subgroups vary in the perceived pros and cons of smoking and quitting. Identifying these subgroups could help to deve

  9. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  10. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  11. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  12. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  13. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  14. Planar Algebra of the Subgroup-Subfactor

    Indian Academy of Sciences (India)

    Ved Prakash Gupta

    2008-11-01

    We give an identification between the planar algebra of the subgroup-subfactor $R \\rtimes H \\subset R \\rtimes G$ and the -invariant planar subalgebra of the planar algebra of the bipartite graph $\\star_n$, where $n=[G:H]$. The crucial step in this identification is an exhibition of a model for the basic construction tower, and thereafter of the standard invariant of $R \\rtimes H \\subset R \\rtimes G$ in terms of operator matrices. We also obtain an identification between the planar algebra of the fixed algebra subfactor $R^G \\subset R^H$ and the -invariant planar subalgebra of the planar algebra of the `flip’ of $\\star_n$.

  15. Additive subgroups of topological vector spaces

    CERN Document Server

    Banaszczyk, Wojciech

    1991-01-01

    The Pontryagin-van Kampen duality theorem and the Bochner theorem on positive-definite functions are known to be true for certain abelian topological groups that are not locally compact. The book sets out to present in a systematic way the existing material. It is based on the original notion of a nuclear group, which includes LCA groups and nuclear locally convex spaces together with their additive subgroups, quotient groups and products. For (metrizable, complete) nuclear groups one obtains analogues of the Pontryagin duality theorem, of the Bochner theorem and of the Lévy-Steinitz theorem on rearrangement of series (an answer to an old question of S. Ulam). The book is written in the language of functional analysis. The methods used are taken mainly from geometry of numbers, geometry of Banach spaces and topological algebra. The reader is expected only to know the basics of functional analysis and abstract harmonic analysis.

  16. Planar Algebra of the Subgroup-Subfactor

    CERN Document Server

    Gupta, Ved Prakash

    2008-01-01

    We give an identification between the planar algebra of the subgroup-subfactor $R \\rtimes H \\subset R \\rtimes G$ and the $G$-invariant planar subalgebra of the planar algebra of the bipartite graph $\\star_n$, where $n = [G : H]$. The crucial step in this identification is an exhibition of a model for the basic construction tower, and thereafter of the standard invariant, of $R \\rtimes H \\subset R \\rtimes G$ in terms of operator matrices. We also obtain an identification between the planar algebra of the fixed algebra subfactor $R^G \\subset R^H$ and the $G$-invariant planar subalgebra of the planar algebra of the `flip' of $\\star_n $.

  17. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  18. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  19. Hidden local symmetry and beyond

    Science.gov (United States)

    Yamawaki, Koichi

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here, I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H = SU(2)L × SU(2)R/SU(2)V with additional symmetry, the nonlinearly-realized scale symmetry. Then, the SM does have a dynamical gauge boson of the SU(2)V HLS, "SM ρ meson", in addition to the Higgs as a pseudo-dilaton as well as the NG bosons to be absorbed in to the W and Z. Based on the recent work done with Matsuzaki and Ohki, I discuss a novel possibility that the SM ρ meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "dark SM skyrmion (DSMS)".

  20. Can the tinnitus spectrum identify tinnitus subgroups?

    Directory of Open Access Journals (Sweden)

    Karin M Heijneman

    2013-01-01

    Full Text Available The tinnitus spectrum is a psycho-acoustic metric of tinnitus. Previous work found a tight relation between the spectrum and the tone audiogram. This suggests that the spectrum and the audiogram provide essentially the same information, and the added value of the spectrum is limited. In order to test whether the spectrum shows tinnitus characteristics that cannot be inferred from the audiogram, we re-examined the relation between the tinnitus spectrum and the tone audiogram, in a group of 80 tinnitus patients. We defined three subgroups of patients, using the shape of their tinnitus spectrum: (1 patients with a spectrum, monotonously increasing with frequency (2 patients with a distinct peak in their spectrum, (3 all other patients. Patients in group 3 typically showed low frequency tinnitus spectra. In all three groups, the largest hearing loss was at high frequencies (>2 kHz. The mean audiograms of group 1 and 2 were remarkably similar; group 3 had an additional hearing loss for the lower frequencies (<2 kHz. The three groups did not differ with respect to age, sex, or tinnitus questionnaire outcomes. In subgroups 2 and 3, the shape of the spectrum clearly differed from that of the tone audiogram. In other words, the spectrum technique provided information that could not have been obtained by tone audiometry alone. Therefore, the spectrum measurement may develop into a technique that can differentiate between classes of tinnitus. This may eventually contribute to the effective management of tinnitus, as various classes of tinnitus may require different therapeutic interventions.

  1. Constraining solar hidden photons using HPGe detector

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, R.; Kekez, D., E-mail: Dalibor.Kekez@irb.hr; Krčmar, M.; Krečak, Z.; Ljubičić, A.

    2013-04-25

    In this Letter we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory. With our experimental setup we observe the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, entails both photon into hidden state oscillations and a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in Sun's interior as well as in the detector. We exclude hidden photons with kinetic couplings χ>(2.2×10{sup −13}–3×10{sup −7}) in the mass region 0.2 eV≲m{sub γ{sup ′}}≲30 keV. Our constraints on the mixing parameter χ in the mass region from 20 eV up to 15 keV prove even slightly better then those obtained recently by using data from the CAST experiment, albeit still somewhat weaker than those obtained from solar and HB stars lifetime arguments.

  2. $\\mathcal M^\\ast$-supplemented subgroups of finite groups

    Indian Academy of Sciences (India)

    Jia Zhang; Long Miao; Juping Tang

    2016-05-01

    A subgroup $H$ of a group $G$ is said to be $\\mathcal M^\\ast$-supplemented in $G$ if there exists a subgroup $K$ of $G$ such that $G = HK$ and $H \\cap K$ is $\\mathcal M$-supplemented in $G$. In this paper, we prove as follows: Let $E$ be a normal subgroup of a group $G$. Suppose that every maximal subgroup of every non-cyclic Sylow subgroup $P$ of $F^\\ast (E)$ is $\\mathcal M^\\ast$-supplemented in $G$, then $E \\leq Z_{\\mathcal U\\Phi} (G)$.

  3. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  4. Quantum subgroups of the Haagerup fusion categories

    CERN Document Server

    Grossman, Pinhas

    2011-01-01

    We answer three related questions concerning the Haagerup subfactor and its even parts, the Haagerup fusion categories. Namely we find all simple module categories over each of the Haagerup fusion categories (in other words, we find the `"quantum subgroups" in the sense of Ocneanu), we find all subfactors whose principal even part is one of the Haagerup fusion categories, and we compute the Brauer-Picard groupoid of Morita equivalences of the Haagerup fusion categories. In addition to the two even parts of the Haagerup subfactor, there is exactly one more fusion category which is Morita equivalent to each of them. This third fusion category has six simple objects and the same fusion rules as one of the even parts of the Haagerup subfactor, but has not previously appeared in the literature. We also find the full lattice of intermediate subfactors for every subfactor whose even part is one of these three fusion categories, and we discuss how our results generalize to Izumi subfactors.

  5. Clinical Subgroups in Bilateral Meniere Disease

    Science.gov (United States)

    Frejo, Lidia; Soto-Varela, Andres; Santos-Perez, Sofía; Aran, Ismael; Batuecas-Caletrio, Angel; Perez-Guillen, Vanesa; Perez-Garrigues, Herminio; Fraile, Jesus; Martin-Sanz, Eduardo; Tapia, Maria C.; Trinidad, Gabriel; García-Arumi, Ana María; González-Aguado, Rocío; Espinosa-Sanchez, Juan M.; Marques, Pedro; Perez, Paz; Benitez, Jesus; Lopez-Escamez, Jose A.

    2016-01-01

    Meniere disease (MD) is a heterogeneous clinical condition characterized by sensorineural hearing loss, episodic vestibular symptoms, and tinnitus associated with several comorbidities, such as migraine or autoimmune disorders (AD). The frequency of bilateral involvement may range from 5 to 50%, and it depends on the duration of the disease. We have performed a two-step cluster analysis in 398 patients with bilateral MD (BMD) to identify the best predictors to define clinical subgroups with a potential different etiology to improve the phenotyping of BMD and to develop new treatments. We have defined five clinical variants in BMD. Group 1 is the most frequently found, includes 46% of patients, and is defined by metachronic hearing loss without migraine and without AD. Group 2 is found in 17% of patients, and it is defined by synchronic hearing loss without migraine or AD. Group 3, with 13% of patients, is characterized by familial MD, while group 4, that includes 12% of patients, is associated by the presence of migraine in all cases. Group 5 is found in 11% of patients and is defined by AD. This approach can be helpful in selecting patients for genetic and clinical research. However, further studies will be required to improve the phenotyping in these clinical variants for a better understanding of the diverse etiological factors contributing to BMD. PMID:27822199

  6. Clinical subgroups in bilateral Meniere disease

    Directory of Open Access Journals (Sweden)

    Lidia Frejo

    2016-10-01

    Full Text Available Meniere disease (MD is a heterogeneous clinical condition characterized by sensorineural hearing loss, episodic vestibular symptoms and tinnitus associated with several comorbidities such as migraine or autoimmune disorders (AD. The frequency of bilateral involvement may range from 5-50% and it depends on the duration of the disease. We have performed a two-step cluster analysis in 398 patients with bilateral MD to identify the best predictors to define clinical subgroups with a potential different etiology to improve the phenotyping of bilateral MD and to develop new treatments. We have defined five clinical variants in bilateral MD. Group 1 is the most frequently found, includes 46% of patients, and is defined by metachronic hearing loss without migraine and without AD. Group 2 is found in 17% of patients, and it is defined by synchronic hearing loss without migraine or AD. Group 3, with 13% of patients, is characterized by familial MD, while group 4, that includes 12% of patients, is associated by the presence of migraine in all cases. Group 5 is found in 11% of patients and is defined by AD. This approach can be helpful in selecting patients for genetic and clinical research. However, further studies will be required to improve the phenotyping in these clinical variants for a better understanding of the diverse etiological factors contributing to bilateral MD.

  7. Factor analysis identifies subgroups of constipation

    Institute of Scientific and Technical Information of China (English)

    Philip G Dinning; Mike Jones; Linda Hunt; Sergio E Fuentealba; Jamshid Kalanter; Denis W King; David Z Lubowski; Nicholas J Talley; Ian J Cook

    2011-01-01

    AIM: To determine whether distinct symptom groupings exist in a constipated population and whether such grouping might correlate with quantifiable pathophysiological measures of colonic dysfunction. METHODS: One hundred and ninety-one patients presenting to a Gastroenterology clinic with constipation and 32 constipated patients responding to a newspaper advertisement completed a 53-item, wide-ranging selfreport questionnaire. One hundred of these patients had colonic transit measured scintigraphically. Factor analysis determined whether constipation-related symptoms grouped into distinct aspects of symptomatology. Cluster analysis was used to determine whether individual patients naturally group into distinct subtypes. RESULTS: Cluster analysis yielded a 4 cluster solution with the presence or absence of pain and laxative unresponsiveness providing the main descriptors. Amongst all clusters there was a considerable proportion of patients with demonstrable delayed colon transit, irritable bowel syndrome positive criteria and regular stool frequency. The majority of patients with these characteristics also reported regular laxative use. CONCLUSION: Factor analysis identified four constipation subgroups, based on severity and laxative unresponsiveness, in a constipated population. However, clear stratification into clinically identifiable groups remains imprecise.

  8. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  9. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  10. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  11. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  12. Report of the Production and Delivery Subgroup

    Energy Technology Data Exchange (ETDEWEB)

    Glass, R; Zalesky, R

    2004-11-01

    The Production and Delivery Subgroup was tasked with evaluating the various options that could be used for hydrogen production and delivery in terms of availability/industry readiness, technical and economic barriers, and environmental considerations. Hydrogen can be produced using a variety of feedstocks and conversion technologies. The feedstock options include water, natural gas, coal, petroleum, methanol, ethanol, biomass, and organic waste streams. Ultimately, using these domestic resources we will be able to produce all the hydrogen we will need for the complete conversion of our transportation infrastructure. The various conversion technologies include electrolysis, reforming (principally of natural gas, but also ethanol and methanol), photobiological and photoelectrochemical, biofermentation, pyrolysis and gasification of biomass and coal, high temperature thermochemical, and catalytic membranes. All of these production technologies are being actively researched by DOE's Office of Hydrogen, Fuel Cells and Infrastructure Technologies (HFCIT); and other offices within DOE support work that complements the HFCIT Program activities. In addition, private industry is also dedicating significant resources to these efforts. In establishing the California Hydrogen Highway Network (CA H2 Net) we must utilize both distributed (that is, hydrogen that is produced at the point of use) as well as centralized production of hydrogen. Because of technical and economic barriers, most of the technologies for hydrogen production listed above will not become practical for either mode of hydrogen production in large quantities until at least the 2015-2030 timeframe. In the near term, that is, the transitional period between now and 2010 when we will establish a widely available hydrogen fueling infrastructure in California, the distributed production options of reforming and electrolysis will play the dominant role. In addition, production of hydrogen at centralized plants

  13. BAYESIAN NETWORKS FOR SUB-GROUPS OF MULTIPLE SCLEROSIS

    OpenAIRE

    2013-01-01

    In this study, patients with multiple sclerosis "sub-groups" characteristics in relation to detection of a statistically (SPSS) and are provided in the Bayesian network. The main objective of this study, regarding the appearance of MRI lesions in patients with Multiple Sclerosis information and / or EDSS scores to investigate the possible attack of multiple sclerosis subgroups. Bayesian networks, reflects the level of sub-groups in multiple sclerosis patients. Analyzes were conducted...

  14. On p-nilpotency and minimal subgroups of finite groups

    Institute of Scientific and Technical Information of China (English)

    GUO; Xiuyun(郭秀云); K.P.Shum

    2003-01-01

    We call a subgroup H of a finite group G c-supplemented in G if there exists a subgroup K ofG such that G = HK and H ∩K ≤ core(H). In this paper it is proved that a finite group G is p-nilpotentif G is S4-free and every minimal subgroup of P ∩ GN is c-supplemented in NG(P), and when p = 2 P isquaternion-free, where p is the smallest prime number dividing the order of G, P a Sylow p-subgroup of G.As some applications of this result, some known results are generalized.

  15. Subgroup s-commutativity degree of finite groups

    CERN Document Server

    Otera, Daniele Ettore

    2010-01-01

    In a recent contribution, Tarnauceanu has introduced the subgroup commutativity degree of a finite group, adapting to the context of the lattice theory some ideas and some techniques, which were known by the studies of Lescot on the commutativity degree. This new notion allows us to detect how a group is far from having all subgroups which are permutable. In the present paper we investigate a probability, which generalizes the subgroup commutativity degree, and find some numerical restrictions on groups which are rich in S-permutable subgroups in the sense of Kegel.

  16. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  17. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  18. Hidden simplicity of gauge theory amplitudes

    Science.gov (United States)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  19. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  20. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  1. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  2. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  3. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  4. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  5. THE DIFFERENCES IN THE TORUS GEOMETRY BETWEEN HIDDEN AND NON-HIDDEN BROAD LINE ACTIVE GALACTIC NUCLEI

    Energy Technology Data Exchange (ETDEWEB)

    Ichikawa, Kohei; Ueda, Yoshihiro [Department of Astronomy, Kyoto University, Kitashirakawa-Oiwake-cho, Sakyo-ku, Kyoto 606-8502 (Japan); Packham, Christopher; Lopez-Rodriguez, Enrique; Alsip, Crystal D. [Department of Physics and Astronomy, University of Texas at San Antonio, One UTSA Circle, San Antonio, TX 78249 (United States); Almeida, Cristina Ramos; Ramos, Andrés Asensio; González-Martín, Omaira [Instituto de Astrofísica de Canarias, C/Vía Láctea, s/n, E-38205 La Laguna, Tenerife (Spain); Alonso-Herrero, Almudena [Instituto de Física de Cantabria, CSIC-Universidad de Cantabria, E-39005 Santander (Spain); Díaz-Santos, Tanio [Spitzer Science Center, California Institute of Technology, MS 220-6, Pasadena, CA 91125 (United States); Elitzur, Moshe [Department of Physics and Astronomy, University of Kentucky, Lexington, KY 40506-0055 (United States); Hönig, Sebastian F. [School of Physics and Astronomy, University of Southampton, Southampton SO17 1BJ (United Kingdom); Imanishi, Masatoshi [Subaru Telescope, 650 North A’ohoku Place, Hilo, HI 96720 (United States); Levenson, Nancy A. [Gemini Observatory, Southern Operations Center, c/o AURA, Casilla 603, La Serena (Chile); Mason, Rachel E. [Gemini Observatory, Northern Operations Center, 670 N. A’ohoku Place, Hilo, HI 96720 (United States); Perlman, Eric S., E-mail: ichikawa@kusastro.kyoto-u.ac.jp [Department of Physics and Space Sciences, 150 W. University Blvd., Florida Institute of Technology, Melbourne, FL 32901 (United States)

    2015-04-20

    We present results from the fitting of infrared (IR) spectral energy distributions of 21 active galactic nuclei (AGNs) with clumpy torus models. We compiled high spatial resolution (∼0.3–0.7 arcsec) mid-IR (MIR) N-band spectroscopy, Q-band imaging, and nuclear near- and MIR photometry from the literature. Combining these nuclear near- and MIR observations, far-IR photometry, and clumpy torus models enables us to put constraints on the torus properties and geometry. We divide the sample into three types according to the broad line region (BLR) properties: type-1s, type-2s with scattered or hidden broad line region (HBLR) previously observed, and type-2s without any published HBLR signature (NHBLR). Comparing the torus model parameters gives us the first quantitative torus geometrical view for each subgroup. We find that NHBLR AGNs have smaller torus opening angles and larger covering factors than HBLR AGNs. This suggests that the chance to observe scattered (polarized) flux from the BLR in NHBLR could be reduced by the dual effects of (a) less scattering medium due to the reduced scattering volume given the small torus opening angle and (b) the increased torus obscuration between the observer and the scattering region. These effects give a reasonable explanation for the lack of observed HBLR in some type-2 AGNs.

  6. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  7. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, Maja; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  8. On discrete Zariski-dense subgroups of algebraic groups

    CERN Document Server

    Winkelmann, J

    1993-01-01

    We investigate for which linear-algebraic groups (over the complex numbers or any local field) there exists subgroups which are dense in the Zariski topology, but discrete in the Hausdorff topology. For instance, such subgroups exist for every non-solvable complex group.

  9. On Maximal Subgroups of a Finite Solvable Group

    CERN Document Server

    Gritsuk, D V

    2011-01-01

    The following result is received: Let $H$ be a non-normal maximal subgroup of a finite solvable group $G$ and let $q \\in \\pi(F(H/\\mathrm{Core}_GH))$, then $G$ has a Sylow $q$-subgroup $Q$ such that $N_{G}(Q) \\subseteq H$.

  10. Identifying subgroups of patients using latent class analysis

    DEFF Research Database (Denmark)

    Nielsen, Anne Mølgaard; Kent, Peter; Hestbæk, Lise

    2017-01-01

    BACKGROUND: Heterogeneity in patients with low back pain (LBP) is well recognised and different approaches to subgrouping have been proposed. Latent Class Analysis (LCA) is a statistical technique that is increasingly being used to identify subgroups based on patient characteristics. However, as ...

  11. Finite Groups with Given Quantitative Non-Nilpotent Subgroups II

    DEFF Research Database (Denmark)

    Shi, Jiangtao; Zhang, Cui

    2014-01-01

    As an extension of Shi and Zhang's 2011 article [4], we prove that any finite group having at most 23 non-normal non-nilpotent proper subgroups is solvable except for G ≅ A 5 or SL(2, 5), and any finite group having at most three conjugacy classes of non-normal non-nilpotent proper subgroups is s...

  12. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  13. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements

  14. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  15. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  16. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  17. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  18. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  19. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  20. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  1. Biostatistics primer: what a clinician ought to know: subgroup analyses.

    Science.gov (United States)

    Barraclough, Helen; Govindan, Ramaswamy

    2010-05-01

    Large randomized phase III prospective studies continue to redefine the standard of therapy in medical practice. Often when studies do not meet the primary endpoint, it is common to explore possible benefits in specific subgroups of patients. In addition, these analyses may also be done, even in the case of a positive trial to find subsets of patients where the therapy is especially effective or ineffective. These unplanned subgroup analyses are justified to maximize the information that can be obtained from a study and to generate new hypotheses. Unfortunately, however, they are too often overinterpreted or misused in the hope of resurrecting a failed study. It is important to distinguish these overinterpreted, misused, and unplanned subgroup analyses from those prespecified and well-designed subgroup analyses. This overview provides a practical guide to the interpretation of subgroup analyses.

  2. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  3. February 2014 Phoenix critical care journal club: subgroup analysis

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2014-02-01

    Full Text Available No abstract available. Article truncated at 150 words. Sun X, Ioannidis JP, Agoritsas T, Alba AC, Guyatt G. How to use a subgroup analysis: users' guide to the medical literature. JAMA. 2014;311(4:405-11. One of Dr. Raschke's pet peeves is unplanned subgroup analysis. In the September 2013 Banner Good Samaritan / Phoenix VA Critical Care Journal Club (1 he commented on an article by Hung et al. (2 that used a post hoc subgroup analysis. He felt strongly enough to write to the editor about why post hoc subgroup analysis should not be acceptable as a basis for scientific conclusions and his letter was published this month (3. Therefore, we have been on the lookout for a review article to discuss subgroup analysis and came across this timely publication in JAMA. The authors cite a number of examples and provide 5 criteria to use when assessing the validity of subgroup analyses: 1. Can chance explain the apparent subgroup effect ...

  4. On Approximation of Lie Groups by Discrete Subgroups

    Indian Academy of Sciences (India)

    Hatem Hamrouni; Salah Souissi

    2014-02-01

    A locally compact group is said to be approximated by discrete sub-groups (in the sense of Tôyama) if there is a sequence of discrete subgroups of that converges to in the Chabauty topology (or equivalently, in the Vietoris topology). The notion of approximation of Lie groups by discrete subgroups was introduced by Tôyama in Kodai Math. Sem. Rep. 1 (1949) 36–37 and investigated in detail by Kuranishi in Nagoya Math. J. 2 (1951) 63–71. It is known as a theorem of Tôyama that any connected Lie group approximated by discrete subgroups is nilpotent. The converse, in general, does not hold. For example, a connected simply connected nilpotent Lie group is approximated by discrete subgroups if and only if has a rational structure. On the other hand, if is a discrete uniform subgroup of a connected, simply connected nilpotent Lie group then is approximated by discrete subgroups $_n$ containing . The proof of the above result is by induction on the dimension of , and gives an algorithm for inductively determining $_n$. The purpose of this paper is to give another proof in which we present an explicit formula for the sequence $(_n)_{n≥ 0}$ in terms of . Several applications are given.

  5. On uc-Normal Subgroups of Finite Groups

    Institute of Scientific and Technical Information of China (English)

    A.Y. Alsheik Ahmad; J.J. Jaraden; Alexander N. Skiba

    2007-01-01

    Let G be a finite group. We say that a subgroup H of G is Uc-normal in G if G has a subnormal subgroup T such that TH = G and (H ∩ T)HG/HG is contained in the U-hypercenter Zu∞ (G/HG) of G/HG, where U is the class of the finite supersoluble groups. We study the structure of G under the assumption that some subgroups of G are Uc-normal in G.

  6. On (F)s-Quasinormality of 2-Maximal Subgroups

    Institute of Scientific and Technical Information of China (English)

    Yufeng LIU; Xiaolong YU; Lijun HUO

    2013-01-01

    Let (F) be a class of finite groups.A subgroup H of a finite group G is said to be (F)s-quasinormal in G if there exists a normal subgroup T of G such that HT is s-permutable in G and (H ∩ T)HG/HG is contained in the (F)-hypercenter Z(F)∞(G/HG) of G/HG.In this paper,we use (F)s-quasinormal subgroups to study the structure of finite groups.Some new results are obtained.

  7. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  8. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  9. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  10. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  11. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  12. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  13. Finite State Transducers Approximating Hidden Markov Models

    CERN Document Server

    Kempe, A

    1999-01-01

    This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is especially advantageous for part-of-speech tagging because the resulting transducer can be composed with other transducers that encode correction rules for the most frequent tagging errors. The speed of tagging is also improved. The described methods have been implemented and successfully tested on six languages.

  14. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  15. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  16. Killing and letting die: hidden value assumptions.

    Science.gov (United States)

    Atkinson, G

    1983-01-01

    In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.

  17. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  18. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  19. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  20. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  1. Normal subgroup generated by a plane polynomial automorphism

    CERN Document Server

    Furter, Jean-Philippe

    2009-01-01

    We study the normal subgroup generated by a non trivial element f in the group G of complex plane polynomial automorphisms having Jacobian determinant 1. On one hand if f has length at most 8 relatively to the classical amalgamated product structure of G, we prove that = G. On the other hand if f is a sufficiently generic element of even length at least 14, we prove that is a proper subgroup of G.

  2. Learning Clinical Workflows to Identify Subgroups of Heart Failure Patients

    Science.gov (United States)

    Yan, Chao; Chen, You; Li, Bo; Liebovitz, David; Malin, Bradley

    2016-01-01

    Heart Failure (HF) is one of the most common indications for readmission to the hospital among elderly patients. This is due to the progressive nature of the disease, as well as its association with complex comorbidities (e.g., anemia, chronic kidney disease, chronic obstructive pulmonary disease, hyper- and hypothyroidism), which contribute to increased morbidity and mortality, as well as a reduced quality of life. Healthcare organizations (HCOs) have established diverse treatment plans for HF patients, but such routines are not always formalized and may, in fact, arise organically as a patient’s management evolves over time. This investigation was motivated by the hypothesis that patients associated with a certain subgroup of HF should follow a similar workflow that, once made explicit, could be leveraged by an HCO to more effectively allocate resources and manage HF patients. Thus, in this paper, we introduce a method to identify subgroups of HF through a similarity analysis of event sequences documented in the clinical setting. Specifically, we 1) structure event sequences for HF patients based on the patterns of electronic medical record (EMR) system utilization, 2) identify subgroups of HF patients by applying a k-means clustering algorithm on utilization patterns, 3) learn clinical workflows for each subgroup, and 4) label each subgroup with diagnosis and procedure codes that are distinguishing in the set of all subgroups. To demonstrate its potential, we applied our method to EMR event logs for 785 HF inpatient stays over a 4 month period at a large academic medical center. Our method identified 8 subgroups of HF, each of which was found to associate with a canonical workflow inferred through an inductive mining algorithm. Each subgroup was further confirmed to be affiliated with specific comorbidities, such as hyperthyroidism and hypothyroidism. PMID:28269922

  3. The Demazure-Tits subgroup of a simple Lie group

    Science.gov (United States)

    Michel, L.; Patera, J.; Sharp, R. T.

    1988-04-01

    The Demazure-Tits subgroup of a simple Lie group G is the group of invariance of Clebsch-Gordan coefficients tables (assuming an appropriate choice of basis). The structure of the Demazure-Tits subgroups of An, Bn, Cn, Dn, and G2 is described. Orbits of the permutation action of the DT group in any irreducible finite-dimensional representation space of A2, C2, and G2 are decomposed into the sum of irreducible representations of the DT group.

  4. Subgrouping Chronic Fatigue Syndrome Patients by Genetic and Immune Profiling

    Science.gov (United States)

    2014-10-01

    AWARD NUMBER: W81XWH-12-1-0388 TITLE: Subgrouping Chronic Fatigue Syndrome Patients by Genetic and Immune Profiling ...2014 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Subgrouping Chronic Fatigue Syndrome Patients By Genetic And Immune Profiling 5b. GRANT...studying the results. We have finished the DNA isolation and anticipate the HLA testing to be completed this upcoming year. We want to interrogate the

  5. Demonstration of Microbial Subgroups among Normal Vaginal Microbiota Data

    OpenAIRE

    Lee, M.-L. T.

    2011-01-01

    In this study we identified subgroups of observations relating to the healthy vaginal microbiota. This microbiota resides in a dynamic environment that undergoes cyclic change during the menstrual cycle. Cluster analysis procedures were applied to divide a set of 226 normal microbiota observations into groups. Three subgroups containing 100, 65, and 61 observations were identified. Plots of principal components determined by canonical analysis were obtained to demonstrate graphically the clus...

  6. Disproportionate sampling for population subgroups in telephone surveys.

    Science.gov (United States)

    Kalsbeek, William D; Boyle, Walter R; Agans, Robert P; White, John E

    2007-04-15

    Population studies often seek to examine phenomena in important population subgroups or to compare results among these and other subgroups. When subgroups of interest comprise a relatively small percentage of the population and acceptable subgroup member lists are not available to serve as sampling frames, it may be prohibitively expensive even by telephone to screen through a sample of the entire population. This paper considers some statistical effects of estimation from a class of two-stratum telephone sample designs where part of the frame with a higher subgroup concentration is disproportionately sampled compared to the rest of the frame. Using proportionate sampling as a reference, the relative impact of this disproportionate design is determined for nominal and effective sample sizes, where the latter are tied to the effect of variation in sample weights that occurs in disproportionately allocated samples. Findings are illustrated using two recent telephone surveys. Whereas nominal subgroup sample sizes may be improved by disproportionate sampling, we conclude that both the survey designer and analyst should use this type of design cautiously in telephone surveys.

  7. A Bayesian subgroup analysis using collections of ANOVA models.

    Science.gov (United States)

    Liu, Jinzhong; Sivaganesan, Siva; Laud, Purushottam W; Müller, Peter

    2017-03-20

    We develop a Bayesian approach to subgroup analysis using ANOVA models with multiple covariates, extending an earlier work. We assume a two-arm clinical trial with normally distributed response variable. We also assume that the covariates for subgroup finding are categorical and are a priori specified, and parsimonious easy-to-interpret subgroups are preferable. We represent the subgroups of interest by a collection of models and use a model selection approach to finding subgroups with heterogeneous effects. We develop suitable priors for the model space and use an objective Bayesian approach that yields multiplicity adjusted posterior probabilities for the models. We use a structured algorithm based on the posterior probabilities of the models to determine which subgroup effects to report. Frequentist operating characteristics of the approach are evaluated using simulation. While our approach is applicable in more general cases, we mainly focus on the 2 × 2 case of two covariates each at two levels for ease of presentation. The approach is illustrated using a real data example.

  8. Dispositional Affect in Unique Subgroups of Patients with Rheumatoid Arthritis

    Directory of Open Access Journals (Sweden)

    Danielle B. Rice

    2016-01-01

    Full Text Available Background. Patients with rheumatoid arthritis may experience increased negative outcomes if they exhibit specific patterns of dispositional affect. Objective. To identify subgroups of patients with rheumatoid arthritis based on dispositional affect. The secondary objective was to compare mood, pain catastrophizing, fear of pain, disability, and quality of life between subgroups. Methods. Outpatients from a rheumatology clinic were categorized into subgroups by a cluster analysis based on dispositional affect. Differences in outcomes were compared between clusters through multivariate analysis of covariance. Results. 227 patients were divided into two subgroups. Cluster 1 (n=85 included patients reporting significantly higher scores on all dispositional variables (experiential avoidance, anxiety sensitivity, worry, fear of pain, and perfectionism; all p<0.001 compared to patients in Cluster 2 (n=142. Patients in Cluster 1 also reported significantly greater mood impairment, pain anxiety sensitivity, and pain catastrophizing (all p<0.001. Clusters did not differ on quality of life or disability. Conclusions. The present study identifies a subgroup of rheumatoid arthritis patients who score significantly higher on dispositional affect and report increased mood impairment, pain anxiety sensitivity, and pain catastrophizing. Considering dispositional affect within subgroups of patients with RA may help health professionals tailor interventions for the specific stressors that these patients experience.

  9. BAYESIAN NETWORKS FOR SUB-GROUPS OF MULTIPLE SCLEROSIS

    Directory of Open Access Journals (Sweden)

    Yeliz KARACA

    2013-01-01

    Full Text Available In this study, patients with multiple sclerosis "sub-groups" characteristics in relation to detection of a statistically (SPSS and are provided in the Bayesian network. The main objective of this study, regarding the appearance of MRI lesions in patients with Multiple Sclerosis information and / or EDSS scores to investigate the possible attack of multiple sclerosis subgroups. Bayesian networks, reflects the level of sub-groups in multiple sclerosis patients. Analyzes were conducted to determine the change of these properties. MR images of the input data is discussed for the MS patients, the sub-groups of MS, "Remitting Relapsing Multiple Sclerosis", "Secondary Progressive Multiple Sclerosis" with their patients' clinical brain MR images, brain stem, and the Upper Cervical Regions of the corpus callosum-periventricular lesions created in the information. Multiple Sclerosis is owned by the input data is created correctly identify disease subgroups of MS patients for the number of lesions in MR images and MR image of the three regions for the year for which the information used in the EDSS score. Of MS is RRMS, SPMS correctly identify sub-groups of the brain with Brain Stem, and upper cervical regions of the corpus callosum-periventricular lesions in these three points for the region and / or EDSS score information can be emphasized by using the Bayesian networks play an important role in the analysis.

  10. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  11. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  12. The Influence of Primitive Subgroups on the Structure of Finite Groups

    Institute of Scientific and Technical Information of China (English)

    Liu Yu-feng; Du Xian-kun(Communicated)

    2013-01-01

    A subgroup H of a group G is said to be primitive if it is a proper subgroup of the intersection of all subgroups of G containing H as its proper subgroup. The purpose of this note is to go further into the influence of primitive subgroups on the structure of finite groups. Some new results are obtained.

  13. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  14. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  15. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  16. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  17. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  18. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  19. Hidden sector monopole, vector dark matter and dark radiation with Higgs portal

    CERN Document Server

    Baek, S; Park, Wan-Il

    2014-01-01

    We show that the 't Hooft-Polyakov monopole model in the hidden sector with Higgs portal interaction makes a viable DM model, where monopole and massive vector dark matter (VDM) are stable due to topological conservation and the unbroken subgroup $U(1)_X$. We show that monopole relic density is diluted enough whereas VDM can be thermalized by the Higgs portal interaction, and direct detection experiments can probe some region of parameter space. The proposed XENON1T experiment may detect the VDM if its mass is less than 60 GeV. In addition, the dark photon associated with unbroken $U(1)_X$ contributes to the radiation energy density at present, giving $\\Delta N_{\\rm eff}^\

  20. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  1. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  2. Genetically meaningful phenotypic subgroups in autism spectrum disorders.

    Science.gov (United States)

    Veatch, O J; Veenstra-Vanderweele, J; Potter, M; Pericak-Vance, M A; Haines, J L

    2014-03-01

    Autism spectrum disorder (ASD) is a complex neurodevelopmental disorder with strong evidence for genetic susceptibility. However, the effect sizes for implicated chromosomal loci are small, hard to replicate and current evidence does not explain the majority of the estimated heritability. Phenotypic heterogeneity could be one phenomenon complicating identification of genetic factors. We used data from the Autism Diagnostic Interview-Revised, Autism Diagnostic Observation Schedule, Vineland Adaptive Behavior Scales, head circumferences, and ages at exams as classifying variables to identify more clinically similar subgroups of individuals with ASD. We identified two distinct subgroups of cases within the Autism Genetic Resource Exchange dataset, primarily defined by the overall severity of evaluated traits. In addition, there was significant familial clustering within subgroups (odds ratio, OR ≈ 1.38-1.42, P Autism Genome Project, we similarly identified two distinct subgroups of cases and confirmed this severity-based dichotomy. We also observed evidence for genetic contributions to subgroups identified in the replication dataset. Our results provide more effective methods of phenotype definition that should increase power to detect genetic factors influencing risk for ASD.

  3. Subgroup Analysis in Burnout: Relations Between Fatigue, Anxiety, and Depression

    Science.gov (United States)

    van Dam, Arno

    2016-01-01

    Several authors have suggested that burned out patients do not form a homogeneous group and that subgroups should be considered. The identification of these subgroups may contribute to a better understanding of the burnout construct and lead to more specific therapeutic interventions. Subgroup analysis may also help clarify whether burnout is a distinct entity and whether subgroups of burnout overlap with other disorders such as depression and chronic fatigue syndrome. In a group of 113 clinically diagnosed burned out patients, levels of fatigue, depression, and anxiety were assessed. In order to identify possible subgroups, we performed a two-step cluster analysis. The analysis revealed two clusters that differed from one another in terms of symptom severity on the three aforementioned measures. Depression appeared to be the strongest predictor of group membership. These results are considered in the light of the scientific debate on whether burnout can be distinguished from depression and whether burnout subtyping is useful. Finally, implications for clinical practice and future research are discussed. PMID:26869983

  4. Cluster analysis of clinical data identifies fibromyalgia subgroups.

    Directory of Open Access Journals (Sweden)

    Elisa Docampo

    Full Text Available INTRODUCTION: Fibromyalgia (FM is mainly characterized by widespread pain and multiple accompanying symptoms, which hinder FM assessment and management. In order to reduce FM heterogeneity we classified clinical data into simplified dimensions that were used to define FM subgroups. MATERIAL AND METHODS: 48 variables were evaluated in 1,446 Spanish FM cases fulfilling 1990 ACR FM criteria. A partitioning analysis was performed to find groups of variables similar to each other. Similarities between variables were identified and the variables were grouped into dimensions. This was performed in a subset of 559 patients, and cross-validated in the remaining 887 patients. For each sample and dimension, a composite index was obtained based on the weights of the variables included in the dimension. Finally, a clustering procedure was applied to the indexes, resulting in FM subgroups. RESULTS: VARIABLES CLUSTERED INTO THREE INDEPENDENT DIMENSIONS: "symptomatology", "comorbidities" and "clinical scales". Only the two first dimensions were considered for the construction of FM subgroups. Resulting scores classified FM samples into three subgroups: low symptomatology and comorbidities (Cluster 1, high symptomatology and comorbidities (Cluster 2, and high symptomatology but low comorbidities (Cluster 3, showing differences in measures of disease severity. CONCLUSIONS: We have identified three subgroups of FM samples in a large cohort of FM by clustering clinical data. Our analysis stresses the importance of family and personal history of FM comorbidities. Also, the resulting patient clusters could indicate different forms of the disease, relevant to future research, and might have an impact on clinical assessment.

  5. Subgroup analysis in burnout: relations between fatigue, anxiety and depression

    Directory of Open Access Journals (Sweden)

    Arno eVan Dam

    2016-02-01

    Full Text Available Several authors have suggested that burned out patients do not form a homogeneous group and that subgroups should be considered. The identification of these subgroups may contribute to a better understanding of the burnout construct and lead to more specific therapeutic interventions. Subgroup analysis may also help clarify whether burnout is a distinct entity and whether subgroups of burnout overlap with other disorders such as depression and chronic fatigue syndrome. In a group of 113 clinically-diagnosed burned out patients, levels of fatigue, depression and anxiety were assessed. In order to identify possible subgroups, we performed a two-step cluster analysis. The analysis revealed two clusters that differed from one another in terms of symptom severity on the three aforementioned measures. Depression appeared to be the strongest predictor of group membership. These results are considered in the light of the scientific debate on whether burnout can be distinguished from depression and whether burnout subtyping is useful. Finally, implications for clinical practice and future research are discussed.

  6. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  7. Error statistics of hidden Markov model and hidden Boltzmann model results

    Science.gov (United States)

    Newberg, Lee A

    2009-01-01

    Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results. PMID:19589158

  8. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  9. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  10. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  11. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  12. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  13. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  14. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  15. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  16. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  17. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  18. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  19. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  20. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The locations of the breaks are subsequently obtained by assigning states to data points according to the Maximum Posterior Mode (MPM) algorithm. The Integrated Classification Likelihood-Bayesian Information Criterion (ICL-BIC) allows for the determination of the number of regimes by taking into account...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule....

  1. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  2. Fuzzy Modeled K-Cluster Quality Mining of Hidden Knowledge for Decision Support

    Directory of Open Access Journals (Sweden)

    S. Parkash  Kumar

    2011-01-01

    Full Text Available Problem statement: The work presented Fuzzy Modeled K-means Cluster Quality Mining of hidden knowledge for Decision Support. Based on the number of clusters, number of objects in each cluster and its cohesiveness, precision and recall values, the cluster quality metrics is measured. The fuzzy k-means is adapted approach by using heuristic method which iterates the cluster to form an efficient valid cluster. With the obtained data clusters, quality assessment is made by predictive mining using decision tree model. Validation criteria focus on the quality metrics of the institution features for cluster formation and handle efficiently the arbitrary shaped clusters. Approach: The proposed work presented a fuzzy k-means cluster algorithm in the formation of student, faculty and infrastructural clusters based on the performance, skill set and facilitation availability respectively. The knowledge hidden among the educational data set is extracted through Fuzzy k-means cluster an unsupervised learning depends on certain initiation values to define the subgroups present in the data set. Results: Based on the features of the dataset and input parameters cluster formation vary, which motivates the clarification of cluster validity. The results of quality indexed fuzzy k-means shows better cluster validation compared to that of traditional k-family algorithm. Conclusion: The experimental results of cluster validation scheme confirm the reliability of validity index showing that it performs better than other k-family clusters.

  3. Tracking cohesive subgroups over time in inferred social networks

    Science.gov (United States)

    Chin, Alvin; Chignell, Mark; Wang, Hao

    2010-04-01

    As a first step in the development of community trackers for large-scale online interaction, this paper shows how cohesive subgroup analysis using the Social Cohesion Analysis of Networks (SCAN; Chin and Chignell 2008) and Data-Intensive Socially Similar Evolving Community Tracker (DISSECT; Chin and Chignell 2010) methods can be applied to the problem of identifying cohesive subgroups and tracking them over time. Three case studies are reported, and the findings are used to evaluate how well the SCAN and DISSECT methods work for different types of data. In the largest of the case studies, variations in temporal cohesiveness are identified across a set of subgroups extracted from the inferred social network. Further modifications to the DISSECT methodology are suggested based on the results obtained. The paper concludes with recommendations concerning further research that would be beneficial in addressing the community tracking problem for online data.

  4. Discrete neurocognitive subgroups in fully or partially remitted bipolar disorder

    DEFF Research Database (Denmark)

    Jensen, Johan Høy; Knorr, Ulla; Vinberg, Maj

    2016-01-01

    BACKGROUND: Neurocognitive impairment in remitted patients with bipolar disorder contributes to functional disabilities. However, the pattern and impact of these deficits are unclear. METHODS: We pooled data from 193 fully or partially remitted patients with bipolar disorder and 110 healthy...... controls. Hierarchical cluster analysis was conducted to determine whether there are discrete neurocognitive subgroups in bipolar disorder. The pattern of the cognitive deficits and the characteristics of patients in these neurocognitive subgroups were examined with analyses of covariance and least...... significance difference pairwise comparison. RESULTS: Three discrete neurocognitive subgroups were detected: one that was cognitively intact (46.1%), one that was selectively impaired with deficits in processing speed (32.6%), and one that was globally impaired across verbal learning, working memory...

  5. Identities on Maximal Subgroups of GLn(D)

    Institute of Scientific and Technical Information of China (English)

    D. Kiani; M. Mahdavi-Hezavehi

    2005-01-01

    Let D be a division ring with centre F. Assume that M is a maximal subgroup of GLn(D) (n ≥ 1) such that Z(M) is algebraic over F. Group identities on M and polynomial identities on the F-linear hull F[M] are investigated. It is shown that if F[M]is a PI-algebra, then [D: F] <∞. When D is non-commutative and F is infinite, it is also proved that if M satisfies a group identity and F[M] is algebraic over F, then we have either M = K* where K is a field and [D: F] <∞, or M is absolutely irreducible. For a finite dimensional division algebra D, assume that N is a subnormal subgroup of GLn(D)and M is a maximal subgroup of N. If M satisfies a group identity, it is shown that M is abelian-by-finite.

  6. Young children with language difficulties: a dimensional approach to subgrouping.

    Science.gov (United States)

    Jansen, Rianne; Ceulemans, Eva; Grauwels, Jolien; Maljaars, Jarymke; Zink, Inge; Steyaert, Jean; Noens, Ilse

    2013-11-01

    A dimensional approach was used to create bottom-up constructed subgroups that captured the behavioral heterogeneity in 36 Dutch-speaking children with language difficulties. Four subgroups were delineated based upon differences in cognitive ability, symbol understanding, joint attention and autism spectrum disorder related characteristics. Children with a different developmental disorder were found within a single cluster. Therefore, the results of this study suggest that bottom-up constructed subgroups might capture the heterogeneous behavioral profiles of young children with developmental difficulties in a more meaningful way. Furthermore, joint attention and symbol understanding seem important skills to assess in young children presenting with language difficulties. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. On subgroups of saturated or totally bounded paratopological groups

    CERN Document Server

    Banakh, Taras

    2010-01-01

    A paratopological group $G$ is saturated if the inverse $U^{-1}$ of each non-empty set $U\\subset G$ has non-empty interior. It is shown that a [first-countable] paratopological group $H$ is a closed subgroup of a saturated (totally bounded) [abelian] paratopological group if and only if $H$ admits a continuous bijective homomorphism onto a (totally bounded) [abelian] topological group $G$ [such that for each neighborhood $U\\subset H$ of the unit $e$ there is a closed subset $F\\subset G$ with $e\\in h^{-1}(F)\\subset U$]. As an application we construct a paratopological group whose character exceeds its $\\pi$-weight as well as the character of its group reflexion. Also we present several examples of (para)topological groups which are subgroups of totally bounded paratopological groups but fail to be subgroups of regular totally bounded paratopological groups.

  8. Some remarks on regular subgroups of the affine group

    Directory of Open Access Journals (Sweden)

    M. Chiara Tamburini Bellani

    2012-03-01

    Full Text Available Let $V$ be a vector space over a field $F$ of characteristic $pgeq 0$ and let $T$ be a regular subgroup of the affine group $AGL(V$. In the finite dimensional case we show that, if $T$ is abelian or $p>0$, then $T$ is unipotent. For $T$ abelian, pushing forward some ideas used in [A. Caranti, F. Dalla Volta and M. Sala, Abelian regular subgroups of the affine group and radical rings, Publ. Math. Debrecen {bf 69} (2006, 297--308.], we show that the set $left{t-Imid tin Tright}$ is a subalgebra of $End_F(Foplus V$, which is nilpotent when $V$ has finite dimension. This allows a rather systematic construction of abelian regular subgroups.

  9. Clinical symptoms and symptom signatures of Alzheimer's disease subgroups.

    Science.gov (United States)

    Iqbal, Khalid; Flory, Michael; Soininen, Hilkka

    2013-01-01

    Alzheimer's disease (AD) is a multifactorial disorder that involves several different mechanisms. Over 99% of AD patients suffer from the sporadic form of the disease. Based on cerebrospinal fluid (CSF) levels of amyloid-β (Aβ)(1-42), total tau, and ubiquitin--the markers associated with the histopathological hallmarks of the disease (Aβ plaques and abnormally hyperphosphorylated neurofibrillary tangles)--previous studies identified five subgroups of AD. Here we report the potential diagnostic predictive value of hallucination, hypokinesia, paranoia, rigidity, and tremors in aged individuals for AD and differences in the prevalence of these symptoms in the CSF marker-based subgroups of the disease. Analysis of 196 clinically diagnosed AD or Alzheimer with Lewy body, and 75 non-AD neurological and non-neurological control cases, all from a single center, showed that the presence of hallucination, hypokinesia, paranoia, rigidity, or tremors individually, or the presence of any of these, could diagnose AD with sensitivities and specificities of 14% and 99%; 30% and 99%; 15% and 99%; 16% and 100%; 16% and 96%; and 47% and 92%, respectively. The pattern of the prevalence of the above symptoms varied from AD subgroup to subgroup. Presence of any of these symptoms, as well as presence of each individual symptom except tremors, significantly differentiated AD subgroups from the predominantly control cluster. These findings encourage the exploration of hallucination, hypokinesia, paranoia, rigidity, and tremors in identifying various subgroups of AD for stratification of patients for clinical trials to develop therapeutic drugs. This study is for the special issue of the Journal of Alzheimer's Disease honoring Inge Grundke-Iqbal who made several seminal contributions in AD research.

  10. Identifying subgroups of patients using latent class analysis

    DEFF Research Database (Denmark)

    Nielsen, Anne Mølgaard; Kent, Peter; Hestbæk, Lise

    2017-01-01

    (activity, contextual factors, pain, participation, physical impairment and psychology) (first stage) as the variables entered into the second stage of the two-stage LCA to identify patient subgroups. The description of the results of the single-stage and two-stage LCA was based on a combination...... identified similar, but not identical, patient subgroups characterised by (i) mild intermittent LBP, (ii) recent severe LBP and activity limitations, (iii) very recent severe LBP with both activity and participation limitations, (iv) work-related LBP, (v) LBP and several negative consequences and (vi) LBP...

  11. On Isomorphism Testing of Groups with Normal Hall Subgroups

    Institute of Scientific and Technical Information of China (English)

    You-Ming Qiao; Jayalal Sarma M.N.; Bang-Sheng Tang

    2012-01-01

    A normal Hall subgroup N of a group G is a normal subgroup with its order coprime with its index.Schur-Zassenhaus theorem states that every normal Hall subgroup has a complement subgroup,that is a set of coset representatives H which also forms a subgroup of G.In this paper,we present a framework to test isomorphism of groups with at least one normal Hall subgroup,when groups are given as multiplication tables.To establish the framework,we first observe that a proof of Schur-Zassenhaus theorem is constructive,and formulate a necessary and sufficient condition for testing isomorphism in terms of the associated actions of the semidirect products,and isomorphisms of the normal parts and complement parts.We then focus on the case when the normal subgroup is abelian.Utilizing basic facts of representation theory of finite groups and a technique by Le Gall (STACS 2009),we first get an efficient isomorphism testing algorithm when the complement has bounded number of generators.For the case when the complement subgroup is elementary abelian,which does not necessarily have bounded number of generators,we obtain a polynomial time isomorphism testing algorithm by reducing to generalized code isomorphism problem,which asks whether two linear subspaces are the same up to permutation of coordinates.A solution to the latter can be obtained by a mild extension of the singly exponential (in the number of coordinates) time algorithm for code isomorphism problem developed recently by Babai et al.(SODA 2011).Enroute to obtaining the above reduction,we study the following computational problem in representation theory of finite groups:given two representations ρ and τ of a group H over Zpd,p a prime,determine if there exists an automorphism φ:H → H,such that the induced representation ρφ =ρоφ and τ are equivalent,in time poly(ㄧHㄧ,pd).

  12. Some open questions in the theory of generalized permutable subgroups

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    A subgroup H of a group G is said to be weakly s-supplemented in G if H has a supplement T in G such that H ∩ T HsG, where HsG is the largest s-permutable subgroup of G contained in H. This paper constructs an example to show that the open questions 6.3 and 6.4 in J Algebra, 315: 192–209 (2007) have negative solutions, and shows that in many cases Question 6.4 is positive. A series of known results are unified and generalized.

  13. Evaluation of lymphocyte subgroups in children with subacute sclerosing panencephalitis.

    Science.gov (United States)

    Yilmaz, C; Yuca, S A; Yilmaz, N; Oner, A F; Caksen, H

    2009-01-01

    The aetiology of subacute sclerosing panencephalitis (SSPE) remains to be fully elucidated, although it follows infection with a hypermutant defective M-protein measles virus. This study analysed peripheral blood lymphocyte subgroups to determine their role in the pathophysiology of SSPE. It included 22 children with SSPE aged 2 - 15 years (patient group) and 22 age- and gender-matched healthy children (control group). In children or= 6 years old, there were no significant differences in the lymphocyte subgroups. In conclusion, these findings suggest that a low CD4(+) lymphocyte count might be responsible for SSPE in younger children.

  14. Latino Male Ethnic Subgroups: Patterns in College Enrollment and Degree Completion

    Science.gov (United States)

    Ponjuan, Luis; Palomin, Leticia; Calise, Angela

    2015-01-01

    This chapter examines Latino male ethnic subgroups and their college enrollment and degree completion patterns. The chapter also offers recommendations to improve Latino male ethnic subgroups' educational achievement.

  15. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  16. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  17. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  18. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  19. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  20. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  1. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  2. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  3. Bayesian structural inference for hidden processes.

    Science.gov (United States)

    Strelioff, Christopher C; Crutchfield, James P

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ε-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ε-machines, irrespective of estimated transition probabilities. Properties of ε-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  4. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  5. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  6. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  7. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  8. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  9. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  10. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  11. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  12. A conjugacy criterion for Hall subgroups in finite groups

    CERN Document Server

    Revin, D O

    2010-01-01

    A finite group $G$ is said to satisfy $C_\\pi$ for a set of primes $\\pi$, if $G$ possesses exactly one class of conjugate $\\pi$-Hall subgroups. In the paper we obtain a criterion for a finite group $G$ to satisfy $C_\\pi$ in terms of a normal series of the group.

  13. Subgroup conflicts? Try the psychodramatic "double triad method".

    Science.gov (United States)

    Verhofstadt-Denève, Leni M F

    2012-04-01

    The present article suggests the application of a psychodramatic action method for tackling subgroup conflicts in which the direct dialogue between representatives of two opposing subgroups is prepared step by step through an indirect dialogue strategy within two triads, a strategy known as the Double Triad Method (DTM). In order to achieve integration in the group as a whole, it is important that all the members of both subgroups participate actively during the entire process. The first part of the article briefly explores the theoretical background, with a special emphasis on the Phenomenological-Dialectical Personality Model (Phe-Di PModel). In the second part, the DTM procedure is systematically described through its five action stages, each accompanied with 1) a spatial representation of the consecutive actions, 2) some illustrative statements for each stage, and 3) a theoretical interpretation of the dialectically involved personality dimensions in both protagonists. The article concludes with a discussion and suggestions for more extensive applications of the DTM method, including the question of its relationships to Agazarian's functional subgrouping, psychodrama, and sociodrama.

  14. Detection of Problem Gambler Subgroups Using Recursive Partitioning

    Science.gov (United States)

    Markham, Francis; Young, Martin; Doran, Bruce

    2013-01-01

    The multivariate socio-demographic risk factors for problem gambling have been well documented. While this body of research is valuable in determining risk factors aggregated across various populations, the majority of studies tend not to specifically identify particular subgroups of problem gamblers based on the interaction between variables. The…

  15. Subgroup analyses of clinical effectiveness to support health technology assessments.

    Science.gov (United States)

    Paget, Marie-Ange; Chuang-Stein, Christy; Fletcher, Christine; Reid, Carol

    2011-01-01

    Subgroup analysis is an integral part of access and reimbursement dossiers, in particular health technology assessment (HTA), and their HTA recommendations are often limited to subpopulations. HTA recommendations for subpopulations are not always clear and without controversies. In this paper, we review several HTA guidelines regarding subgroup analyses. We describe good statistical principles for subgroup analyses of clinical effectiveness to support HTAs and include case examples where HTA recommendations were given to subpopulations only. Unlike regulatory submissions, pharmaceutical statisticians in most companies have had limited involvement in the planning, design and preparation of HTA/payers submissions. We hope to change this by highlighting how pharmaceutical statisticians should contribute to payers' submissions. This includes early engagement in reimbursement strategy discussions to influence the design, analysis and interpretation of phase III randomized clinical trials as well as meta-analyses/network meta-analyses. The focus on this paper is on subgroup analyses relating to clinical effectiveness as we believe this is the first key step of statistical involvement and influence in the preparation of HTA and reimbursement submissions.

  16. On the Normal Subgroup with Coprime -Conjugacy Class Sizes

    Indian Academy of Sciences (India)

    Xianhe Zhao; Guiyun Chen; Jiaoyun Shi

    2011-11-01

    Let be a normal subgroup of a group . The positive integers and are the two longest sizes of the non-central -conjugacy classes of with > and (,)=1. In this paper, the structure of is determined when divides $|N/N\\cap Z(G)|$. Some known results are generalized.

  17. Carter subgroups of singular classical groups over finite fields

    Institute of Scientific and Technical Information of China (English)

    高有; 石新华

    2004-01-01

    Let Fq be a finite field with qelements whereq = pα. In the present paper, the authors study the existence and structure of Carter subgroups of singular symplectic group Sp (Fq), singular unitary group U ( Fq2 ) and singular orthogonal group O ( Fq ) ( n is even) over finite fields Fq.

  18. Practical Algorithms for Subgroup Detection in Covert Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah; Wiil, Uffe Kock; Qureshi, Pir Abdul Rasool

    2010-01-01

    In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrated in an application by a prototype system. The system finds associations between terrorist and terrorist organisations...

  19. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  20. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  1. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  2. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  3. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  4. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  5. Differences in Psychosocial Predictors of Obesity Among LGBT Subgroups.

    Science.gov (United States)

    Warren, Jacob C; Smalley, K Bryant; Barefoot, K Nikki

    2016-08-01

    The purpose of the current study was to examine the overall presence of and differences in rates of overweight/obesity among a large, nationally diverse sample of lesbian, gay, bisexual, transgender (LGBT)-identified individuals (i.e., cisgender lesbians, cisgender gay men, cisgender bisexual women, cisgender bisexual men, transgender women, and transgender men) and to identify specific psychosocial predictors of obesity within each of the six LGBT subgroups. A total of 2702 LGBT-identified participants participated in the online study. Participants completed a series of demographic questions (including weight and height) and the Depression Anxiety Stress Scale 21. The percentage of participants who were overweight/obese did not differ significantly across LGBT subgroups, with 61.1% of the total sample being overweight/obese. However, the percentage of participants who self-reported body mass indexes in the obese range differed significantly across the six LGBT subgroups, with the highest prevalence in transgender men (46.0%). In addition, the predictors of obesity varied by subgroup, with age a significant predictor for cisgender lesbians, cisgender gay men, and cisgender bisexual women, relationship status for cisgender bisexual women, employment status for both cisgender gay men and cisgender bisexual women, education level for cisgender lesbians, and depression, anxiety, and stress for cisgender gay men. None of the examined psychosocial factors emerged as predictors of obesity for cisgender bisexual men, transgender women, or transgender men. These findings suggest that there are substantial variations in the presence and predictors of obesity across LGBT subgroups that support the need for culturally tailored healthy weight promotion efforts within the LGBT community.

  6. Cluster Analysis of Clinical Data Identifies Fibromyalgia Subgroups

    Science.gov (United States)

    Docampo, Elisa; Collado, Antonio; Escaramís, Geòrgia; Carbonell, Jordi; Rivera, Javier; Vidal, Javier; Alegre, José

    2013-01-01

    Introduction Fibromyalgia (FM) is mainly characterized by widespread pain and multiple accompanying symptoms, which hinder FM assessment and management. In order to reduce FM heterogeneity we classified clinical data into simplified dimensions that were used to define FM subgroups. Material and Methods 48 variables were evaluated in 1,446 Spanish FM cases fulfilling 1990 ACR FM criteria. A partitioning analysis was performed to find groups of variables similar to each other. Similarities between variables were identified and the variables were grouped into dimensions. This was performed in a subset of 559 patients, and cross-validated in the remaining 887 patients. For each sample and dimension, a composite index was obtained based on the weights of the variables included in the dimension. Finally, a clustering procedure was applied to the indexes, resulting in FM subgroups. Results Variables clustered into three independent dimensions: “symptomatology”, “comorbidities” and “clinical scales”. Only the two first dimensions were considered for the construction of FM subgroups. Resulting scores classified FM samples into three subgroups: low symptomatology and comorbidities (Cluster 1), high symptomatology and comorbidities (Cluster 2), and high symptomatology but low comorbidities (Cluster 3), showing differences in measures of disease severity. Conclusions We have identified three subgroups of FM samples in a large cohort of FM by clustering clinical data. Our analysis stresses the importance of family and personal history of FM comorbidities. Also, the resulting patient clusters could indicate different forms of the disease, relevant to future research, and might have an impact on clinical assessment. PMID:24098674

  7. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  8. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  9. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  10. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  11. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  12. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  13. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  14. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  15. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  16. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...

  17. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  18. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions...... within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004) and is Colb (1975) still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004) claims that we...... investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic...

  19. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  20. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  1. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  2. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  3. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  4. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  5. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  6. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  7. Identification of subgroups of inflammatory and degenerative MRI findings in the spine and sacroiliac joints

    DEFF Research Database (Denmark)

    Arnbak, Bodil; Jensen, Rikke Krüger; Manniche, Claus;

    2016-01-01

    BACKGROUND: The aim of this study was to investigate subgroups of magnetic resonance imaging (MRI) findings for the spine and sacroiliac joints (SIJs) using latent class analysis (LCA), and to investigate whether these subgroups differ in their demographic and clinical characteristics. METHODS......: The sample included 1037 patients aged 18-40 years with persistent low back pain (LBP). LCA was applied to MRI findings of the spine and SIJs. The resulting subgroups were tested for differences in self-reported demographic and clinical characteristics. RESULTS: A five-class model was identified: Subgroup 1...... the subgroups with predominantly spinal findings (Subgroups 1-3), median age, prevalence of men, being overweight and previous LBP episodes were statistically significantly lower in Subgroup 1, higher in Subgroup 2 and highest in Subgroup 3. CONCLUSIONS: Five distinct subgroups of MRI findings in the spine...

  8. Symmetry breaking, subgroup embeddings and the Weyl group

    CERN Document Server

    George, Damien P; Thompson, Jayne E; Volkas, Raymond R

    2013-01-01

    We present a systematic approach to writing adjoint Higgs vacuum expectation values (vevs), which break a symmetry G to differently embedded isomorphic copies of a subgroup belonging to the chain $G \\supset H_1 \\supset ... \\supset H_l $, as linear combinations of each other. Given an adjoint Higgs vacuum expectation value h breaking G \\rightarrow H, a full complement of vevs breaking G to different embeddings of the subgroup H can be generated through the Weyl group orbit of h. An explicit formula for recovering each vev is given. We focus on the case when H stabilizes the highest weight of the lowest dimensional fundamental representation, where the formula is exceedingly simple. We also discuss cases when the Higgs field is not in the adjoint representation and apply these techniques to current research problems, especially in domain-wall brane model building.

  9. Combined group ECC protection and subgroup parity protection

    Energy Technology Data Exchange (ETDEWEB)

    Gara, Alan; Cheng, Dong; Heidelberger, Philip; Ohmacht, Martin

    2016-02-02

    A method and system are disclosed for providing combined error code protection and subgroup parity protection for a given group of n bits. The method comprises the steps of identifying a number, m, of redundant bits for said error protection; and constructing a matrix P, wherein multiplying said given group of n bits with P produces m redundant error correction code (ECC) protection bits, and two columns of P provide parity protection for subgroups of said given group of n bits. In the preferred embodiment of the invention, the matrix P is constructed by generating permutations of m bit wide vectors with three or more, but an odd number of, elements with value one and the other elements with value zero; and assigning said vectors to rows of the matrix P.

  10. Combined group ECC protection and subgroup parity protection

    Science.gov (United States)

    Gara, Alan G.; Chen, Dong; Heidelberger, Philip; Ohmacht, Martin

    2013-06-18

    A method and system are disclosed for providing combined error code protection and subgroup parity protection for a given group of n bits. The method comprises the steps of identifying a number, m, of redundant bits for said error protection; and constructing a matrix P, wherein multiplying said given group of n bits with P produces m redundant error correction code (ECC) protection bits, and two columns of P provide parity protection for subgroups of said given group of n bits. In the preferred embodiment of the invention, the matrix P is constructed by generating permutations of m bit wide vectors with three or more, but an odd number of, elements with value one and the other elements with value zero; and assigning said vectors to rows of the matrix P.

  11. Practical Algorithms for Subgroup Detection in Covert Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah; Wiil, Uffe Kock; Qureshi, Pir Abdul Rasool

    2010-01-01

    In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrated in an application by a prototype system. The system finds associations between terrorist and terrorist organisations...... and is capable of determining links between terrorism plots occurred in the past, their affiliation with terrorist camps, travel record, funds transfer, etc. The findings are represented by a network in the form of an Attributed Relational Graph (ARG). Paths from a node to any other node in the network indicate...... the relationships between individuals and organisations. The system also provides assistance to law enforcement agencies, indicating when the capture of a specific terrorist will more likely destabilise the terrorist network. In this paper, we discuss the important application area related to subgroups...

  12. Pathophysiology and immunological profile of myasthenia gravis and its subgroups.

    Science.gov (United States)

    Romi, Fredrik; Hong, Yu; Gilhus, Nils Erik

    2017-08-03

    Myasthenia gravis (MG) is an autoimmune antibody-mediated disease characterized by muscle weakness and fatigability. It is believed that the initial steps triggering humoral immunity in MG take place inside thymic tissue and thymoma. The immune response against one or several epitopes expressed on thymic tissue cells spills over to neuromuscular junction components sharing the same epitope causing humoral autoimmunity and antibody production. The main cause of MG is acetylcholine receptor antibodies. However, many other neuromuscular junction membrane protein targets, intracellular and extracellular proteins are suggested to participate in MG pathophysiology. MG should be divided into subgroups based on clinical presentation and immunology. This includes onset age, clinical characteristics, thymic pathology and antibody profile. The immunological profile of these subgroups is determined by the antibodies present. Copyright © 2017. Published by Elsevier Ltd.

  13. Equivariant Equipartitions: Ham Sandwich Theorems for Finite Subgroups of Spheres

    CERN Document Server

    Simon, Steven

    2011-01-01

    Equivariant "Ham Sandwich" Theorems are obtained for the finite subgroups of the unit spheres S^{d-1}, d=1,2,4. Given any F-valued mass distributions on F^n and any non-zero finite subgroup G of the unit sphere S^{d-1} in F= R, C, or H, it is shown that there exists a collection of fundamental G-regions partitioning F^n which "G-Equipartition" each of the n measures, as realized by the simultaneous vanishing of the "G-averages" of the regions' measures. Equipartition results for real measures follow, among them that any n signed mass distributions on R^{(p-1)n} can be equipartitioned by a single regular p-fan for any prime number p.

  14. Notes on Discrete Subgroups of Möbius Transformations

    Indian Academy of Sciences (India)

    Hua Wang; Yueping Jiang; Wensheng Cao

    2013-05-01

    Jørgensen’s inequality gives a necessary condition for a nonelementary two generator subgroup of $SL(2,\\mathbb{C})$ to be discrete. By embedding $SL(2,\\mathbb{C})$ into $Û(1,1;\\mathbb{H})$, we obtain a new type of Jørgensen’s inequality, which is in terms of the coefficients of involved isometries. We provide an example to show that this result gives an improvement over the classical Jørgensen’s inequality.

  15. Characteristic Properties of Large Subgroups in Primary Abelian Groups

    Indian Academy of Sciences (India)

    Peter V Danchev

    2004-08-01

    Suppose is an arbitrary additively written primary abelian group with a fixed large subgroup . It is shown that is (a) summable; (b)$\\sum$-summable; (c) a $\\sum$-group; (d) $p^{+1}$-projective only when so is . These claims extend results of such a kind obtained by Benabdallah, Eisenstadt, Irwin and Poluianov, Acta Math. Acad. Sci. Hungaricae (1970) and Khan, Proc. Indian Acad. Sci. Sect. A (1978).

  16. Molecular Subgroup of Primary Prostate Cancer Presenting with Metastatic Biology.

    Science.gov (United States)

    Walker, Steven M; Knight, Laura A; McCavigan, Andrena M; Logan, Gemma E; Berge, Viktor; Sherif, Amir; Pandha, Hardev; Warren, Anne Y; Davidson, Catherine; Uprichard, Adam; Blayney, Jaine K; Price, Bethanie; Jellema, Gera L; Steele, Christopher J; Svindland, Aud; McDade, Simon S; Eden, Christopher G; Foster, Chris; Mills, Ian G; Neal, David E; Mason, Malcolm D; Kay, Elaine W; Waugh, David J; Harkin, D Paul; Watson, R William; Clarke, Noel W; Kennedy, Richard D

    2017-10-01

    Approximately 4-25% of patients with early prostate cancer develop disease recurrence following radical prostatectomy. To identify a molecular subgroup of prostate cancers with metastatic potential at presentation resulting in a high risk of recurrence following radical prostatectomy. Unsupervised hierarchical clustering was performed using gene expression data from 70 primary resections, 31 metastatic lymph nodes, and 25 normal prostate samples. Independent assay validation was performed using 322 radical prostatectomy samples from four sites with a mean follow-up of 50.3 months. Molecular subgroups were identified using unsupervised hierarchical clustering. A partial least squares approach was used to generate a gene expression assay. Relationships with outcome (time to biochemical and metastatic recurrence) were analysed using multivariable Cox regression and log-rank analysis. A molecular subgroup of primary prostate cancer with biology similar to metastatic disease was identified. A 70-transcript signature (metastatic assay) was developed and independently validated in the radical prostatectomy samples. Metastatic assay positive patients had increased risk of biochemical recurrence (multivariable hazard ratio [HR] 1.62 [1.13-2.33]; p=0.0092) and metastatic recurrence (multivariable HR=3.20 [1.76-5.80]; p=0.0001). A combined model with Cancer of the Prostate Risk Assessment post surgical (CAPRA-S) identified patients at an increased risk of biochemical and metastatic recurrence superior to either model alone (HR=2.67 [1.90-3.75]; p<0.0001 and HR=7.53 [4.13-13.73]; p<0.0001, respectively). The retrospective nature of the study is acknowledged as a potential limitation. The metastatic assay may identify a molecular subgroup of primary prostate cancers with metastatic potential. The metastatic assay may improve the ability to detect patients at risk of metastatic recurrence following radical prostatectomy. The impact of adjuvant therapies should be assessed in

  17. Dehn twists and free subgroups of symplectic mapping class groups

    CERN Document Server

    Keating, Ailsa

    2012-01-01

    Given two Lagrangian spheres in an exact symplectic manifold, we find conditions under which the Dehn twists about them generate a free non-abelian subgroup of the symplectic mapping class group. This extends a result of Ishida for Riemann surfaces. The proof generalises the categorical version of Seidel's long exact sequence to arbitrary powers of a fixed Dehn twist. We also show that the Milnor fibre of any isolated degenerate hypersurface singularity contains such pairs of spheres.

  18. Ideal Class Groups and Subgroups of Real Quadratic Function Fields

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    In this paper, we study the real quadratic function fields K=k(D), given a necessary and sufficient condition for the ideal class group H(K) of any real quadratic function field K to have a cyclic subgroup of order n, and obtained eight series of such fields. The ideal class numbers h(OK) of K in the series all have a factor n.

  19. Locally Transitive Graphs Admitting a Group with Cyclic Sylow Subgroups*

    Institute of Scientific and Technical Information of China (English)

    CHEN SHANG-DI; FENG QING-LIN

    2010-01-01

    All graphs are finite simple undirected and of no isolated vertices in this paper. Using the theory of coset graphs and permutation groups, it is completed that a classification of locally transitive graphs admitting a non-Abelian group with cyclic Sylow subgroups. They are either the union of the family of arc-transitive graphs, or the union of the family of bipartite edge-transitive graphs.

  20. Measuring the Speed of Aging across Population Subgroups

    Science.gov (United States)

    2014-01-01

    People in different subgroups age at different rates. Surveys containing biomarkers can be used to assess these subgroup differences. We illustrate this using hand-grip strength to produce an easily interpretable, physical-based measure that allows us to compare characteristic-based ages across educational subgroups in the United States. Hand-grip strength has been shown to be a good predictor of future mortality and morbidity, and therefore a useful indicator of population aging. Data from the Health and Retirement Survey (HRS) were used. Two education subgroups were distinguished, those with less than a high school diploma and those with more education. Regressions on hand-grip strength were run for each sex and race using age and education, their interactions and other covariates as independent variables. Ages of identical mean hand-grip strength across education groups were compared for people in the age range 60 to 80. The hand-grip strength of 65 year old white males with less education was the equivalent to that of 69.6 (68.2, 70.9) year old white men with more education, indicating that the more educated men had aged more slowly. This is a constant characteristic age, as defined in the Sanderson and Scherbov article “The characteristics approach to the measurement of population aging” published 2013 in Population and Development Review. Sixty-five year old white females with less education had the same average hand-grip strength as 69.4 (68.2, 70.7) year old white women with more education. African-American women at ages 60 and 65 with more education also aged more slowly than their less educated counterparts. African American men with more education aged at about the same rate as those with less education. This paper expands the toolkit of those interested in population aging by showing how survey data can be used to measure the differential extent of aging across subpopulations. PMID:24806337

  1. Neurocognitive performance as an endophenotype for mood disorder subgroups.

    Science.gov (United States)

    Merikangas, Alison K; Cui, Lihong; Calkins, Monica E; Moore, Tyler M; Gur, Ruben C; Gur, Raquel E; Merikangas, Kathleen R

    2017-06-01

    There is growing evidence that neurocognitive function may be an endophenotype for mood disorders. The goal of this study is to examine the specificity and familiality of neurocognitive functioning across the full range of mood disorder subgroups, including Bipolar I (BP-I), Bipolar II (BP-II), Major Depressive Disorders (MDD), and controls in a community-based family study. A total of 310 participants from 137 families with mood spectrum disorders (n=151) and controls (n=159) completed the University of Pennsylvania's Computerized Neurocognitive Battery (CNB) that assessed the accuracy and speed of task performance across five domains. Mixed effects regression models tested association and familiality. Compared to those without mood disorders, participants with BP-I had increased accuracy in complex cognition, while participants with MDD were more accurate in emotion recognition. There was also a significant familial association for accuracy of complex cognition. Mood disorder subgroups did not differ in performance speed in any of the domains. The small number of BP-I cases, and family size limited the statistical power of these analyses, and the cross-sectional assessment of neurocognitive function precluded our ability to determine whether performance precedes or post dates onset of disorder. This is one of the few community-based family studies of potential neurocognitive endophenotypes that includes the full range of mood disorder subgroups. There were few differences in neurocognitive function except enhanced accuracy in specific domains among those with BP-I and MDD. The differential findings across specific mood disorder subgroups substantiate their heterogeneity in other biologic and endophenotypic domains. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  3. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  4. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  5. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  6. A 6-gene signature identifies four molecular subgroups of neuroblastoma

    Directory of Open Access Journals (Sweden)

    Kogner Per

    2011-04-01

    Full Text Available Abstract Background There are currently three postulated genomic subtypes of the childhood tumour neuroblastoma (NB; Type 1, Type 2A, and Type 2B. The most aggressive forms of NB are characterized by amplification of the oncogene MYCN (MNA and low expression of the favourable marker NTRK1. Recently, mutations or high expression of the familial predisposition gene Anaplastic Lymphoma Kinase (ALK was associated to unfavourable biology of sporadic NB. Also, various other genes have been linked to NB pathogenesis. Results The present study explores subgroup discrimination by gene expression profiling using three published microarray studies on NB (47 samples. Four distinct clusters were identified by Principal Components Analysis (PCA in two separate data sets, which could be verified by an unsupervised hierarchical clustering in a third independent data set (101 NB samples using a set of 74 discriminative genes. The expression signature of six NB-associated genes ALK, BIRC5, CCND1, MYCN, NTRK1, and PHOX2B, significantly discriminated the four clusters (p ALK, BIRC5, and PHOX2B, and was significantly associated with higher tumour stage, poor outcome and poor survival compared to the Type 1-corresponding favourable group (INSS stage 4 and/or dead of disease, p Conclusions Based on expression profiling we have identified four molecular subgroups of neuroblastoma, which can be distinguished by a 6-gene signature. The fourth subgroup has not been described elsewhere, and efforts are currently made to further investigate this group's specific characteristics.

  7. Male breast cancer: Looking for better prognostic subgroups.

    Science.gov (United States)

    Abreu, Miguel Henriques; Afonso, Noémia; Abreu, Pedro Henriques; Menezes, Francisco; Lopes, Paula; Henrique, Rui; Pereira, Deolinda; Lopes, Carlos

    2016-04-01

    Male Breast Cancer (MBC) remains a poor understood disease. Prognostic factors are not well established and specific prognostic subgroups are warranted. Retrospectively revision of 111 cases treated in the same Cancer Center. Blinded-central pathological revision with immunohistochemical (IHQ) analysis for estrogen (ER), progesterone (PR) and androgen (AR) receptors, HER2, ki67 and p53 was done. Cox regression model was used for uni/multivariate survival analysis. Two classifications of Female Breast Cancer (FBC) subgroups (based in ER, PR, HER2, 2000 classification, and in ER, PR, HER2, ki67, 2013 classification) were used to achieve their prognostic value in MBC patients. Hierarchical clustering was performed to define subgroups based on the six-IHQ panel. According to FBC classifications, the majority of tumors were luminal: A (89.2%; 60.0%) and B (7.2%; 35.8%). Triple negative phenotype was infrequent (2.7%; 3.2%) and HER2 enriched, non-luminal, was rare (≤1% in both). In multivariate analysis the poor prognostic factors were: size >2 cm (HR:1.8; 95%CI:1.0-3.4 years, p = 0.049), absence of ER (HR:4.9; 95%CI:1.7-14.3 years, p = 0.004) and presence of distant metastasis (HR:5.3; 95%CI:2.2-3.1 years, p 0.20). Clustering defined different subgroups, that have prognostic value in multivariate analysis (p = 0.005), with better survival in ER/PR+, AR-, HER2-and ki67/p53 low group (median: 11.5 years; 95%CI: 6.2-16.8 years) and worst in PR-group (median:4.5 years; 95%CI: 1.6-7.8 years). FBC subtypes do not give the same prognostic information in MBC even in luminal groups. Two subgroups with distinct prognosis were identified in a common six-IHQ panel. Future studies must achieve their real prognostic value in these patients. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. Subgroup Analysis of Trials Is Rarely Easy (SATIRE: a study protocol for a systematic review to characterize the analysis, reporting, and claim of subgroup effects in randomized trials

    Directory of Open Access Journals (Sweden)

    Malaga German

    2009-11-01

    Full Text Available Abstract Background Subgroup analyses in randomized trials examine whether effects of interventions differ between subgroups of study populations according to characteristics of patients or interventions. However, findings from subgroup analyses may be misleading, potentially resulting in suboptimal clinical and health decision making. Few studies have investigated the reporting and conduct of subgroup analyses and a number of important questions remain unanswered. The objectives of this study are: 1 to describe the reporting of subgroup analyses and claims of subgroup effects in randomized controlled trials, 2 to assess study characteristics associated with reporting of subgroup analyses and with claims of subgroup effects, and 3 to examine the analysis, and interpretation of subgroup effects for each study's primary outcome. Methods We will conduct a systematic review of 464 randomized controlled human trials published in 2007 in the 118 Core Clinical Journals defined by the National Library of Medicine. We will randomly select journal articles, stratified in a 1:1 ratio by higher impact versus lower impact journals. According to 2007 ISI total citations, we consider the New England Journal of Medicine, JAMA, Lancet, Annals of Internal Medicine, and BMJ as higher impact journals. Teams of two reviewers will independently screen full texts of reports for eligibility, and abstract data, using standardized, pilot-tested extraction forms. We will conduct univariable and multivariable logistic regression analyses to examine the association of pre-specified study characteristics with reporting of subgroup analyses and with claims of subgroup effects for the primary and any other outcomes. Discussion A clear understanding of subgroup analyses, as currently conducted and reported in published randomized controlled trials, will reveal both strengths and weaknesses of this practice. Our findings will contribute to a set of recommendations to optimize

  9. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  10. Local clustering in scale-free networks with hidden variables.

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A J E M; van Leeuwaarden, Johan S H; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ∈(2,3), so that the degrees have infinite variance. The natural cutoff h_{c} characterizes the largest degrees in the hidden variable models, and a structural cutoff h_{s} introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N, as a function of h_{s} and h_{c}. For scale-free networks with exponent 2vanish only for networks as large as N=10^{9}.

  11. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  12. Modelling proteins' hidden conformations to predict antibiotic resistance

    Science.gov (United States)

    Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.

    2016-10-01

    TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.

  13. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  14. Self-similarity of complex networks and hidden metric spaces

    CERN Document Server

    Serrano, M Angeles; Boguna, Marian

    2007-01-01

    We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

  15. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  16. Dark matter in the nonabelian hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2015-01-01

    We discuss the dark matter in the hidden gauge theory. We propose a scenario where the mini-inflation dilutes the dark matter density. This scenario is consistent with the current baryon number asymmetry.

  17. Hidden Symmetry from Supersymmetry in One-Dimensional Quantum Mechanics

    Directory of Open Access Journals (Sweden)

    Alexander A. Andrianov

    2009-06-01

    Full Text Available When several inequivalent supercharges form a closed superalgebra in Quantum Mechanics it entails the appearance of hidden symmetries of a Super-Hamiltonian. We examine this problem in one-dimensional QM for the case of periodic potentials and potentials with finite number of bound states. After the survey of the results existing in the subject the algebraic and analytic properties of hidden-symmetry differential operators are rigorously elaborated in the Theorems and illuminated by several examples.

  18. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  19. Extracting hidden trails and roads under canopy using LIDAR

    OpenAIRE

    Krougios, Prokopios

    2008-01-01

    The field of Remote Sensing has been greatly benefited by the development of LIDAR. The extraction of bare earth under tree canopies and especially the identification of hidden trails are important tools for military and civilian operations in dense forests. LIDAR data from Sequoia National Park in California (2008) and Fort Belvoir Military Base in Virginia (2007) were two areas that were selected for analysis. Quick Terrain Modeler software was used in order to recognize hidden trails....

  20. Physical nature of a hidden mass in the Universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Yu. (AN SSSR, Moscow. Inst. Prikladnoj Matematiki)

    1984-04-01

    The problem of an origin of the hidden mass of the Universe is discussed. Observation astronomic data on large-scale Universe structure and hidden mass distribution within the framework of the adiabatic theory of galaxies formation point out the dominance in nowadays Universe of weakly-interacting particles with 15-60 eV mass. Restrictions are obtained for a possible admixture of other relict particles.

  1. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  2. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  3. Reduced-Rank Hidden Markov Models

    CERN Document Server

    Siddiqi, Sajid M; Gordon, Geoffrey J

    2009-01-01

    We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-...

  4. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  5. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  6. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  7. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  8. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  9. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  10. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  11. Stochastic precipitation generator with hidden state covariates

    Science.gov (United States)

    Kim, Yongku; Lee, GyuWon

    2017-08-01

    Time series of daily weather such as precipitation, minimum temperature and maximum temperature are commonly required for various fields. Stochastic weather generators constitute one of the techniques to produce synthetic daily weather. The recently introduced approach for stochastic weather generators is based on generalized linear modeling (GLM) with covariates to account for seasonality and teleconnections (e.g., with the El Niño). In general, stochastic weather generators tend to underestimate the observed interannual variance of seasonally aggregated variables. To reduce this overdispersion, we incorporated time series of seasonal dry/wet indicators in the GLM weather generator as covariates. These seasonal time series were local (or global) decodings obtained by a hidden Markov model of seasonal total precipitation and implemented in the weather generator. The proposed method is applied to time series of daily weather from Seoul, Korea and Pergamino, Argentina. This method provides a straightforward translation of the uncertainty of the seasonal forecast to the corresponding conditional daily weather statistics.

  12. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  13. Coulomb gauge model for hidden charm tetraquarks

    Science.gov (United States)

    Xie, W.; Mo, L. Q.; Wang, Ping; Cotanch, Stephen R.

    2013-08-01

    The spectrum of tetraquark states with hidden charm is studied within an effective Coulomb gauge Hamiltonian approach. Of the four independent color schemes, two are investigated, the (qcbar)1(cqbar)1 singlet-singlet (molecule) and the (qc)3(qbarcbar)3 triplet-triplet (diquark), for selected JPC states using a variational method. The predicted masses of triplet-triplet tetraquarks are roughly a GeV heavier than the singlet-singlet states. There is also an interesting flavor dependence with (qqbar)1 (ccbar1) states about half a GeV lighter than (qcbar)1(qbarc)1. The lightest 1++ and 1-- predictions are in agreement with the observed X (3872) and Y (4008) masses suggesting they are molecules with ωJ / ψ and ηhc, rather than D*Dbar* and DDbar, type structure, respectively. Similarly, the lightest isovector 1++ molecule, having a ρJ / ψ flavor composition, has mass near the recently observed charged Zc (3900) value. These flavor configurations are consistent with observed X, Y and Zc decays to ππJ / ψ.

  14. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  15. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  16. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  17. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  18. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  19. Electroencephalographic characterization of subgroups of children with learning disorders.

    Science.gov (United States)

    Roca-Stappung, Milene; Fernández, Thalía; Bosch-Bayard, Jorge; Harmony, Thalía; Ricardo-Garcell, Josefina

    2017-01-01

    Electroencephalographic alterations have been reported in subjects with learning disorders, but there is no consensus on what characterizes their electroencephalogram findings. Our objective was to determine if there were subgroups within a group of scholars with not otherwise specified learning disorders and if they had specific electroencephalographic patterns. Eighty-five subjects (31 female, 8-11 years) who scored low in at least two subscales -reading, writing and arithmetic- of the Infant Neuropsychological Evaluation were included. Electroencephalograms were recorded in 19 leads during rest with eyes closed; absolute power was obtained every 0.39 Hz. Three subgroups were formed according to children's performance: Group 1 (G1, higher scores than Group 2 in reading speed and reading and writing accuracy), Group 2 (G2, better performance than G1 in composition) and Group 3 (G3, lower scores than Groups 1 and 2 in the three subscales). G3 had higher absolute power in frequencies in the delta and theta range at left frontotemporal sites than G1 and G2. G2 had higher absolute power within alpha frequencies than G3 and G1 at the left occipital site. G3 had higher absolute power in frequencies in the beta range than G1 in parietotemporal areas and than G2 in left frontopolar and temporal sites. G1 had higher absolute power within beta frequencies than G2 in the left frontopolar site. G3 had lower gamma absolute power values than the other groups in the left hemisphere, and gamma activity was higher in G1 than in G2 in frontopolar and temporal areas. This group of children with learning disorders is very heterogeneous. Three subgroups were found with different cognitive profiles, as well as a different electroencephalographic pattern. It is important to consider these differences when planning interventions for children with learning disorders.

  20. Cluster Analysis to Identify Possible Subgroups in Tinnitus Patients.

    Science.gov (United States)

    van den Berge, Minke J C; Free, Rolien H; Arnold, Rosemarie; de Kleine, Emile; Hofman, Rutger; van Dijk, J Marc C; van Dijk, Pim

    2017-01-01

    In tinnitus treatment, there is a tendency to shift from a "one size fits all" to a more individual, patient-tailored approach. Insight in the heterogeneity of the tinnitus spectrum might improve the management of tinnitus patients in terms of choice of treatment and identification of patients with severe mental distress. The goal of this study was to identify subgroups in a large group of tinnitus patients. Data were collected from patients with severe tinnitus complaints visiting our tertiary referral tinnitus care group at the University Medical Center Groningen. Patient-reported and physician-reported variables were collected during their visit to our clinic. Cluster analyses were used to characterize subgroups. For the selection of the right variables to enter in the cluster analysis, two approaches were used: (1) variable reduction with principle component analysis and (2) variable selection based on expert opinion. Various variables of 1,783 tinnitus patients were included in the analyses. Cluster analysis (1) included 976 patients and resulted in a four-cluster solution. The effect of external influences was the most discriminative between the groups, or clusters, of patients. The "silhouette measure" of the cluster outcome was low (0.2), indicating a "no substantial" cluster structure. Cluster analysis (2) included 761 patients and resulted in a three-cluster solution, comparable to the first analysis. Again, a "no substantial" cluster structure was found (0.2). Two cluster analyses on a large database of tinnitus patients revealed that clusters of patients are mostly formed by a different response of external influences on their disease. However, both cluster outcomes based on this dataset showed a poor stability, suggesting that our tinnitus population comprises a continuum rather than a number of clearly defined subgroups.

  1. A 6-gene signature identifies four molecular subgroups of neuroblastoma

    LENUS (Irish Health Repository)

    Abel, Frida

    2011-04-14

    Abstract Background There are currently three postulated genomic subtypes of the childhood tumour neuroblastoma (NB); Type 1, Type 2A, and Type 2B. The most aggressive forms of NB are characterized by amplification of the oncogene MYCN (MNA) and low expression of the favourable marker NTRK1. Recently, mutations or high expression of the familial predisposition gene Anaplastic Lymphoma Kinase (ALK) was associated to unfavourable biology of sporadic NB. Also, various other genes have been linked to NB pathogenesis. Results The present study explores subgroup discrimination by gene expression profiling using three published microarray studies on NB (47 samples). Four distinct clusters were identified by Principal Components Analysis (PCA) in two separate data sets, which could be verified by an unsupervised hierarchical clustering in a third independent data set (101 NB samples) using a set of 74 discriminative genes. The expression signature of six NB-associated genes ALK, BIRC5, CCND1, MYCN, NTRK1, and PHOX2B, significantly discriminated the four clusters (p < 0.05, one-way ANOVA test). PCA clusters p1, p2, and p3 were found to correspond well to the postulated subtypes 1, 2A, and 2B, respectively. Remarkably, a fourth novel cluster was detected in all three independent data sets. This cluster comprised mainly 11q-deleted MNA-negative tumours with low expression of ALK, BIRC5, and PHOX2B, and was significantly associated with higher tumour stage, poor outcome and poor survival compared to the Type 1-corresponding favourable group (INSS stage 4 and\\/or dead of disease, p < 0.05, Fisher\\'s exact test). Conclusions Based on expression profiling we have identified four molecular subgroups of neuroblastoma, which can be distinguished by a 6-gene signature. The fourth subgroup has not been described elsewhere, and efforts are currently made to further investigate this group\\'s specific characteristics.

  2. Upper bounds for reversible circuits based on Young subgroups

    DEFF Research Database (Denmark)

    Abdessaied, Nabila; Soeken, Mathias; Thomsen, Michael Kirkedal;

    2014-01-01

    We present tighter upper bounds on the number of Toffoli gates needed in reversible circuits. Both multiple controlled Toffoli gates and mixed polarity Toffoli gates have been considered for this purpose. The calculation of the bounds is based on a synthesis approach based on Young subgroups that...... that results in circuits using a more generalized gate library. Starting from an upper bound for this library we derive new bounds which improve the existing bound by around 77%. © 2014 Elsevier B.V. All rights reserved....

  3. Distribution of Elements of Cosets of Small Subgroups and Applications

    CERN Document Server

    Bourgain, Jean; Shparlinski, Igor E

    2011-01-01

    We obtain a series of estimates on the number of small integers and small order Farey fractions which belong to a given coset of a subgroup of order $t$ of the group of units of the residue ring modulo a prime $p$, in the case when $t$ is small compared to $p$. We give two applications of these results: to the simultaneous distribution of two high degree monomials $x^{k_1}$ and $x^{k_2}$ modulo $p$ and to a question of J.~Holden and P.~Moree on fixed points of the discrete logarithm.

  4. Distribution on elements of cosets of small subgroups and applications

    CERN Document Server

    Bourgain, Jean; Shparlinski, Igor

    2011-01-01

    We obtain a series of estimates on the number of small integers and small order Farey fractions which belong to a given coset of a subgroup of order $t$ of the group of units of the residue ring modulo a prime $p$, in the case when $t$ is small compared to $p$. We give two applications of these results: to the simultaneous distribution of two high degree monomials $x^{k_1}$ and $x^{k_2}$ modulo $p$ and to a question of J.Holden and P.Moree on fixed points of the discrete logarithm.

  5. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  6. Genomic compositions and phylogenetic analysis of Shigella boydii subgroup

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Comparative Genomic Hybridization (CGH) microarray analysis was used to compare the genomic compositions of all eighteen Shigella boydii serotype representative strains. The results indicated the genomic "backbone" of this subgroup contained 2552 ORFs homologous to nonpathogenic E. coli K12. Compared with the genome of K12199 ORFs were found to be absent in all S. boydii serotype representatives, including mainly outer membrane protein genes and O-antigen biosynthesis genes. Yet the specific ORFs of S. boydii subgroup contained basically bacteriophage genes and the function unknown (FUN) genes. Some iron metabolism, transport and type II secretion system related genes were found in most representative strains. According to the CGH phylogenetic analysis, the eighteen S. boydii serotype representatives were divided into four groups, in which serotype C13 strain was remarkably distinguished from the other serotype strains. This grouping result corresponded to the distribution of some metabolism related genes. Furthermore, the analysis of genome backbone genes, specific genes, and the phylogenetic trees allowed us to discover the evolution laws of S. boydii and to find out important clues to pathogenesis research, vaccination and the therapeutic medicine development.

  7. Comparative Genomics of the Listeria monocytogenes ST204 Subgroup

    Science.gov (United States)

    Fox, Edward M.; Allnutt, Theodore; Bradbury, Mark I.; Fanning, Séamus; Chandry, P. Scott

    2016-01-01

    The ST204 subgroup of Listeria monocytogenes is among the most frequently isolated in Australia from a range of environmental niches. In this study we provide a comparative genomics analysis of food and food environment isolates from geographically diverse sources. Analysis of the ST204 genomes showed a highly conserved core genome with the majority of variation seen in mobile genetic elements such as plasmids, transposons and phage insertions. Most strains (13/15) harbored plasmids, which although varying in size contained highly conserved sequences. Interestingly 4 isolates contained a conserved plasmid of 91,396 bp. The strains examined were isolated over a period of 12 years and from different geographic locations suggesting plasmids are an important component of the genetic repertoire of this subgroup and may provide a range of stress tolerance mechanisms. In addition to this 4 phage insertion sites and 2 transposons were identified among isolates, including a novel transposon. These genetic elements were highly conserved across isolates that harbored them, and also contained a range of genetic markers linked to stress tolerance and virulence. The maintenance of conserved mobile genetic elements in the ST204 population suggests these elements may contribute to the diverse range of niches colonized by ST204 isolates. Environmental stress selection may contribute to maintaining these genetic features, which in turn may be co-selecting for virulence markers relevant to clinical infection with ST204 isolates. PMID:28066377

  8. Psychopathic traits of Dutch adolescents in residential care: identifying subgroups.

    Science.gov (United States)

    Nijhof, Karin S; Vermulst, Ad; Scholte, Ron H J; van Dam, Coleta; Veerman, Jan Willem; Engels, Rutger C M E

    2011-01-01

    The present study examined whether a sample of 214 (52.8% male, M age = 15.76, SD = 1.29) institutionalized adolescents could be classified into subgroups based on psychopathic traits. Confirmatory Factor Analyses revealed a relationship between the subscales of the Youth Psychopathic traits Inventory (YPI) and the three latent constructs of the original model on which it is based. Latent Class Analyses showed that adolescents showing psychopathic traits could be classified into three subgroups. The first group showed low scores on the grandiose/manipulative dimension, the callous/unemotional dimension, and the impulsive/irresponsible dimension (normal group). The second group scored moderate on the grandiose/manipulative dimension and the callous/unemotional dimension and high on the impulsive/irresponsible dimension (impulsive, non-psychopathic-like group). The third group scored high on all three dimensions (psychopathy-like group). The findings revealed that the impulsive, non-psychopathic like group scored significantly higher on internalizing problem behavior compared to the normal group, while the psychopathy-like and the impulsive, non-psychopathic-like group both scored higher on externalizing problem behavior compared to the normal group. Based on a self-report delinquency measure, it appeared that the psychopathy-like group had the highest delinquency rates, except for vandalism. Both the impulsive and psychopathy-like group had the highest scores on the use of soft drugs.

  9. Identifying and Assessing Interesting Subgroups in a Heterogeneous Population

    Directory of Open Access Journals (Sweden)

    Woojoo Lee

    2015-01-01

    Full Text Available Biological heterogeneity is common in many diseases and it is often the reason for therapeutic failures. Thus, there is great interest in classifying a disease into subtypes that have clinical significance in terms of prognosis or therapy response. One of the most popular methods to uncover unrecognized subtypes is cluster analysis. However, classical clustering methods such as k-means clustering or hierarchical clustering are not guaranteed to produce clinically interesting subtypes. This could be because the main statistical variability—the basis of cluster generation—is dominated by genes not associated with the clinical phenotype of interest. Furthermore, a strong prognostic factor might be relevant for a certain subgroup but not for the whole population; thus an analysis of the whole sample may not reveal this prognostic factor. To address these problems we investigate methods to identify and assess clinically interesting subgroups in a heterogeneous population. The identification step uses a clustering algorithm and to assess significance we use a false discovery rate- (FDR- based measure. Under the heterogeneity condition the standard FDR estimate is shown to overestimate the true FDR value, but this is remedied by an improved FDR estimation procedure. As illustrations, two real data examples from gene expression studies of lung cancer are provided.

  10. Comparative Genomics of the Listeria monocytogenes ST204 Subgroup.

    Science.gov (United States)

    Fox, Edward M; Allnutt, Theodore; Bradbury, Mark I; Fanning, Séamus; Chandry, P Scott

    2016-01-01

    The ST204 subgroup of Listeria monocytogenes is among the most frequently isolated in Australia from a range of environmental niches. In this study we provide a comparative genomics analysis of food and food environment isolates from geographically diverse sources. Analysis of the ST204 genomes showed a highly conserved core genome with the majority of variation seen in mobile genetic elements such as plasmids, transposons and phage insertions. Most strains (13/15) harbored plasmids, which although varying in size contained highly conserved sequences. Interestingly 4 isolates contained a conserved plasmid of 91,396 bp. The strains examined were isolated over a period of 12 years and from different geographic locations suggesting plasmids are an important component of the genetic repertoire of this subgroup and may provide a range of stress tolerance mechanisms. In addition to this 4 phage insertion sites and 2 transposons were identified among isolates, including a novel transposon. These genetic elements were highly conserved across isolates that harbored them, and also contained a range of genetic markers linked to stress tolerance and virulence. The maintenance of conserved mobile genetic elements in the ST204 population suggests these elements may contribute to the diverse range of niches colonized by ST204 isolates. Environmental stress selection may contribute to maintaining these genetic features, which in turn may be co-selecting for virulence markers relevant to clinical infection with ST204 isolates.

  11. Disease surveillance using a hidden Markov model

    Directory of Open Access Journals (Sweden)

    Wright Graeme

    2009-08-01

    Full Text Available Abstract Background Routine surveillance of disease notification data can enable the early detection of localised disease outbreaks. Although hidden Markov models (HMMs have been recognised as an appropriate method to model disease surveillance data, they have been rarely applied in public health practice. We aimed to develop and evaluate a simple flexible HMM for disease surveillance which is suitable for use with sparse small area count data and requires little baseline data. Methods A Bayesian HMM was designed to monitor routinely collected notifiable disease data that are aggregated by residential postcode. Semi-synthetic data were used to evaluate the algorithm and compare outbreak detection performance with the established Early Aberration Reporting System (EARS algorithms and a negative binomial cusum. Results Algorithm performance varied according to the desired false alarm rate for surveillance. At false alarm rates around 0.05, the cusum-based algorithms provided the best overall outbreak detection performance, having similar sensitivity to the HMMs and a shorter average time to detection. At false alarm rates around 0.01, the HMM algorithms provided the best overall outbreak detection performance, having higher sensitivity than the cusum-based Methods and a generally shorter time to detection for larger outbreaks. Overall, the 14-day HMM had a significantly greater area under the receiver operator characteristic curve than the EARS C3 and 7-day negative binomial cusum algorithms. Conclusion Our findings suggest that the HMM provides an effective method for the surveillance of sparse small area notifiable disease data at low false alarm rates. Further investigations are required to evaluation algorithm performance across other diseases and surveillance contexts.

  12. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  13. Foundational Forces & Hidden Variables in Technology Commercialization

    Science.gov (United States)

    Barnett, Brandon

    2011-03-01

    The science of physics seems vastly different from the process of technology commercialization. Physics strives to understand our world through the experimental deduction of immutable laws and dependent variables and the resulting macro-scale phenomenon. In comparison, the~goal of business is to make a profit by addressing the needs, preferences, and whims of individuals in a market. It may seem that this environment is too dynamic to identify all the hidden variables and deduct the foundational forces that impact a business's ability to commercialize innovative technologies. One example of a business ``force'' is found in the semiconductor industry. In 1965, Intel co-founder Gordon Moore predicted that the number of transistors incorporated in a chip will approximately double every 24 months. Known as Moore's Law, this prediction has become the guiding principle for the semiconductor industry for the last 40 years. Of course, Moore's Law is not really a law of nature; rather it is the result of efforts by Intel and the entire semiconductor industry. A closer examination suggests that there are foundational principles of business that underlie the macro-scale phenomenon of Moore's Law. Principles of profitability, incentive, and strategic alignment have resulted in a coordinated influx of resources that has driven technologies to market, increasing the profitability of the semiconductor industry and optimizing the fitness of its participants. New innovations in technology are subject to these same principles. So, in addition to traditional market forces, these often unrecognized forces and variables create challenges for new technology commercialization. In this talk, I will draw from ethnographic research, complex adaptive theory, and industry data to suggest a framework with which to think about new technology commercialization. Intel's bio-silicon initiative provides a case study.

  14. Qualitative interaction trees: A tool to identify qualitative treatment-subgroup interactions

    NARCIS (Netherlands)

    Dusseldorp, E.; Mechelen, I. van

    2014-01-01

    When two alternative treatments (A and B) are available, some subgroup of patients may display a better outcome with treatment A than with B, whereas for another subgroup, the reverse may be true. If this is the case, a qualitative (i.e., disordinal) treatment-subgroup interaction is present. Such i

  15. Representing and Counting the Subgroups of the Group Zm×Zn

    Directory of Open Access Journals (Sweden)

    Mario Hampejs

    2014-01-01

    Full Text Available We deduce a simple representation and the invariant factor decompositions of the subgroups of the group Zm×Zn, where m and n are arbitrary positive integers. We obtain formulas for the total number of subgroups and the number of subgroups of a given order.

  16. Self-Concept and Middle School Students with Learning Disabilities: A Comparison of Scholastic Competence Subgroups.

    Science.gov (United States)

    Hagborg, Winston J.

    1996-01-01

    Comparison of middle-school-age students with learning disabilities, grouped according to their self-reported ratings of scholastic competence, found significant differences between the low subgroup and the medium/high subgroups on internal locus of control for positive events, school attitudes, and global self-worth. Subgroups did not differ in…

  17. Volcanic Stratigraphy and Potential Hazards of the Chihsingshan Volcano Subgroup in the Tatun Volcano Group, Northern Taiwan

    Directory of Open Access Journals (Sweden)

    Yu-Wei Tsai

    2010-01-01

    Full Text Available The Chihsingshan Volcano Subgroup (CVSG is one of the most important landforms located within the Tatun Volcano Group in northern Taiwan. Based on a Digital Terrain Model, contour maps and field investigations, the CVSG can be divided into four types of volcanic landforms: (1 a strato- or composite volcano, Chihsingshan; (2 domes, the Shamaoshan and a hidden unit; (3 lava cones, the Baiyunshan and the Hsiaotsaoshan; and (4 a scoria cone, the Chikushan. Meanwhile, many small craters are distributed linearly along two northeast trending normal-fault systems. The occurrences are predominantly lava flows with subsidiary fall deposits, pyroclastic flows, and lahars in which at least twenty layers of lava flow in the CVSG can be recognized. Among them, 16 layers in the Chihsingshan volcano, named as C1 - C16, two in the Baiyunshan, B1 - B2, and two in the Hsiaotsaoshan, H1 - H2. Our study suggests that the potential volcanic hazards include lava and pyroclastic flows and simultaneous or subsequent lahars, if the Chihsingshan erupts in a similar manner as in the past. A volcanic hazard zonation map can be constructed for the purpose of mitigation assuming the future eruptive center and eruptive volume.

  18. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  19. Application of the Subgroup Decomposition Method (SDM for Reactor Simulation

    Directory of Open Access Journals (Sweden)

    Roskoff Nathan

    2016-01-01

    Full Text Available The performance of the TITAN-SDM algorithm for solving a reactor pressure vessel dosimetry problem is evaluated. Douglass and Rahnema recently developed the he subgroup decomposition method (SDM; a methodology which directly couples a consistent coarse-group transport calculation with a set of “decomposition sweeps” to provide a fine-group flux spectrum. The SDM has been implemented into the TITAN three-dimensional transport code and has been shown to accurately solve core criticality problems while significantly reducing computation time. This paper addresses the use of SDM for fixed-source problems. The VENUS-2 dosimetry benchmark problem is selected with an emphasis on fast neutron analysis; therefore, material cross sections are generated from the BUGLE-96 library considering neutron energies greater than 0.1 MeV. The accuracy and efficiency of TITAN-SDM is evaluated by comparison with a standard TITAN multigroup calculation.

  20. Upgrading the safety toolkit: Initiatives of the accident analysis subgroup

    Energy Technology Data Exchange (ETDEWEB)

    O' Kula, K.R.; Chung, D.Y.

    1999-07-01

    Since its inception, the Accident Analysis Subgroup (AAS) of the Energy Facility Contractors Group (EFCOG) has been a leading organization promoting development and application of appropriate methodologies for safety analysis of US Department of Energy (DOE) installations. The AAS, one of seven chartered by the EFCOG Safety Analysis Working Group, has performed an oversight function and provided direction to several technical groups. These efforts have been instrumental toward formal evaluation of computer models, improving the pedigree on high-use computer models, and development of the user-friendly Accident Analysis Guidebook (AAG). All of these improvements have improved the analytical toolkit for best complying with DOE orders and standards shaping safety analysis reports (SARs) and related documentation. Major support for these objectives has been through DOE/DP-45.

  1. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  2. Visual evoked potentials in subgroups of migraine with aura patients.

    Science.gov (United States)

    Coppola, Gianluca; Bracaglia, Martina; Di Lenola, Davide; Di Lorenzo, Cherubino; Serrao, Mariano; Parisi, Vincenzo; Di Renzo, Antonio; Martelli, Francesco; Fadda, Antonello; Schoenen, Jean; Pierelli, Francesco

    2015-01-01

    Patients suffering from migraine with aura can have either pure visual auras or complex auras with sensory disturbances and dysphasia, or both. Few studies have searched for possible pathophysiological differences between these two subgroups of patients. Methods - Forty-seven migraine with aura patients were subdivided in a subgroup with exclusively visual auras (MA, N = 27) and another with complex neurological auras (MA+, N = 20). We recorded pattern-reversal visual evoked potentials (VEP: 15 min of arc cheques, 3.1 reversal per second, 600 sweeps) and measured amplitude and habituation (slope of the linear regression line of amplitude changes from the 1st to 6th block of 100 sweeps) for the N1-P1 and P1-N2 components in patients and, for comparison, in 30 healthy volunteers (HV) of similar age and gender distribution. VEP N1-P1 habituation, i.e. amplitude decrement between 1st and 6th block, which was obvious in most HV (mean slope -0.50), was deficient in both MA (slope +0.01, p = 0.0001) and MA+ (-0.0049, p = 0.001) patients. However, VEP N1-P1 amplitudes across blocks were normal in MA patients, while they were significantly greater in MA+ patients than in HVs. Our findings suggest that in migraine with aura patients different aura phenotypes may be underpinned by different pathophysiological mechanisms. Pre-activation cortical excitability could be higher in patients with complex neurological auras than in those having pure visual auras or in healthy volunteers.

  3. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  4. Riboswitch Detection Using Profile Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Krishnamachari A

    2009-10-01

    Full Text Available Abstract Background Riboswitches are a type of noncoding RNA that regulate gene expression by switching from one structural conformation to another on ligand binding. The various classes of riboswitches discovered so far are differentiated by the ligand, which on binding induces a conformational switch. Every class of riboswitch is characterized by an aptamer domain, which provides the site for ligand binding, and an expression platform that undergoes conformational change on ligand binding. The sequence and structure of the aptamer domain is highly conserved in riboswitches belonging to the same class. We propose a method for fast and accurate identification of riboswitches using profile Hidden Markov Models (pHMM. Our method exploits the high degree of sequence conservation that characterizes the aptamer domain. Results Our method can detect riboswitches in genomic databases rapidly and accurately. Its sensitivity is comparable to the method based on the Covariance Model (CM. For six out of ten riboswitch classes, our method detects more than 99.5% of the candidates identified by the much slower CM method while being several hundred times faster. For three riboswitch classes, our method detects 97-99% of the candidates relative to the CM method. Our method works very well for those classes of riboswitches that are characterized by distinct and conserved sequence motifs. Conclusion Riboswitches play a crucial role in controlling the expression of several prokaryotic genes involved in metabolism and transport processes. As more and more new classes of riboswitches are being discovered, it is important to understand the patterns of their intra and inter genomic distribution. Understanding such patterns will enable us to better understand the evolutionary history of these genetic regulatory elements. However, a complete picture of the distribution pattern of riboswitches will emerge only after accurate identification of riboswitches across genomes

  5. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  6. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  7. Latent class analysis derived subgroups of low back pain patients - do they have prognostic capacity?

    DEFF Research Database (Denmark)

    Mølgaard Nielsen, Anne; Hestbaek, Lise; Vach, Werner

    2017-01-01

    . Previously, we developed two novel suggestions for subgrouping patients with low back pain based on Latent Class Analysis of patient baseline characteristics (patient history and physical examination), which resulted in 7 subgroups when using a single-stage analysis, and 9 subgroups when using a two...... associated with these outcomes, and (iii) assessed the performance of the novel subgroupings as compared to the following variables: two existing subgrouping tools (STarT Back Tool and Quebec Task Force classification), four baseline characteristics and a group of previously identified domain...

  8. Criteria for phytoplasma 16Sr group/subgroup delineation and the need of a platform for proper registration of new groups and subgroups

    Science.gov (United States)

    As more phytoplasmas are discovered in emerging and re-emerging plant diseases worldwide, the scheme for classification of phytoplasmas into 16S rRNA gene RFLP (16Sr) groups and subgroups is experiencing an ongoing rapid expansion. Improper delineation or designation of new groups and subgroups can...

  9. Intronic deletions of tva receptor gene decrease the susceptibility to infection by subgroup A avian sarcoma and leukosis virus subgroup A

    Science.gov (United States)

    The group of avian sarcoma and leukosis virus (ASLV) in chickens contains six highly related subgroups, A to E and J. Four genetic loci, tva, tvb, tvc and tvj, encode for corresponding receptors that determine the susceptibility to the ASLV subgroups. The prevalence of ASLV in hosts may have imposed...

  10. Recent Progress in Search for Hidden/Dark Photon

    CERN Document Server

    Deliyergiyev, M A

    2015-01-01

    We will try to communicate the many difficulties that we encounter when attempting to pinpoint a common origin for the several observed anomalies, or assessing their tension with existing exclusion limits. These include systematics affecting the operation of the detectors, our knowledge of their response, astrophysical uncertainties, and the broad range of particle couplings that can mediate the interaction with a detector target. The interesting astrophysical evidence that motivates a search for dark-photon and focuses our attention on a Hidden Valleys model with a GeV-scale dark sector that produces the exciting signatures, which may include the possible constituent of dark matter, the possible existence of extra gauge groups. Results from the recent underground experiments are also considered. Many models of new physics beyond the Standard Model contain a 'light' hidden sector (dark sector) with a colorful spectrum of new particles. Recently, it has been shown that the hidden sector can give rise to unique...

  11. Applications of hidden symmetries to black hole physics

    Energy Technology Data Exchange (ETDEWEB)

    Frolov, Valeri, E-mail: vfrolov@ualberta.ca [Institute of Theoretical Physics, Department of Physics University of Alberta, Edmonton, Alberta, T6G 2G7 (Canada)

    2011-02-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  12. The hidden-charm pentaquark and tetraquark states

    CERN Document Server

    Chen, Hua-Xing; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like $Z_c$ states and bottomonium-like $Z_b$ states can not be accommodated within the naive quark model. These charged $Z_c$ states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.

  13. Ontology-based Knowledge Extraction from Hidden Web

    Institute of Scientific and Technical Information of China (English)

    SONG Hui; MA Fan-yuan; LIU Xiao-qiang

    2004-01-01

    Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly.

  14. Applications of hidden symmetries to black hole physics

    CERN Document Server

    Frolov, Valeri

    2010-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set (`tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  15. Using the hidden curriculum to teach professionalism in nursing students.

    Science.gov (United States)

    Karimi, Zohreh; Ashktorab, Tahereh; Mohammadi, Easa; Abedi, Heidar Ali

    2014-03-01

    Professionalism in nursing is critical for creating credibility and a positive image. This study was carried out to explain the use of hidden curriculum in teaching professionalism in nursing students. This qualitative study was conducted through purposeful sampling strategy by the participation of 32 nursing students. The data were collected by using semi-structured interviews, and this process was continued until achieving data saturation and themes' emergence. Content analysis method was used for data analysis. DATA ANALYSIS REVEALED THREE MAIN THEMES: Development of understanding the professionalism elements, Variety of influenceability strategies, and Influenceability to various resources. Each theme consisted of some subthemes. The nursing students learnt the professionalism elements by different methods from different resources through the hidden curriculum. Therefore, exploration of the currently administered hidden curricula is suggested.

  16. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  17. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  18. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  19. Anatomic and Physiologic Heterogeneity of Subgroup-A Auditory Sensory Neurons in Fruit Flies

    Science.gov (United States)

    Ishikawa, Yuki; Okamoto, Natsuki; Nakamura, Mizuki; Kim, Hyunsoo; Kamikouchi, Azusa

    2017-01-01

    The antennal ear of the fruit fly detects acoustic signals in intraspecific communication, such as the courtship song and agonistic sounds. Among the five subgroups of mechanosensory neurons in the fly ear, subgroup-A neurons respond maximally to vibrations over a wide frequency range between 100 and 1,200 Hz. The functional organization of the neural circuit comprised of subgroup-A neurons, however, remains largely unknown. In the present study, we used 11 GAL4 strains that selectively label subgroup-A neurons and explored the diversity of subgroup-A neurons by combining single-cell anatomic analysis and Ca2+ imaging. Our findings indicate that the subgroup-A neurons that project into various combinations of subareas in the brain are more anatomically diverse than previously described. Subgroup-A neurons were also physiologically diverse, and some types were tuned to a narrow frequency range, suggesting that the response of subgroup-A neurons to sounds of a wide frequency range is due to the existence of several types of subgroup-A neurons. Further, we found that an auditory behavioral response to the courtship song of flies was attenuated when most subgroup-A neurons were silenced. Together, these findings characterize the heterogeneous functional organization of subgroup-A neurons, which might facilitate species-specific acoustic signal detection. PMID:28701929

  20. Subgroups of parvalbumin-expressing interneurons in layers 2/3 of the visual cortex.

    Science.gov (United States)

    Helm, Jessica; Akgul, Gulcan; Wollmuth, Lonnie P

    2013-03-01

    The input, processing, and output characteristics of inhibitory interneurons help shape information flow through layers 2/3 of the visual cortex. Parvalbumin (PV)-positive interneurons modulate and synchronize the gain and dynamic responsiveness of pyramidal neurons. To define the diversity of PV interneurons in layers 2/3 of the developing visual cortex, we characterized their passive and active membrane properties. Using Ward's and k-means multidimensional clustering, we identified four PV interneuron subgroups. The most notable difference between the subgroups was their firing patterns in response to moderate stimuli just above rheobase. Two subgroups showed regular and continuous firing at all stimulus intensities above rheobase. The difference between these two continuously firing subgroups was that one fired at much higher frequencies and transitioned into this high-frequency firing rate at or near rheobase. The two other subgroups showed irregular, stuttering firing patterns just above rheobase. Both of these subgroups typically transitioned to regular and continuous firing at intense stimulations, but one of these subgroups, the strongly stuttering subgroup, showed irregular firing across a wider range of stimulus intensities and firing frequencies. The four subgroups also differed in excitatory synaptic input, providing independent support for the classification of subgroups. The subgroups of PV interneurons identified here would respond differently to inputs of varying intensity and frequency, generating diverse patterns of PV inhibition in the developing neural circuit.

  1. Using Bayesian Nonparametric Hidden Semi-Markov Models to Disentangle Affect Processes during Marital Interaction.

    Directory of Open Access Journals (Sweden)

    William A Griffin

    Full Text Available Sequential affect dynamics generated during the interaction of intimate dyads, such as married couples, are associated with a cascade of effects-some good and some bad-on each partner, close family members, and other social contacts. Although the effects are well documented, the probabilistic structures associated with micro-social processes connected to the varied outcomes remain enigmatic. Using extant data we developed a method of classifying and subsequently generating couple dynamics using a Hierarchical Dirichlet Process Hidden semi-Markov Model (HDP-HSMM. Our findings indicate that several key aspects of existing models of marital interaction are inadequate: affect state emissions and their durations, along with the expected variability differences between distressed and nondistressed couples are present but highly nuanced; and most surprisingly, heterogeneity among highly satisfied couples necessitate that they be divided into subgroups. We review how this unsupervised learning technique generates plausible dyadic sequences that are sensitive to relationship quality and provide a natural mechanism for computational models of behavioral and affective micro-social processes.

  2. Reheating the Standard Model from a hidden sector

    Science.gov (United States)

    Tenkanen, Tommi; Vaskonen, Ville

    2016-10-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before big bang nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful big bang nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  3. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-01-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  4. Backward causation, hidden variables and the meaning of completeness

    Indian Academy of Sciences (India)

    Huw Price

    2001-02-01

    Bell’s theorem requires the assumption that hidden variables are independent of future measurement settings. This independence assumption rests on surprisingly shaky ground. In particular, it is puzzlingly time-asymmetric. The paper begins with a summary of the case for considering hidden variable models which, in abandoning this independence assumption, allow a degree of ‘backward causation’. The remainder of the paper clarifies the physical significance of such models, in relation to the issue as to whether quantum mechanics provides a complete description of physical reality.

  5. Dynamically Generated Open and Hidden Charm Meson Systems

    CERN Document Server

    Gamermann, D; Strottman, D D; Vacas, M J V

    2006-01-01

    The lowest order chiral Lagrangian successfully applied to study the interaction of the SU(3) octet of pseudo-scalar mesons is generalized to include all mesons from the SU(4) 15-plet of pseudo-scalar mesons. Exchanges of heavy vector mesons, which are indirectly taken into account via this approach, are suppressed. Unitarization in coupled channels leads to dynamical generation of resonances in the open and hidden charm sectors. In particular, for reasonable values of the input, a new narrow scalar resonance in the hidden charm sector appears with a mass of 3.7 GeV.

  6. Reheating the Standard Model from a Hidden Sector

    CERN Document Server

    Tenkanen, Tommi

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  7. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-02-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  8. Image Coding using Markov Models with Hidden States

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto

    1999-01-01

    The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same.......The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same....

  9. How to Find a Hidden World at the LHC

    CERN Document Server

    Wells, James D

    2008-01-01

    I discuss how the Large Hadron Collider era should broaden our view of particle physics research, and apply this thinking to the case of Hidden Worlds. I focus on one of the simplest representative cases of a Hidden World, and detail the rich implications it has for LHC physics, including universal suppression of Higgs boson production, trans-TeV heavy Higgs boson signatures, heavy-to-light Higgs boson decays, weakly coupled exotic gauge bosons, and Higgs boson decays to four fermions via light exotic gauge bosons. Some signatures may be accessible in the very early stages of collider operation, whereas others motivate a later high-lumonosity upgrade.

  10. Subgroup analyses in randomised controlled trials: cohort study on trial protocols and journal publications.

    Science.gov (United States)

    Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2014-07-16

    To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.

  11. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Maya: Hidden Worlds Revealed... determine that the objects to be included in the exhibition ``Maya: Hidden Worlds Revealed,'' imported...

  12. The Function and the Utilization of Hidden Curriculum in College English Teaching

    Institute of Scientific and Technical Information of China (English)

    张英

    2013-01-01

    Explore the nature of the hidden curriculum, and utilize the positive functions of hidden curriculum with theory on English teaching and psychological linguistics to obtain desirable effects in College English teaching.

  13. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    Indian Academy of Sciences (India)

    H Itoh; N Okada; T Yamashita

    2007-11-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden.

  14. Coarse-grained hidden entropy production in partially inaccessible quantum jump trajectories

    OpenAIRE

    Frenzel, Max F.; Sagawa, Takahiro

    2016-01-01

    We consider an open quantum system for which only a subset of all possible transitions are accessible, while the remaining ones are hidden from direct observation. Using a modification of the notion of quantum jump trajectories we introduce the coarse-grained hidden entropy, which quantifies the entropy production in the hidden subsystem conditioned on our observations of the visible part. The entropy production consisting of the sum of visible and coarse-grained hidden entropy is shown to sa...

  15. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  16. Universal primers that amplify RNA from all three flavivirus subgroups

    Directory of Open Access Journals (Sweden)

    Barnard Ross T

    2008-01-01

    Full Text Available Abstract Background Species within the Flavivirus genus pose public health problems around the world. Increasing cases of Dengue and Japanese encephalitis virus in Asia, frequent outbreaks of Yellow fever virus in Africa and South America, and the ongoing spread of West Nile virus throughout the Americas, show the geographical burden of flavivirus diseases. Flavivirus infections are often indistinct from and confused with other febrile illnesses. Here we review the specificity of published primers, and describe a new universal primer pair that can detect a wide range of flaviviruses, including viruses from each of the recognised subgroups. Results Bioinformatic analysis of 257 published full-length Flavivirus genomes revealed conserved regions not previously targeted by primers. Two degenerate primers, Flav100F and Flav200R were designed from these regions and used to generate an 800 base pair cDNA product. The region amplified encoded part of the methyltransferase and most of the RNA-dependent-RNA-polymerase (NS5 coding sequence. One-step RT-PCR testing was successful using standard conditions with RNA from over 60 different flavivirus strains representing about 50 species. The cDNA from each virus isolate was sequenced then used in phylogenetic analyses and database searches to confirm the identity of the template RNA. Conclusion Comprehensive testing has revealed the broad specificity of these primers. We briefly discuss the advantages and uses of these universal primers.

  17. Hispanic Subgroups, Acculturation, and Substance Abuse Treatment Outcomes.

    Science.gov (United States)

    Chartier, Karen G; Carmody, Tom; Akhtar, Maleeha; Stebbins, Mary B; Walters, Scott T; Warden, Diane

    2015-12-01

    This study explored Hispanic subgroup differences in substance use treatment outcomes, and the relationship of acculturation characteristics to these outcomes. Data were from a multisite randomized clinical trial of motivational enhancement therapy versus treatment as usual in a sample of Spanish-speaking substance abusers. Participants were Cuban American (n=34), Mexican American (n=209), Puerto Rican (n=78), and other Hispanic American (n=54). Results suggested that Cuban Americans and individuals with more connection to Hispanic culture had lower treatment retention. Hispanics born in the U.S and those who spoke English at home had a lower percentage of days abstinent during weeks 5-16, although Puerto Ricans born in the U.S. and Cuban Americans living more years in the U.S. had a higher percentage of days abstinent in weeks 1-4 and 5-16, respectively. Results may inform future hypothesis-driven studies in larger Hispanic treatment seeking samples of the relationship between acculturation and treatment outcome.

  18. Topography and Volcanology of the Huangtsuishan Volcano Subgroup, Northern Taiwan

    Directory of Open Access Journals (Sweden)

    Yu-Ming Lai

    2010-01-01

    Full Text Available Combining the shaded relief topography model and the slope map from the Digital Terrain Model (DTM images, toporaphical map, field occurrences and petrography, the volcanic sequences of the Huangtsuishan Volcano Subgroup (HVS can be constructed. Two types of volcanic centers can be identified in this area. One is the Tachienhou volcanic dome, which may be located in the center of an older caldera. The other is the Huangtsui composite volcano, which is composed of interbedding lava flows and pyroclastic deposits with a volcanic crater named the Huangtsui pond at the summit. Eight lava plateaus radiated from Mts. Huangtsui and Tachienhou to the north and the east can be distinguished based on the DTM images. The volcanic deposits are comprised of four lithofacies, the lava flows, pyroclastic breccias, tuffs and lahars on the base of field occurrences. At least thirteen layers of lava flow, named the H1 to H13 can be recognized in the HVS and can be reconstructed and categorized into four stages. An old and large volcano erupted lava flows to form the products of stages one and two, then collapsed to form a caldera with a dome for the third stage. The latest stage of lava flow was poured out from the Huangtsui volcano, which formed a crater at the summit.

  19. The rationality problem for finite subgroups of GL_4(Q)

    CERN Document Server

    Kang, Ming-chang

    2010-01-01

    Let $G$ be a finite subgroup of $GL_4(\\bm{Q})$. The group $G$ induces an action on $\\bm{Q}(x_1,x_2,x_3,x_4)$, the rational function field of four variables over $\\bm{Q}$. Theorem. The fixed subfield $\\bm{Q}(x_1,x_2,x_3,x_4)^G:=\\{f\\in\\bm{Q}(x_1,x_2,x_3,x_4):\\sigma \\cdot f=f$ for any $\\sigma\\in G\\}$ is rational (i.e.\\ purely transcendental) over $\\bm{Q}$, except for two groups which are images of faithful representations of $C_8$ and $C_3\\rtimes C_8$ into $GL_4(\\bm{Q})$ (both fixed fields for these two exceptional cases are not rational over $\\bm{Q}$). There are precisely 227 such groups in $GL_4(\\bm{Q})$ up to conjugation; the answers to the rationality problem for most of them were proved by Kitayama and Yamasaki \\cite{KY} except for four cases. We solve these four cases left unsettled by Kitayama and Yamasaki; thus the whole problem is solved completely.

  20. The prevalence of chromosomal abnormalities in subgroups of infertile men.

    Science.gov (United States)

    Dul, E C; Groen, H; van Ravenswaaij-Arts, C M A; Dijkhuizen, T; van Echten-Arends, J; Land, J A

    2012-01-01

    The prevalence of chromosomal abnormalities is assumed to be higher in infertile men and inversely correlated with sperm concentration. Although guidelines advise karyotyping infertile men, karyotyping is costly, therefore it would be of benefit to identify men with the highest risk of chromosomal abnormalities, possibly by using parameters other than sperm concentration. The aim of this study was to evaluate several clinical parameters in azoospermic and non-azoospermic men, in order to assess the prevalence of chromosomal abnormalities in different subgroups of infertile men. In a retrospective cohort of 1223 azoospermic men and men eligible for ICSI treatment, we studied sperm parameters, hormone levels and medical history for an association with chromosomal abnormalities. The prevalence of chromosomal abnormalities in the cohort was 3.1%. No association was found between chromosomal abnormalities and sperm volume, concentration, progressive motility or total motile sperm count. Azoospermia was significantly associated with the presence of a chromosomal abnormality [15.2%, odds ratio (OR) 7.70, P chromosomal abnormalities (OR 2.96, P = 0.013). Azoospermic men with a positive andrologic history had a lower prevalence of chromosomal abnormalities than azoospermic men with an uneventful history (OR 0.28, P = 0.047). In non-azoospermic men, we found that none of the studied variables were associated with the prevalence of chromosomal abnormalities. We show that the highest prevalence of chromosomal abnormalities is found in hypergonadotrophic azoospermic men with an uneventful andrologic history.

  1. Detection of patient subgroups with differential expression in omics data: a comprehensive comparison of univariate measures.

    Directory of Open Access Journals (Sweden)

    Maike Ahrens

    Full Text Available Detection of yet unknown subgroups showing differential gene or protein expression is a frequent goal in the analysis of modern molecular data. Applications range from cancer biology over developmental biology to toxicology. Often a control and an experimental group are compared, and subgroups can be characterized by differential expression for only a subgroup-specific set of genes or proteins. Finding such genes and corresponding patient subgroups can help in understanding pathological pathways, diagnosis and defining drug targets. The size of the subgroup and the type of differential expression determine the optimal strategy for subgroup identification. To date, commonly used software packages hardly provide statistical tests and methods for the detection of such subgroups. Different univariate methods for subgroup detection are characterized and compared, both on simulated and on real data. We present an advanced design for simulation studies: Data is simulated under different distributional assumptions for the expression of the subgroup, and performance results are compared against theoretical upper bounds. For each distribution, different degrees of deviation from the majority of observations are considered for the subgroup. We evaluate classical approaches as well as various new suggestions in the context of omics data, including outlier sum, PADGE, and kurtosis. We also propose the new FisherSum score. ROC curve analysis and AUC values are used to quantify the ability of the methods to distinguish between genes or proteins with and without certain subgroup patterns. In general, FisherSum for small subgroups and t-test for large subgroups achieve best results. We apply each method to a case-control study on Parkinson's disease and underline the biological benefit of the new method.

  2. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  3. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De...

  4. Searching for a hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Sanchis-Lozano Miguel-Angel

    2016-01-01

    Full Text Available A hidden sector beyond the Standard Model can show up in multiparticle production altering inclusive correlations and factorial cumulants of multiplicity distributions. In this report such a study is advocated with a special emphasis on the searches at LHC.

  5. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  6. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  7. Is the Hidden Curriculum a Relevant Issue in Educational Processes

    Directory of Open Access Journals (Sweden)

    Patarroyo Esther

    2004-08-01

    Full Text Available This paper explores some ideas about the hidden curriculum as an amount of ideas and beliefs which are implicit in an indirect way into the scholar life. Those ideas are regarding to gender equality, social status and racial difference, among others. We consider teachers are able to integrate the hidden curriculum as a pedagogical strategy in the classroom. Examples of integration include activities such as observation techniques, role-plays, peer modeling and particularly, the portfolio as a useful tool for reflection which reveals the hidden curriculum. Key words: Hidden Curriculum, Pedagogical Strategy, Portfolio, ELT Processes, Stereotypes Este documento explora algunas ideas acerca del currículo oculto como una suma de ideas y creencias que están implícitos de una forma indirecta dentro de la vida escolar. Estas ideas están relacionadas con la equidad de género, diferencias sociales y raciales, entre otros. Consideramos que es posible para los docentes integrar el currículo como estrategia pedagógica en el aula. Ejemplos de esta integración incluyen técnicas de observación, juegos de roles, modelamiento en parejas y particularmente, el portafolio como herramienta de reflexión que permita hacer evidente el currículo oculto. Palabras claves: Currículo Oculto, Estrategia Pedagógica, Estereotipos, Enseñanza de Inglés, Portafolio

  8. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.

    2015-01-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the nei...

  9. The Hidden Curriculum of Youth Policy: A Dutch Example

    NARCIS (Netherlands)

    Hopman, M.; De Winter, M.; Koops, W.

    2014-01-01

    Youth policy is more than a mere response to the actual behavior of children, but it is equally influenced by values and beliefs of policy makers. These values are however rarely made explicit and, therefore, the authors refer to them as “the hidden curriculum” of youth policy. The study investigati

  10. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel

    2016-01-01

    Most signatures of new physics in colliders have been studied so far on the transverse plane with respect to the beam direction. In this work however we study the impact of a hidden sector beyond the Standard Model (SM) on inclusive (pseudo)rapidity correlations and moments of the multiplicity distributions, with special emphasis in the LHC results.

  11. From epistemology to hidden curriculum: Critical vs. 'commercial' pedagogic perspective

    Directory of Open Access Journals (Sweden)

    Marojević Jovana C.

    2016-01-01

    Full Text Available Knowledge or, more precisely, its power is one of central themes in critical pedagogy. Since they are interested in school as the site of social critique, aimed at social transformations, critically oriented pedagogues pay special attention to the relation of knowledge and power or, to simplify it, the function of knowledge in the reproduction of the existing (often oppressive social relations. Not recognizing school as a mere site of social, economic or cultural preservation, they often study epistemology on which modern school is founded (positivistic epistemology and its hidden curriculum who function so that they legitimate social reproductive function of the school in a continuous cycle of self-justification. Since a certain understanding of knowledge and its function reveals the hidden curriculum of a certain educational philosophy, and since this consequently changes school into a site of social transformation or social transmission, viewed from the critical position this is the subject of the analysis of our paper. By final sublimation and contrasting the opposite positivistic and critical positions we conclude that the hidden curriculum of the first is the curriculum of the soliloquies while the curriculum of the second, critical tendency is entirely of a dialogue nature. It is clear that uni-directedness of the hidden curriculum formed according the postulates of positivistic epistemology can contribute only to positivistic transmission and regeneration of the existing social order, while the discursivity of critically oriented school defines the relation towards society as two-way, transformational, active and emancipatory.

  12. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  13. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...

  14. Thermoelectric generator hidden in a shirt with a fabric radiator

    Science.gov (United States)

    Leonov, Vladimir; Vullers, Ruud J. M.; Hoof, Chris Van

    2012-06-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers of a shirt and its characteristics are reported.

  15. Discriminative training of self-structuring hidden control neural models

    DEFF Research Database (Denmark)

    Sørensen, Helge Bjarup Dissing; Hartmann, Uwe; Hunnerup, Preben

    1995-01-01

    This paper presents a new training algorithm for self-structuring hidden control neural (SHC) models. The SHC models were trained non-discriminatively for speech recognition applications. Better recognition performance can generally be achieved, if discriminative training is applied instead. Thus...

  16. Old, New and Hidden Causes of Perioperative Hypersensitivity.

    Science.gov (United States)

    Garvey, Lene Heise

    2016-01-01

    Perioperative hypersensitivity reactions are rare, often life-threatening events, and subsequent investigations to identify the culprit are important to avoid re-exposure. All exposures in the perioperative setting may potentially be the cause of a hypersensitivity reaction, but drugs administered intravenously such as neuromuscular blocking agents (NMBA), induction agents and antibiotics have traditionally been reported to be implicated most commonly. It has recently become apparent that there are geographical differences in sensitization patterns related to variation in exposures, referral patterns and performance and interpretation of investigations. Differences in sensitization to NMBAs are partly explained by cross sensitization to pholcodine, an ingredient in cough-medicines available in some countries. While NMBAs are the most common causes of perioperative hypersensitivity in some countries, this may not necessarily be the case in all countries. New and hidden allergens have emerged as causes of perioperative hypersensitivity such as blue dyes, chlorhexidine and excipients. Detailed knowledge of the events at the time of reaction is necessary to identify potential culprits including rare and hidden allergens. Cooperation between allergists and anaesthetists, or other staff present perioperatively, is often needed to identify hidden or even undocumented exposures. The objectives of this review are to provide an overview of the history of investigation of perioperative hypersensitivity, to describe the differences in causes of perioperative hypersensitivity emerging over time and to increase awareness about the "hidden allergens" in the perioperative setting. Some practical advice on how to approach the patient testing negative on all initial investigations is also included.

  17. Parameter estimation of hidden periodic model in random fields

    Institute of Scientific and Technical Information of China (English)

    何书元

    1999-01-01

    Two-dimensional hidden periodic model is an important model in random fields. The model is used in the field of two-dimensional signal processing, prediction and spectral analysis. A method of estimating the parameters for the model is designed. The strong consistency of the estimators is proved.

  18. Beyond the hidden curriculum: The challenging search for authentic ...

    African Journals Online (AJOL)

    2013-11-01

    Nov 1, 2013 ... [6] It was erroneously assumed that medical students ... hidden curriculum, therefore, demands an authentic and comprehensive enquiry into the concept of human dignity, ... reasoning that underpins the desirable values-based healthcare. ... and highly interpersonal form of teaching and learning that takes.

  19. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    2014-01-01

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated S-lemma

  20. Recognizing Strokes in Tennis Videos Using Hidden Markov Models

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, W.; Zivkovic, Z.

    2001-01-01

    This paper addresses content-based video retrieval with an emphasis on recognizing events in tennis game videos. In particular, we aim at recognizing different classes of tennis strokes using automatic learning capability of Hidden Markov Models. Driven by our domain knowledge, a robust player segme

  1. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving...

  2. Evolving the Topology of Hidden Markov Models using Evolutionary Algorithms

    DEFF Research Database (Denmark)

    Thomsen, Réne

    2002-01-01

    Hidden Markov models (HMM) are widely used for speech recognition and have recently gained a lot of attention in the bioinformatics community, because of their ability to capture the information buried in biological sequences. Usually, heuristic algorithms such as Baum-Welch are used to estimate...

  3. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a techniqu

  4. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  5. Optical Test of Local Hidden-Variable Model

    Institute of Scientific and Technical Information of China (English)

    WU XiaoHua; ZONG HongShi; PANG HouRong

    2001-01-01

    An inequality is deduced from local realism and a supplementary assumption. This inequality defines an experiment that can be actually performed with the present technology to test local hidden-variable models, and it is violated by quantum mechanics with a factor 1.92, while it can be simplified into a form where just two measurements are required.``

  6. New Caledonian crows reason about hidden causal agents.

    Science.gov (United States)

    Taylor, Alex H; Miller, Rachael; Gray, Russell D

    2012-10-02

    The ability to make inferences about hidden causal mechanisms underpins scientific and religious thought. It also facilitates the understanding of social interactions and the production of sophisticated tool-using behaviors. However, although animals can reason about the outcomes of accidental interventions, only humans have been shown to make inferences about hidden causal mechanisms. Here, we show that tool-making New Caledonian crows react differently to an observable event when it is caused by a hidden causal agent. Eight crows watched two series of events in which a stick moved. In the first set of events, the crows observed a human enter a hide, a stick move, and the human then leave the hide. In the second, the stick moved without a human entering or exiting the hide. The crows inspected the hide and abandoned probing with a tool for food more often after the second, unexplained series of events. This difference shows that the crows can reason about a hidden causal agent. Comparative studies with the methodology outlined here could aid in elucidating the selective pressures that led to the evolution of this cognitive ability.

  7. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  8. Search for dark photons from supersymmetric hidden valleys

    NARCIS (Netherlands)

    Abazov, V.M.; et al., [Unknown; Ancu, L.S.; de Jong, S.J.; Filthaut, F.; Galea, C.F.; Hegeman, J.G.; Houben, P.; Meijer, M.M.; Svoisky, P.; van den Berg, P.J.; van Leeuwen, W.M.

    2009-01-01

    We search for a new light gauge boson, a dark photon, with the D0 experiment. In the model we consider, supersymmetric partners are pair produced and cascade to the lightest neutralinos that can decay into the hidden sector state plus either a photon or a dark photon. The dark photon decays through

  9. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  10. Simple yet Hidden Counterexamples in Undergraduate Real Analysis

    Science.gov (United States)

    Shipman, Barbara A.; Shipman, Patrick D.

    2013-01-01

    We study situations in introductory analysis in which students affirmed false statements as true, despite simple counterexamples that they easily recognized afterwards. The study draws attention to how simple counterexamples can become hidden in plain sight, even in an active learning atmosphere where students proposed simple (as well as more…

  11. Local clustering in scale-free networks with hidden variables

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A. J. E. M.; van Leeuwaarden, Johan S. H.; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ ∈(2 ,3 ) , so that the degrees have infinite variance. The natural cutoff hc characterizes the largest degrees in the hidden variable models, and a structural cutoff hs introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N , as a function of hs and hc. For scale-free networks with exponent 2 universality class at hand. We characterize the extremely slow decay of C when τ ≈2 and show that for τ =2.1 , say, clustering starts to vanish only for networks as large as N =109 .

  12. On local-hidden-variable no-go theorems

    Science.gov (United States)

    Methot, A. A.

    2006-06-01

    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky, and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimately doomed in 1964 with the work of Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus, we will discuss here the three principal forms of no-go theorems for local hidden variable theories of Nature. We will define Bell theorems, Bell theorems without inequalities, and pseudo-telepathy. A discussion of the similarities and differences will follow.

  13. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  14. Isovector and hidden-beauty partners of the X(3872)

    CERN Document Server

    Hogaasen, Hallstein; Richard, Jean-Marc; Sorba, Paul

    2014-01-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks (H. Hogaasen, J-M. Richard and P. Sorba, Phys. Rev. D73, 054013, 2006). The extension to the hidden-beauty sector is discussed.

  15. Bayesian online algorithms for learning in discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2008-01-01

    We propose and analyze two different Bayesian online algorithms for learning in discrete Hidden Markov Models and compare their performance with the already known Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalization we draw learning curves in simplified situations for these algorithms and compare their performances.

  16. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  17. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  18. Hidden Owners, Hidden Profits, and Poor Nursing Home Care: A Case Study.

    Science.gov (United States)

    Harrington, Charlene; Ross, Leslie; Kang, Taewoon

    2015-01-01

    The study examined the ownership transparency, financial accountability, and quality indicators of a regional for-profit nursing home chain in California, using a case study methodology to analyze data on the chain's ownership and management structure, financial data, staffing levels, deficiencies and complaints, and litigation. Secondary data were obtained from regulatory and cost reports and litigation cases. Qualitative descriptions of ownership and management were presented and quantitative analyses were conducted by comparing financial and quality indicators with other California for-profit chains, for-profit non-chains, and nonprofit nursing home groups in 2011. The chain's complex, interlocking individual and corporate owners and property companies obscured its ownership structure and financial arrangements. Nursing and support services expenditures were lower than nonprofits and administrative costs were higher than for-profit non-chains. The chain's nurse staffing was lower than expected staffing levels; its deficiencies and citations were higher than in nonprofits; and a number of lawsuits resulted in bankruptcy. Profits were hidden in the chain's management fees, lease agreements, interest payments to owners, and purchases from related-party companies. Greater ownership transparency and financial accountability requirements are needed to ensure regulatory oversight and quality of care.

  19. On p-Nilpotency of Finite Groups with Some Subgroups c-Supplemented

    Institute of Scientific and Technical Information of China (English)

    Xiuyun Guo; K.P. Shum

    2003-01-01

    A subgroup H of a group G is said to be c-supplemented in G if there exists a subgroup K of G such that G = HK and H∩K is contained in coreG(H).In this paper we prove that a group G is p-nilpotent if every maximal subgroup of P is c-supplemented in G and (|G|, p - 1) = 1, where p is a prime factor of the order of G and P is a Sylow p-subgroup of We also give a condition for a group to be p-nilpotent by using the 2-maximal subgroups of the Sylow p-subgroups.

  20. Multigene mutational profiling of cholangiocarcinomas identifies actionable molecular subgroups

    Science.gov (United States)

    Mafficini, Andrea; Wood, Laura D.; Corbo, Vincenzo; Melisi, Davide; Malleo, Giuseppe; Vicentini, Caterina; Malpeli, Giorgio; Antonello, Davide; Sperandio, Nicola; Capelli, Paola; Tomezzoli, Anna; Iacono, Calogero; Lawlor, Rita T.; Bassi, Claudio; Hruban, Ralph H.; Guglielmi, Alfredo; Tortora, Giampaolo; de Braud, Filippo; Scarpa, Aldo

    2014-01-01

    One-hundred-fifty-three biliary cancers, including 70 intrahepatic cholangiocarcinomas (ICC), 57 extrahepatic cholangiocarcinomas (ECC) and 26 gallbladder carcinomas (GBC) were assessed for mutations in 56 genes using multigene next-generation sequencing. Expression of EGFR and mTOR pathway genes was investigated by immunohistochemistry. At least one mutated gene was observed in 118/153 (77%) cancers. The genes most frequently involved were KRAS (28%), TP53 (18%), ARID1A (12%), IDH1/2 (9%), PBRM1 (9%), BAP1 (7%), and PIK3CA (7%). IDH1/2 (p=0.0005) and BAP1 (p=0.0097) mutations were characteristic of ICC, while KRAS (p=0.0019) and TP53 (p=0.0019) were more frequent in ECC and GBC. Multivariate analysis identified tumour stage and TP53 mutations as independent predictors of survival. Alterations in chromatin remodeling genes (ARID1A, BAP1, PBRM1, SMARCB1) were seen in 31% of cases. Potentially actionable mutations were seen in 104/153 (68%) cancers: i) KRAS/NRAS/BRAF mutations were found in 34% of cancers; ii) mTOR pathway activation was documented by immunohistochemistry in 51% of cases and by mutations in mTOR pathway genes in 19% of cancers; iii) TGF-ß/Smad signaling was altered in 10.5% cancers; iv) mutations in tyrosine kinase receptors were found in 9% cases. Our study identified molecular subgroups of cholangiocarcinomas that can be explored for specific drug targeting in clinical trials. PMID:24867389

  1. [Cross-species Transmission of Avian Leukosis Virus Subgroup J].

    Science.gov (United States)

    Shen, Yanwei; He, Menglian; Zhang, Ji; Zhao, Manda; Wang, Guihua; Cheng, Ziqiang

    2016-01-01

    Avian leukosis virus subgroup J (ALV-J) is an avian retrovirus that can induce myelocytomas. A high-frequency mutation in gene envelope endows ALV-J with the potential for cross-species transmission. We wished to ascertain if the ALV-J can spread across species under selection pressure in susceptible and resistant hosts. First, we inoculated (in turn) two susceptible host birds (specific pathogen-free (SPF) chickens and turkeys). Then, we inoculated three resistant hosts (pheasants, quails and ducks) to detect the viral shedding, pathologic changes, and genetic evolution of different isolates. We found that pheasants and quails were infected under the selective pressure that accumulates stepwise in different hosts, and that ducks were not infected. Infection rates for SPF chickens and turkeys were 100% (16/16), whereas those for pheasants and quails were 37.5% (6/16) and 11.1% (3/27). Infected hosts showed immune tolerance, and inflammation and tissue damage could be seen in the liver, spleen, kidneys and cardiovascular system. Non-synonymous mutation and synonymous ratio (NS/S) analyses revealed the NS/S in hypervariable region (hr) 2 of pheasants and quails was 2.5. That finding suggested that mutation of isolates in pheasants and quails was induced by selective pressure from the resistant host, and that the hr2 region is a critical domain in cross-species transmission of ALV-J. Sequencing showed that ALV-J isolates from turkeys, pheasants and quails had moved away from the original virus, and were closer to the ALV-J prototype strain HPRS-103. However, the HPRS-103 strain cannot infect pheasants and quails, so further studies are needed.

  2. X-s-Permutable Subgroups%X-s-置换子群

    Institute of Scientific and Technical Information of China (English)

    石磊; 郭文彬; 易小兰

    2008-01-01

    Let X be a nonempty subset of a group G.A subgroup H of G is said to be X-spermutable in G if,for every Sylow subgroup T of G,there exists an element x ∈X such that HTx=Tx H.In this paper,we obtain some results about the X-s-permutable subgroups and use them to determine the structure of some finite groups.

  3. Discrete Cocompact Subgroups of the Five-Dimensional Connected and Simply Connected Nilpotent Lie Groups

    Directory of Open Access Journals (Sweden)

    Amira Ghorbel

    2009-02-01

    Full Text Available The discrete cocompact subgroups of the five-dimensional connected, simply connected nilpotent Lie groups are determined up to isomorphism. Moreover, we prove if G = N × A is a connected, simply connected, nilpotent Lie group with an Abelian factor A, then every uniform subgroup of G is the direct product of a uniform subgroup of N and Z^r where r = dim A.

  4. Identification and Characterization of Unique Subgroups of Chronic Pain Individuals with Dispositional Personality Traits

    OpenAIRE

    Mehta, S; Rice, D; McIntyre, A; H. Getty; Speechley, M.; Sequeira, K.; Shapiro, A. P.; Morley-Forster, P.; Teasell, R. W.

    2016-01-01

    Objective. The current study attempted to identify and characterize distinct CP subgroups based on their level of dispositional personality traits. The secondary objective was to compare the difference among the subgroups in mood, coping, and disability. Methods. Individuals with chronic pain were assessed for demographic, psychosocial, and personality measures. A two-step cluster analysis was conducted in order to identify distinct subgroups of patients based on their level of personality tr...

  5. Developing the group mind through functional subgrouping: linking systems-centered training (SCT) and interpersonal neurobiology.

    Science.gov (United States)

    Gantt, Susan P; Agazarian, Yvonne M

    2010-10-01

    This article introduces the systems-centered concept of the "group mind" by linking systems-centered thinking and interpersonal neurobiology, building on Siegel's definition of mind as the process of regulating the flow of energy and information. Functional subgrouping, the systems-centered group method for resolving conflicts, discriminates and integrates the flow of energy and information within and between group members, subgroups, and the group-as-a-whole, thus potentiating survival, development, and transformation. This article uses the interpersonal neurobiological framework to discuss functional subgrouping as a tool for developing the group mind: considering how functional subgrouping facilitates emotional regulation, creates a secure relational context, and potentiates neural integration.

  6. Empirically Identified Subgroups of Children Served in Part C Early Intervention Programs.

    Science.gov (United States)

    Elbaum, Batya; Celimli-Aksoy, Seniz

    2017-09-01

    Early intervention (EI) programs under Part C of the Individuals with Disabilities Education Act serve a developmentally heterogeneous population of infants and toddlers with or at risk of developmental delays or disabilities. The aim of this study was to identify empirically distinct subgroups of children in EI so as to inform early prognosis and service planning. We applied mixture modeling to developmental assessment data from 1513 children who enrolled in a large, urban EI program between 2009 and 2013. The observed variables were children's EI-entry developmental quotients (DQs) in 5 domains (communication, cognitive, motor, adaptive, and personal-social) as assessed by the Battelle Developmental Inventory, Second Edition. A 4-class model showed the best fit to the data, revealing subgroups with distinct developmental profiles. Children in the first subgroup showed a severe delay in communication with less severe delays in the other domains. Children in the second subgroup likewise showed a severe delay in communication, but with comparably severe delays in the cognitive and motor domains. Profiles for the third and fourth subgroups showed the same overall patterns as those for the first and second subgroups, respectively, but to a less severe degree. Developmental trajectories differed by subgroup. Consideration of subgroups based on children's developmental assessment scores provides insight into underlying commonalities among children with different presenting diagnoses on entry into EI. The subgroups also have clinical relevance in terms of both practitioners' and parents' understanding of children's likely service needs and developmental trajectories.

  7. Engineering of Algorithms for Hidden Markov models and Tree Distances

    DEFF Research Database (Denmark)

    Sand, Andreas

    grown exponentially because of drastic improvements in the technology behind DNA and RNA sequencing, and focus on the research field has increased due to its potential to expand our knowledge about biological mechanisms and to improve public health. There has therefore been a continuously growing demand...... of the algorithms to exploit the parallel architecture of modern computers. In this PhD dissertation, I present my work with algorithmic optimizations and parallelizations in primarily two areas in algorithmic bioinformatics: algorithms for analyzing hidden Markov models and algorithms for computing distance...... measures between phylogenetic trees. Hidden Markov models is a class of probabilistic models that is used in a number of core applications in bioinformatics such as modeling of proteins, gene finding and reconstruction of species and population histories. I show how a relatively simple parallelization can...

  8. Extraction of hidden information by efficient community detection in networks

    CERN Document Server

    Lee, Juyong; Lee, Jooyoung

    2012-01-01

    Currently, we are overwhelmed by a deluge of experimental data, and network physics has the potential to become an invaluable method to increase our understanding of large interacting datasets. However, this potential is often unrealized for two reasons: uncovering the hidden community structure of a network, known as community detection, is difficult, and further, even if one has an idea of this community structure, it is not a priori obvious how to efficiently use this information. Here, to address both of these issues, we, first, identify optimal community structure of given networks in terms of modularity by utilizing a recently introduced community detection method. Second, we develop an approach to use this community information to extract hidden information from a network. When applied to a protein-protein interaction network, the proposed method outperforms current state-of-the-art methods that use only the local information of a network. The method is generally applicable to networks from many areas.

  9. Effectiveness of AODV Protocol under Hidden Node Environment

    Science.gov (United States)

    Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit

    IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.

  10. Perpetual points and hidden attractors in dynamical systems

    Energy Technology Data Exchange (ETDEWEB)

    Dudkowski, Dawid, E-mail: dawid.dudkowski@p.lodz.pl [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland); Prasad, Awadhesh [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India); Kapitaniak, Tomasz [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland)

    2015-10-23

    We discuss the use of perpetual points for tracing the hidden and the rare attractors of dynamical systems. The analysis of perpetual points and their co-existence due to the parameters values is presented and the impact of these points on the behavior of the systems is shown. The results are obtained for single as well as coupled externally excited van der Pol–Duffing oscillators. The presented results can be generalized to other systems having different dynamics. - Highlights: • Computation of perpetual points in forced nonlinear dynamical systems. • Locating the hidden and rare attractors using perpetual points. • Analysis of states and different types of synchronization in coupled systems. • Understanding the complexity in coupled and uncoupled forced van der Pol–Duffing oscillator.

  11. Penta-Quark States with Strangeness, Hidden Charm and Beauty

    Science.gov (United States)

    Wu, Jia-Jun; Zou, Bing-Song

    The classical quenched quark models with three constituent quarks provide a good description for the baryon spatial ground states, but fail to reproduce the spectrum of baryon excited states. More and more evidences suggest that unquenched effects with multi-quark dynamics are necessary ingredients to solve the problem. Several new hyperon resonances reported recently could fit in the picture of penta-quark states. Based on this picture, some new hyperon excited states were predicted to exist; meanwhile with extension from strangeness to charm and beauty, super-heavy narrow N* and Λ* resonances with hidden charm or beauty were predicted to be around 4.3 and 11 GeV, respectively. Recently, two of such N* with hidden charm might have been observed by the LHCb experiment. More of those states are expected to be observed in near future. This opens a new window in order to study hadronic dynamics for the multi-quark states.

  12. Penta-quark States with Strangeness, Hidden Charm and Beauty

    CERN Document Server

    Wu, Jia-Jun

    2015-01-01

    The classical quenched quark models with three constituent quarks provide a good description for the baryon spatial ground states, but fail to reproduce the spectrum of baryon excited states. More and more evidences suggest that unquenched effects with multi-quark dynamics are necessary ingredients to solve the problem. Several new hyperon resonances reported recently could fit in the picture of penta-quark states. Based on this picture, some new hyperon excited states were predicted to exist; meanwhile with extension from strangeness to charm and beauty, super-heavy narrow $N^*$ and $\\Lambda^*$ resonances with hidden charm or beauty were predicted to be around 4.3 and 11 GeV, respectively. Recently, two of such $N^*$ with hidden charm might have been observed by the LHCb experiment. More of those states are expected to be observed in near future. This opens a new window in order to study hadronic dynamics for the multi-quark states.

  13. Markov chain Monte Carlo simulation for Bayesian Hidden Markov Models

    Science.gov (United States)

    Chan, Lay Guat; Ibrahim, Adriana Irawati Nur Binti

    2016-10-01

    A hidden Markov model (HMM) is a mixture model which has a Markov chain with finite states as its mixing distribution. HMMs have been applied to a variety of fields, such as speech and face recognitions. The main purpose of this study is to investigate the Bayesian approach to HMMs. Using this approach, we can simulate from the parameters' posterior distribution using some Markov chain Monte Carlo (MCMC) sampling methods. HMMs seem to be useful, but there are some limitations. Therefore, by using the Mixture of Dirichlet processes Hidden Markov Model (MDPHMM) based on Yau et. al (2011), we hope to overcome these limitations. We shall conduct a simulation study using MCMC methods to investigate the performance of this model.

  14. Wikipedia mining of hidden links between political leaders

    CERN Document Server

    Frahm, Klaus M; Shepelyansky, Dima L

    2016-01-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  15. Attribute-Based Encryption with Partially Hidden Ciphertext Policies

    Science.gov (United States)

    Nishide, Takashi; Yoneyama, Kazuki; Ohta, Kazuo

    We propose attribute-based encryption schemes where encryptor-specified policies (called ciphertext policies) are hidden. By using our schemes, an encryptor can encrypt data with a hidden access control policy. A decryptor obtains her secret key associated with her attributes from a trusted authority in advance and if the attributes associated with the decryptor's secret key do not satisfy the access control policy associated with the encrypted data, the decryptor cannot decrypt the data or guess even what access control policy was specified by the encryptor. We prove security of our construction based on the Decisional Bilinear Diffie-Hellman assumption and the Decision Linear assumption. In our security notion, even the legitimate decryptor cannot obtain the information about the access control policy associated with the encrypted data more than the fact that she can decrypt the data.

  16. Inhomogeneous spatial point processes with hidden second-order stationarity

    DEFF Research Database (Denmark)

    Hahn, Ute; Jensen, Eva B. Vedel

    correlation function g(u, v) is a function of u −˘ v, where −˘ is a generalized subtraction operator. For the reweighted second-order stationary processes, the subtraction operator is simply u −˘ v = u − v. The processes in the extended class are called hidden second-order stationary because, in many cases......Modelling of inhomogeneous spatial point patterns is a challenging research area with numerous applications in diverse areas of science. In recent years, the focus has mainly been on the class of reweighted second-order stationary point processes that is characterized by the mathematically...... attractive property of a translation invariant pair correlation function. Motivated by examples where this model class is not adequate, we extend the class of reweighted second-order stationary processes. The extended class consists of hidden second-order stationary point processes for which the pair...

  17. Generation and Analysis of Hidden Optical-Polarization States

    CERN Document Server

    Singh, Ravi S

    2010-01-01

    A hybrid Optical-Device (Phase-Conjugating Mirror Michelson Interferometer), made up of Phase-conjugate mirror along with ordinary mirror and Polarization Beam-splitter, is formally designed and investigated for the generation of an unusual Optical-Polarization States. This weird yet 'essentially single-mode' optical-polarization state has non-random 'ratio of amplitudes' and non-random 'sum of phases' in orthogonal bases-modes contrary to usual 'truly single-mode' optical-polarization states of which non-random 'ratio of amplitudes' and non-random 'difference of phases' serves as optical-polarization characteristic parameters. Since it is seen not to be characterized by Stokes parameters, one may, therefore, assign the name 'Hidden Optical-Polarization States (HOPS)'. HOPS are characterized by a set of parameters, namely, Hidden Optical-Polarization parameters. Formal experimental schemes are presented to experimentally measure these parameters and, thus, offering characterization of HOPS.

  18. Hidden Wounds? Inflammatory Links Between Childhood Trauma and Psychopathology.

    Science.gov (United States)

    Danese, Andrea; Baldwin, Jessie R

    2017-01-03

    Childhood trauma is a key risk factor for psychopathology. However, little is known about how exposure to childhood trauma is translated into biological risk for psychopathology. Observational human studies and experimental animal models suggest that childhood exposure to stress can trigger an enduring systemic inflammatory response not unlike the bodily response to physical injury. In turn, these "hidden wounds" of childhood trauma can affect brain development, key behavioral domains (e.g., cognition, positive valence systems, negative valence systems), reactivity to subsequent stressors, and, ultimately, risk for psychopathology. Further research is needed to better characterize the inflammatory links between childhood trauma and psychopathology. Detecting and healing these hidden wounds may help prevent and treat psychopathology emerging after childhood trauma.

  19. A Sequence of Relaxations Constraining Hidden Variable Models

    CERN Document Server

    Steeg, Greg Ver

    2011-01-01

    Many widely studied graphical models with latent variables lead to nontrivial constraints on the distribution of the observed variables. Inspired by the Bell inequalities in quantum mechanics, we refer to any linear inequality whose violation rules out some latent variable model as a "hidden variable test" for that model. Our main contribution is to introduce a sequence of relaxations which provides progressively tighter hidden variable tests. We demonstrate applicability to mixtures of sequences of i.i.d. variables, Bell inequalities, and homophily models in social networks. For the last, we demonstrate that our method provides a test that is able to rule out latent homophily as the sole explanation for correlations on a real social network that are known to be due to influence.

  20. Wikipedia mining of hidden links between political leaders

    Science.gov (United States)

    Frahm, Klaus M.; Jaffrès-Runser, Katia; Shepelyansky, Dima L.

    2016-12-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  1. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  2. Subgrouping of bovine respiratory syncytial virus strains detected in lung tissue

    NARCIS (Netherlands)

    Schrijver, R.S.; Daus, E.; Kramps, J.A.; Langedijk, J.P.M.; Buijs, R.; Middel, W.G.J.; Taylor, G.; Furze, J.; Huyben, M.W.C.; Oirschot, van J.T.

    1996-01-01

    Bovine respiratory syncytial virus is an important respiratory pathogen in cattle. Recently, subgroups of BRSV have been identified, based on antigenic differences. However, little is known about subgroups of BRSV that circulate in the cattle population. Therefore, we determined the reactivity of

  3. On the number of classes of conjugate Hall subgroups in finite simple groups

    CERN Document Server

    Revin, D O

    2009-01-01

    In this paper we find the number of conjugate $\\pi$-Hall subgroups in all finite almost simple groups. We also complete the classification of $\\pi$-Hall subgroups in finite simple groups and correct some mistakes from our previous paper.

  4. Groups in Which 2-Generator Subgroups Are Nilpotent of Bounded Class

    Institute of Scientific and Technical Information of China (English)

    Costantino Delizia

    2001-01-01

    In this paper, we study some properties of groups in which subgroups with a fixed number of generators are nilpotent. In particular, we discuss nilpotency of torsion-free groups in which 2-generator subgroups are nilpotent of class at most 4.

  5. Finite p-groups all of whose maximal abelian subgroups are soft

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    A subgroup A of a p-group G is said to be soft in G if CG(A) = A and |NG(A)/A| = p. In this paper we determined finite p-groups all of whose maximal abelian subgroups are soft; see Theorem A and Proposition 2.4.

  6. Identification of subgroups of patients with low back pain using Latent Class Analysis

    DEFF Research Database (Denmark)

    Nielsen, Anne Mølgaard

    the questionnaires was preferred, due to the more nuanced description available within the resulting subgroups. Therefore, the single‐item strategy was used in the subsequent single‐stage and two‐stage LCA, which identified seven and nine patient subgroups, respectively, with similar face validity and adequate...

  7. Adolescent Suicidal Ideation Subgroups and Their Association with Suicidal Plans and Attempts in Young Adulthood

    Science.gov (United States)

    Rueter, Martha A.; Holm, Kristen E.; McGeorge, Christine R.; Conger, Rand D.

    2008-01-01

    Suicidal ideation during adolescence is quite common. Longitudinal ideation patterns may predict adolescents at greatest risk of progressing to more serious suicidal behaviors. We enumerated suicidal ideation trajectory subgroups and estimated subgroup association with later suicidal plans and attempts using data collected across a 13-year period…

  8. Affiliative Subgroups in Preschool Classrooms: Integrating Constructs and Methods from Social Ethology and Sociometric Traditions.

    Directory of Open Access Journals (Sweden)

    António J Santos

    Full Text Available Recent studies of school-age children and adolescents have used social network analyses to characterize selection and socialization aspects of peer groups. Fewer network studies have been reported for preschool classrooms and many of those have focused on structural descriptions of peer networks, and/or, on selection processes rather than on social functions of subgroup membership. In this study we started by identifying and describing different types of affiliative subgroups (HMP- high mutual proximity, LMP- low mutual proximity, and ungrouped children in a sample of 240 Portuguese preschool children using nearest neighbor observations. Next, we used additional behavioral observations and sociometric data to show that HMP and LMP subgroups are functionally distinct: HMP subgroups appear to reflect friendship relations, whereas LMP subgroups appear to reflect common social goals, but without strong, within-subgroup dyadic ties. Finally, we examined the longitudinal implications of subgroup membership and show that children classified as HMP in consecutive years had more reciprocated friendships than did children whose subgroup classification changed from LMP or ungrouped to HMP. These results extend previous findings reported for North American peer groups.

  9. A short proof of the Khukhro-Makarenko theorem on large characteristic subgroups with laws

    Science.gov (United States)

    Klyachko, Anton A.; Mel'nikova, Yuliya B.

    2009-06-01

    We give a short proof and a somewhat stronger version of the Khukhro-Makarenko theorem that each group which virtually satisfies an outer commutator identity contains a finite-index characteristic subgroup satisfying this identity. An estimate for the index of this characteristic subgroup is obtained. Bibliography: 3 titles.

  10. Subgroups of ideal class groups of real quadratic algebraic function fields

    Institute of Scientific and Technical Information of China (English)

    WANG; Kunpeng(王鲲鹏); ZHANG; Xianke(张贤科)

    2003-01-01

    Necessary and sufficient condition on real quadratic algebraic function fields K is given for theirideal class groups H(K) to contain cyclic subgroups of order n. And eight series of such real quadratic functionfields K are obtained whose ideal class groups contain cyclic subgroups of order n. In particular, the ideal classnumbers of these function fields are divisible by n.

  11. Malnormal subgroups of lattices and the Pukanszky invariant in group factors

    CERN Document Server

    Robertson, Guyan

    2009-01-01

    Let $G$ be a connected semisimple real algebraic group. Assume that $G(\\bb R)$ has no compact factors and let $\\Gamma$ be a torsion-free uniform lattice subgroup of $G(\\bb R)$. Then $\\Gamma$ contains a malnormal abelian subgroup $A$. This implies that the $\\tto$ factor $\\vn(\\Gamma)$ contains a masa $\\fk A$ with Puk\\'anszky invariant $\\{\\infty\\}$.

  12. Measuring English Language Workplace Proficiency across Subgroups: Using CFA Models to Validate Test Score Interpretation

    Science.gov (United States)

    Yoo, Hanwook; Manna, Venessa F.

    2017-01-01

    This study assessed the factor structure of the Test of English for International Communication (TOEIC®) Listening and Reading test, and its invariance across subgroups of test-takers. The subgroups were defined by (a) gender, (b) age, (c) employment status, (d) time spent studying English, and (e) having lived in a country where English is the…

  13. Nilpotency and Theory of L-Subgroups of an L-Group

    Directory of Open Access Journals (Sweden)

    Naseem Ajmal

    2014-03-01

    Full Text Available In this paper, the notion of commutator is modified and extended to L-setting. Also, the notion of descending central series is introduced which is used to formulate the important notion of nilpotent L-subgroup of an L-group. Moreover, the level subset characterization for the notion of nilpotent L-subgroup is provided.

  14. Life of Pizza Pie: The Implications of Sub-Group Comparisons in Education

    Science.gov (United States)

    Thomas, Tara N.

    2013-01-01

    Current educational statistics have pitted subgroups against one another without consideration of the actual population sizes of each group. This paper is intended to provided a clearer understanding of the current usage of sub-group comparisons in American education. (Contains 4 figures.)

  15. Measuring English Language Workplace Proficiency across Subgroups: Using CFA Models to Validate Test Score Interpretation

    Science.gov (United States)

    Yoo, Hanwook; Manna, Venessa F.

    2017-01-01

    This study assessed the factor structure of the Test of English for International Communication (TOEIC®) Listening and Reading test, and its invariance across subgroups of test-takers. The subgroups were defined by (a) gender, (b) age, (c) employment status, (d) time spent studying English, and (e) having lived in a country where English is the…

  16. Perpetual points and hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Prasad, Awadhesh; Kapitaniak, Tomasz

    2015-10-01

    We discuss the use of perpetual points for tracing the hidden and the rare attractors of dynamical systems. The analysis of perpetual points and their co-existence due to the parameters values is presented and the impact of these points on the behavior of the systems is shown. The results are obtained for single as well as coupled externally excited van der Pol-Duffing oscillators. The presented results can be generalized to other systems having different dynamics.

  17. Uncovering Hidden Mathematics of the Multiplication Table Using Spreadsheets

    Directory of Open Access Journals (Sweden)

    Sergei Abramovich

    2007-05-01

    Full Text Available This paper reveals a number of learning activities emerging from a spreadsheetgenerated multiplication table. These activities are made possible by using such features of the software as conditional formatting, circular referencing, calculation through iteration, scroll bars, and graphing. The paper is a reflection on a mathematics content course designed for prospective elementary teachers using the hidden mathematics curriculum framework. It is written in support of standards for teaching and recommendations for teachers in North America.

  18. Blind Extraction and Security Analysis of Spread Spectrum Hidden Watermarks

    Science.gov (United States)

    2012-04-01

    DATES COVERED (From - To) JAN 2009 – DEC 2010 4. TITLE AND SUBTITLE BLIND EXTRACTION AND SECURITY ANALYSIS OF SPREAD SPECTRUM HIDDEN WATERMARKS ...Multi Signature Embedding, Watermarking , DSSS. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 15 19a... watermarks John A. Marsh*a,b, and Gerard F. Wohlrabc aSUNY Institute of Technology, 100 Seymour Dr., Utica, NY 13502; bAssured Information

  19. Hidden Markov Model Based Automated Fault Localization for Integration Testing

    OpenAIRE

    Ge, Ning; NAKAJIMA, SHIN; Pantel, Marc

    2013-01-01

    International audience; Integration testing is an expensive activity in software testing, especially for fault localization in complex systems. Model-based diagnosis (MBD) provides various benefits in terms of scalability and robustness. In this work, we propose a novel MBD approach for the automated fault localization in integration testing. Our method is based on Hidden Markov Model (HMM) which is an abstraction of system's component to simulate component's behaviour. The core of this metho...

  20. Information- Theoretic Analysis for the Difficulty of Extracting Hidden Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wei-ming; LI Shi-qu; CAO Jia; LIU Jiu-fen

    2005-01-01

    The difficulty of extracting hidden information,which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the theoretic conclusion is used to analyze the actual extracting attack on Least Significant Bit(LSB) steganographic algorithms.