WorldWideScience

Sample records for hidden subgroup problem

  1. Quantum algorithms for the hidden subgroup problem on some semi-direct product groups by reduction to Abelian cases

    International Nuclear Information System (INIS)

    Chi, Dong Pyo; Kim, Jeong San; Lee, Soojoon

    2006-01-01

    We consider the hidden subgroup problem on the semi-direct product of cyclic groups Z N -bar Z p , where p is a prime that does not divide p j -1 for any of the prime factors p j of N, and show that the hidden subgroup problem can be reduced to other ones for which solutions are already known

  2. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated

  3. Generalization of some hidden subgroup algorithms for input sets of arbitrary size

    Science.gov (United States)

    Poslu, Damla; Say, A. C. Cem

    2006-05-01

    We consider the problem of generalizing some quantum algorithms so that they will work on input domains whose cardinalities are not necessarily powers of two. When analyzing the algorithms we assume that generating superpositions of arbitrary subsets of basis states whose cardinalities are not necessarily powers of two perfectly is possible. We have taken Ballhysa's model as a template and have extended it to Chi, Kim and Lee's generalizations of the Deutsch-Jozsa algorithm and to Simon's algorithm. With perfectly equal superpositions of input sets of arbitrary size, Chi, Kim and Lee's generalized Deutsch-Jozsa algorithms, both for evenly-distributed and evenly-balanced functions, worked with one-sided error property. For Simon's algorithm the success probability of the generalized algorithm is the same as that of the original for input sets of arbitrary cardinalities with equiprobable superpositions, since the property that the measured strings are all those which have dot product zero with the string we search, for the case where the function is 2-to-1, is not lost.

  4. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing...... the probability of generating a given string, or computing the most likely path generating a given string. In this paper we consider the problem of computing the most likely string, or consensus string, generated by a given model, and its implications on the complexity of comparing hidden Markov models. We show...... that computing the consensus string, and approximating its probability within any constant factor, is NP-hard, and that the same holds for the closely related labeling problem for class hidden Markov models. Furthermore, we establish the NP-hardness of comparing two hidden Markov models under the L∞- and L1...

  5. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing......-norms. We discuss the applicability of the technique used for proving the hardness of comparing two hidden Markov models under the L1-norm to other measures of distance between probability distributions. In particular, we show that it cannot be used for proving NP-hardness of determining the Kullback...

  6. Measurement problem and local hidden variables with entangled photons

    Directory of Open Access Journals (Sweden)

    Muchowski Eugen

    2017-12-01

    Full Text Available It is shown that there is no remote action with polarization measurements of photons in singlet state. A model is presented introducing a hidden parameter which determines the polarizer output. This model is able to explain the polarization measurement results with entangled photons. It is not ruled out by Bell’s Theorem.

  7. Hidden solution to the μ/Bμ problem in gauge mediation

    International Nuclear Information System (INIS)

    Roy, Tuhin S.; Schmaltz, Martin

    2008-01-01

    We propose a solution to the μ/B μ problem in gauge mediation. The novel feature of our solution is that it uses dynamics of the hidden sector, which is often present in models with dynamical supersymmetry breaking. We give an explicit example model of gauge mediation where a very simple messenger sector generates both μ and B μ at one loop. The usual problem, that B μ is then too large, is solved by strong renormalization effects from the hidden sector which suppress B μ relative to μ. Our mechanism relies on an assumption about the signs of certain incalculable anomalous dimensions in the hidden sector. Making these assumptions not only allows us to solve the μ/B μ problem but also leads to a characteristic superpartner spectrum which would be a smoking gun signal for our mechanism.

  8. Hybrid subgroup decomposition method for solving fine-group eigenvalue transport problems

    International Nuclear Information System (INIS)

    Yasseri, Saam; Rahnema, Farzad

    2014-01-01

    Highlights: • An acceleration technique for solving fine-group eigenvalue transport problems. • Coarse-group quasi transport theory to solve coarse-group eigenvalue transport problems. • Consistent and inconsistent formulations for coarse-group quasi transport theory. • Computational efficiency amplified by a factor of 2 using hybrid SGD for 1D BWR problem. - Abstract: In this paper, a new hybrid method for solving fine-group eigenvalue transport problems is developed. This method extends the subgroup decomposition method to efficiently couple a new coarse-group quasi transport theory with a set of fixed-source transport decomposition sweeps to obtain the fine-group transport solution. The advantages of the quasi transport theory are its high accuracy, straight-forward implementation and numerical stability. The hybrid method is analyzed for a 1D benchmark problem characteristic of boiling water reactors (BWR). It is shown that the method reproduces the fine-group transport solution with high accuracy while increasing the computational efficiency up to 12 times compared to direct fine-group transport calculations

  9. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  10. Basic problems solving for two-dimensional discrete 3 × 4 order hidden markov model

    International Nuclear Information System (INIS)

    Wang, Guo-gang; Gan, Zong-liang; Tang, Gui-jin; Cui, Zi-guan; Zhu, Xiu-chang

    2016-01-01

    A novel model is proposed to overcome the shortages of the classical hypothesis of the two-dimensional discrete hidden Markov model. In the proposed model, the state transition probability depends on not only immediate horizontal and vertical states but also on immediate diagonal state, and the observation symbol probability depends on not only current state but also on immediate horizontal, vertical and diagonal states. This paper defines the structure of the model, and studies the three basic problems of the model, including probability calculation, path backtracking and parameters estimation. By exploiting the idea that the sequences of states on rows or columns of the model can be seen as states of a one-dimensional discrete 1 × 2 order hidden Markov model, several algorithms solving the three questions are theoretically derived. Simulation results further demonstrate the performance of the algorithms. Compared with the two-dimensional discrete hidden Markov model, there are more statistical characteristics in the structure of the proposed model, therefore the proposed model theoretically can more accurately describe some practical problems.

  11. Solution to the hierarchy problem from an almost decoupled hidden sector within a classically scale invariant theory

    International Nuclear Information System (INIS)

    Foot, Robert; Kobakhidze, Archil; Volkas, Raymond R.; McDonald, Kristian L.

    2008-01-01

    If scale invariance is a classical symmetry then both the Planck scale and the weak scale should emerge as quantum effects. We show that this can be realized in simple scale invariant theories with a hidden sector. The weak/Planck scale hierarchy emerges in the (technically natural) limit in which the hidden sector decouples from the ordinary sector. In this limit, finite corrections to the weak scale are consequently small, while quadratic divergences are absent by virtue of classical scale invariance, so there is no hierarchy problem

  12. Limits of performance for the model reduction problem of hidden Markov models

    KAUST Repository

    Kotsalis, Georgios

    2015-12-15

    We introduce system theoretic notions of a Hankel operator, and Hankel norm for hidden Markov models. We show how the related Hankel singular values provide lower bounds on the norm of the difference between a hidden Markov model of order n and any lower order approximant of order n̂ < n.

  13. Limits of performance for the model reduction problem of hidden Markov models

    KAUST Repository

    Kotsalis, Georgios; Shamma, Jeff S.

    2015-01-01

    We introduce system theoretic notions of a Hankel operator, and Hankel norm for hidden Markov models. We show how the related Hankel singular values provide lower bounds on the norm of the difference between a hidden Markov model of order n and any lower order approximant of order n̂ < n.

  14. Basic problems and solution methods for two-dimensional continuous 3 × 3 order hidden Markov model

    International Nuclear Information System (INIS)

    Wang, Guo-gang; Tang, Gui-jin; Gan, Zong-liang; Cui, Zi-guan; Zhu, Xiu-chang

    2016-01-01

    A novel model referred to as two-dimensional continuous 3 × 3 order hidden Markov model is put forward to avoid the disadvantages of the classical hypothesis of two-dimensional continuous hidden Markov model. This paper presents three equivalent definitions of the model, in which the state transition probability relies on not only immediate horizontal and vertical states but also immediate diagonal state, and in which the probability density of the observation relies on not only current state but also immediate horizontal and vertical states. The paper focuses on the three basic problems of the model, namely probability density calculation, parameters estimation and path backtracking. Some algorithms solving the questions are theoretically derived, by exploiting the idea that the sequences of states on rows or columns of the model can be viewed as states of a one-dimensional continuous 1 × 2 order hidden Markov model. Simulation results further demonstrate the performance of the algorithms. Because there are more statistical characteristics in the structure of the proposed new model, it can more accurately describe some practical problems, as compared to two-dimensional continuous hidden Markov model.

  15. The congruence subgroup problem

    Indian Academy of Sciences (India)

    2016-08-26

    Aug 26, 2016 ... School of Mathematics, Tata Institute of Fundamental Research, Homi Bhabha Road, Colaba, Mumbai 400 005, India ... of Indian Academy of Sciences, including those of the staff, the journals, various programmes, and Current Science, has changed from 'ias.ernet.in' (or 'academy.ias.ernet.in') to 'ias.ac.in'.

  16. Subgroup complexes

    CERN Document Server

    Smith, Stephen D

    2011-01-01

    This book is intended as an overview of a research area that combines geometries for groups (such as Tits buildings and generalizations), topological aspects of simplicial complexes from p-subgroups of a group (in the spirit of Brown, Quillen, and Webb), and combinatorics of partially ordered sets. The material is intended to serve as an advanced graduate-level text and partly as a general reference on the research area. The treatment offers optional tracks for the reader interested in buildings, geometries for sporadic simple groups, and G-equivariant equivalences and homology for subgroup complexes.

  17. POVMs and hidden variables

    International Nuclear Information System (INIS)

    Stairs, Allen

    2007-01-01

    Recent results by Paul Busch and Adan Cabello claim to show that by appealing to POVMs, non-contextual hidden variables can be ruled out in two dimensions. While the results of Busch and Cabello are mathematically correct, interpretive problems render them problematic as no hidden variable proofs

  18. Problems with Contingency Theory: Testing Assumptions Hidden within the Language of Contingency "Theory".

    Science.gov (United States)

    Schoonhoven, Clausia Bird

    1981-01-01

    Discusses problems in contingency theory, which relates organizational structure to the tasks performed and the information needed. Analysis of data from 17 hospitals suggests that traditional contingency theory underrepresents the complexity of relations among technological uncertainty, structure, and organizational effectiveness. (Author/RW)

  19. Depression in late life: a hidden public health problem for Mexico?

    OpenAIRE

    Wagner Fernando A.; Gallo Joseph J.; Delva Jorge

    1999-01-01

    Depression is one of the most important causes of disability in the world, causes considerable suffering, and problems associated with depression are extremely costly to society. Depression is one of the most common and debilitating illnesses of older people that is frequently overlooked. The most recent epidemiological study in Mexico estimated the lifetime prevalence of major depressive episodes among people 18 to 54 years old to be 7.8%, only second to alcohol dependence (8.2%). A previous...

  20. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  1. [Depression among adolescents. A hidden problem for public health and clinical practice].

    Science.gov (United States)

    González-Forteza, Catalina; Torre, Alicia Edith Hermosillo de la; Vacio-Muro, María de Los Ángeles; Peralta, Robert; Wagner, Fernando A

    Depression is an important public health problem that requires more and better attention. In the present work we review epidemiologic studies of depression among adolescents in Mexico and discuss strategies that may help in earlier identification and referral of potential cases for timely care. In summary, depressive symptoms are prevalent among adolescents and adults in Mexico as in many other countries, with a higher ratio of female cases. Young people experiencing the most challenging socio-urban situations have higher rates of depression. Even though depressive disorders are more prevalent among females, consequences may be even worse for males. The authors posit that, among males, stigma attached to depression might lead to attempts to hide depressive symptoms by masking them through high-risk behaviors (e.g., alcohol, drug use, and violence, among others). Women may have higher rates of suicide attempts, but the case-fatality rate of suicide attempts is higher among males. Despite of barriers and resource scarcity among healthcare and educational institutions, it is necessary to continue to develop alternatives that will lead to better attention of mental health issues among the youth, even when their mental health needs are not expressed directly or their chief complaints are in regard to "other" health issues. Copyright © 2015. Publicado por Masson Doyma México S.A.

  2. Hidden Liquidity

    OpenAIRE

    Cebiroglu, Gökhan; Horst, Ulrich

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, hi...

  3. Distinguishing Hidden Markov Chains

    OpenAIRE

    Kiefer, Stefan; Sistla, A. Prasad

    2015-01-01

    Hidden Markov Chains (HMCs) are commonly used mathematical models of probabilistic systems. They are employed in various fields such as speech recognition, signal processing, and biological sequence analysis. We consider the problem of distinguishing two given HMCs based on an observation sequence that one of the HMCs generates. More precisely, given two HMCs and an observation sequence, a distinguishing algorithm is expected to identify the HMC that generates the observation sequence. Two HM...

  4. Hidden neuronal correlations in cultured networks

    International Nuclear Information System (INIS)

    Segev, Ronen; Baruchi, Itay; Hulata, Eyal; Ben-Jacob, Eshel

    2004-01-01

    Utilization of a clustering algorithm on neuronal spatiotemporal correlation matrices recorded during a spontaneous activity of in vitro networks revealed the existence of hidden correlations: the sequence of synchronized bursting events (SBEs) is composed of statistically distinguishable subgroups each with its own distinct pattern of interneuron spatiotemporal correlations. These findings hint that each of the SBE subgroups can serve as a template for coding, storage, and retrieval of a specific information

  5. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main......PRIMARY OBJECTIVE: The purpose of this study was to listen to and learn from children showing high levels of post-traumatic stress symptoms after parental acquired brain injury (ABI), in order to achieve an in-depth understanding of the difficulties the children face in their everyday lives...... finding indicates that the children experienced numerous losses, many of which were often suppressed or neglected by the children to protect the ill parents. CONCLUSIONS: The findings indicated that the children seemed to make a special effort to hide their feelings of loss and grief in order to protect...

  6. Finite groups all of whose minimal subgroups are NE∗ -subgroups

    Indian Academy of Sciences (India)

    subgroup of G if there exists a subnormal subgroup T of G such that G = HT and H ∩ T is a. NE-subgroup of G. In this article, we investigate the structure of G under the assump- tion that subgroups of prime order are NE∗-subgroups of G. The finite ...

  7. Stable human T-cell lymphotropic virus type 1 (HTLV-1) subtype a/subgroup a endemicity in Amerindians from Northwest Argentina: a health problem to be resolved.

    Science.gov (United States)

    Eirin, Maria E; Berini, Carolina A; Jones, Leandro R; Dilernia, Dario A; Puca, Alberto A; Biglione, Mirna M

    2010-12-01

    Jujuy province, in Northwest Argentina, is known to be endemic for HTLV-1 infection. Moreover, foci of HTLV-1 associated pathologies have also been described in this region. To gain an insight into the current situation of HTLV-1/2 in this endemic area, a seroprevalence and phylogenetic study was performed among a Kolla community from Abra Pampa city and surroundings. Out of 112 individuals, 11 (9.8%) were confirmed as HTLV-1 positive and no HTLV-2 infection was detected. The phylogenetic analysis of the LTR region showed that all the HTLV-1 sequences belonged to the Cosmopolitan subtype a/transcontinental subgroup A, and were closely related to reference sequences from Peru, Argentina, and the South of Brazil (P = 0.82). Considering the cultural and historical features of this community and in spite of the mandatory detection of anti-HTLV-1/2 antibodies in blood banks since 2005, it would be important to implement new public health measures focused on decreasing HTLV-1 transmission in this endemic area.

  8. Molecular subgroups of medulloblastoma

    OpenAIRE

    Northcott, Paul A; Dubuc, Adrian M; Pfister, Stefan; Taylor, Michael D

    2012-01-01

    Recent efforts at stratifying medulloblastomas based on their molecular features have revolutionized our understanding of this morbidity. Collective efforts by multiple independent groups have subdivided medulloblastoma from a single disease into four distinct molecular subgroups characterized by disparate transcriptional signatures, mutational spectra, copy number profiles and, most importantly, clinical features. We present a summary of recent studies that have contributed to our understand...

  9. Sociology of Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Alireza Moradi

    2017-06-01

    Full Text Available This paper reviews the concept of hidden curriculum in the sociological theories and wants to explain sociological aspects of formation of hidden curriculum. The main question concentrates on the theoretical approaches in which hidden curriculum is explained sociologically.For this purpose it was applied qualitative research methodology. The relevant data include various sociological concepts and theories of hidden curriculum collected by the documentary method. The study showed a set of rules, procedures, relationships and social structure of education have decisive role in the formation of hidden curriculum. A hidden curriculum reinforces by existed inequalities among learners (based on their social classes or statues. There is, in fact, a balance between the learner's "knowledge receptions" with their "inequality proportion".The hidden curriculum studies from different major sociological theories such as Functionalism, Marxism and critical theory, Symbolic internationalism and Feminism. According to the functionalist perspective a hidden curriculum has a social function because it transmits social values. Marxists and critical thinkers correlate between hidden curriculum and the totality of social structure. They depicts that curriculum prepares learners for the exploitation in the work markets. Symbolic internationalism rejects absolute hegemony of hidden curriculum on education and looks to the socialization as a result of interaction between learner and instructor. Feminism theory also considers hidden curriculum as a vehicle which legitimates gender stereotypes.

  10. Model-based Recursive Partitioning for Subgroup Analyses

    OpenAIRE

    Seibold, Heidi; Zeileis, Achim; Hothorn, Torsten

    2016-01-01

    The identification of patient subgroups with differential treatment effects is the first step towards individualised treatments. A current draft guideline by the EMA discusses potentials and problems in subgroup analyses and formulated challenges to the development of appropriate statistical procedures for the data-driven identification of patient subgroups. We introduce model-based recursive partitioning as a procedure for the automated detection of patient subgroups that are identifiable by...

  11. Hidden charm molecules in a finite volume

    International Nuclear Information System (INIS)

    Albaladejo, M.; Hidalgo-Duque, C.; Nieves, J.; Oset, E.

    2014-01-01

    In the present paper we address the interaction of charmed mesons in hidden charm channels in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and several methods for the analysis of these levels ("inverse problem") are investigated. (author)

  12. Generalized Sum of Fuzzy Subgroup and α-cut Subgroup

    OpenAIRE

    Daher Waly Freh Al-Rekabi; Alia Shany Hassan

    2012-01-01

    p>In this paper we study some results of the generalized sum of a fuzzynbsp;subgroup and alpha;-cut subgroup, we define a alpha;-cut subset and alpha;-cut subgroup, and then. We study some of their properties./p>

  13. Subgrouping Automata: automatic sequence subgrouping using phylogenetic tree-based optimum subgrouping algorithm.

    Science.gov (United States)

    Seo, Joo-Hyun; Park, Jihyang; Kim, Eun-Mi; Kim, Juhan; Joo, Keehyoung; Lee, Jooyoung; Kim, Byung-Gee

    2014-02-01

    Sequence subgrouping for a given sequence set can enable various informative tasks such as the functional discrimination of sequence subsets and the functional inference of unknown sequences. Because an identity threshold for sequence subgrouping may vary according to the given sequence set, it is highly desirable to construct a robust subgrouping algorithm which automatically identifies an optimal identity threshold and generates subgroups for a given sequence set. To meet this end, an automatic sequence subgrouping method, named 'Subgrouping Automata' was constructed. Firstly, tree analysis module analyzes the structure of tree and calculates the all possible subgroups in each node. Sequence similarity analysis module calculates average sequence similarity for all subgroups in each node. Representative sequence generation module finds a representative sequence using profile analysis and self-scoring for each subgroup. For all nodes, average sequence similarities are calculated and 'Subgrouping Automata' searches a node showing statistically maximum sequence similarity increase using Student's t-value. A node showing the maximum t-value, which gives the most significant differences in average sequence similarity between two adjacent nodes, is determined as an optimum subgrouping node in the phylogenetic tree. Further analysis showed that the optimum subgrouping node from SA prevents under-subgrouping and over-subgrouping. Copyright © 2013. Published by Elsevier Ltd.

  14. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  15. Hidden gauge symmetry

    International Nuclear Information System (INIS)

    O'Raifeartaigh, L.

    1979-01-01

    This review describes the principles of hidden gauge symmetry and of its application to the fundamental interactions. The emphasis is on the structure of the theory rather than on the technical details and, in order to emphasise the structure, gauge symmetry and hidden symmetry are first treated as independent phenomena before being combined into a single (hidden gauge symmetric) theory. The main application of the theory is to the weak and electromagnetic interactions of the elementary particles, and although models are used for comparison with experiment and for illustration, emphasis is placed on those features of the application which are model-independent. (author)

  16. The hidden universe

    International Nuclear Information System (INIS)

    Disney, M.

    1985-01-01

    Astronomer Disney has followed a somewhat different tack than that of most popular books on cosmology by concentrating on the notion of hidden (as in not directly observable by its own radiation) matter in the universe

  17. Locating Hidden Servers

    National Research Council Canada - National Science Library

    Oeverlier, Lasse; Syverson, Paul F

    2006-01-01

    .... Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship...

  18. Hidden charged dark matter

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kaplinghat, Manoj; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    Can dark matter be stabilized by charge conservation, just as the electron is in the standard model? We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact (\\rm U)(1) gauge symmetry of the hidden sector. Such candidates are predicted in WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many novel properties not shared by neutral dark matter: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may reduce its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ∼ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially impacting properties of the Bullet Cluster and the observed morphology of galactic halos. We analyze all of these effects in a WIMPless model in which the hidden sector is a simplified version of the minimal supersymmetric standard model and the dark matter is a hidden sector stau. We find that charged hidden dark matter is viable and consistent with the correct relic density for reasonable model parameters and dark matter masses in the range 1 GeV ∼ X ∼< 10 TeV. At the same time, in the preferred range of parameters, this model predicts cores in the dark matter halos of small galaxies and other halo properties that may be within the reach of future observations. These models therefore provide a viable and well-motivated framework for collisional dark matter with Sommerfeld enhancement, with novel implications for astrophysics and dark matter searches

  19. Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.

    Science.gov (United States)

    Krokoff, Lowell J.

    1990-01-01

    Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)

  20. Finite subgroups of SU(3)

    International Nuclear Information System (INIS)

    Bovier, A.; Lueling, M.; Wyler, D.

    1980-12-01

    We present a new class of finite subgroups of SU(3) of the form Zsub(m) s zsub(n) (semidirect product). We also apply the methods used to investigate semidirect products to the known SU(3) subgroups Δ(3n 2 ) and Δ(6n 2 ) and give analytic formulae for representations (characters) and Clebsch-Gordan coefficients. (orig.)

  1. Hidden ion population: Revisited

    International Nuclear Information System (INIS)

    Olsen, R.C.; Chappell, C.R.; Gallagher, D.L.; Green, J.L.; Gurnett, D.A.

    1985-01-01

    Satellite potentials in the outer plasmasphere range from near zero to +5 to +10 V. Under such conditions ion measurements may not include the low energy core of the plasma population. In eclipse, the photoelectron current drops to zero, and the spacecraft potential can drop to near zero volts. In regions where the ambient plasma density is below 100 cm -3 , previously unobserved portions of the ambient plasma distribution function can become visible in eclipse. A survey of the data obtained from the retarding ion mass spectrometer (RIMS) on Dynamics Explorer 1 shows that the RIMS detector generally measured the isotropic background in both sunlight and eclipse in the plasma-sphere. Absolute density measurements for the ''hidden'' ion population are obtained for the first time using the plasma wave instrument observations of the upper hybrid resonance. Agreement in total density is found in sunlight and eclipse measurements at densities above 80 cm -3 . In eclipse, agreement is found at densities as low as 20 cm -3 . The isotropic plasma composition is primarily H + , with approx.10% He + , and 0.1 to 1.0% O + . A low energy field-aligned ion population appears in eclipse measurements outside the plasmasphere, which is obscured in sunlight. These field-aligned ions can be interpreted as field-aligned flows with densities of a few particles per cubic centimeter, flowing at 5-20 km/s. The problem in measuring these field-aligned flows in sunlight is the masking of the high energy tail of the field-aligned distribution by the isotropic background. Effective measurement of the core of the magnetospheric plasma distribution awaits satellites with active means of controlling the satellite potential

  2. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  3. Search for Hidden Particles

    CERN Multimedia

    Solovev, V

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  4. The origin of the hidden supersymmetry

    International Nuclear Information System (INIS)

    Jakubsky, Vit; Nieto, Luis-Miguel; Plyushchay, Mikhail S.

    2010-01-01

    The hidden supersymmetry and related tri-supersymmetric structure of the free particle system, the Dirac delta potential problem and the Aharonov-Bohm effect (planar, bound state, and tubule models) are explained by a special nonlocal unitary transformation, which for the usual N=2 supercharges has a nature of Foldy-Wouthuysen transformation. We show that in general case, the bosonized supersymmetry of nonlocal, parity even systems emerges in the same construction, and explain the origin of the unusual N=2 supersymmetry of electron in three-dimensional parity even magnetic field. The observation extends to include the hidden superconformal symmetry.

  5. Context Analysis of Customer Requests using a Hybrid Adaptive Neuro Fuzzy Inference System and Hidden Markov Models in the Natural Language Call Routing Problem

    Science.gov (United States)

    Rustamov, Samir; Mustafayev, Elshan; Clements, Mark A.

    2018-04-01

    The context analysis of customer requests in a natural language call routing problem is investigated in the paper. One of the most significant problems in natural language call routing is a comprehension of client request. With the aim of finding a solution to this issue, the Hybrid HMM and ANFIS models become a subject to an examination. Combining different types of models (ANFIS and HMM) can prevent misunderstanding by the system for identification of user intention in dialogue system. Based on these models, the hybrid system may be employed in various language and call routing domains due to nonusage of lexical or syntactic analysis in classification process.

  6. Context Analysis of Customer Requests using a Hybrid Adaptive Neuro Fuzzy Inference System and Hidden Markov Models in the Natural Language Call Routing Problem

    Directory of Open Access Journals (Sweden)

    Rustamov Samir

    2018-04-01

    Full Text Available The context analysis of customer requests in a natural language call routing problem is investigated in the paper. One of the most significant problems in natural language call routing is a comprehension of client request. With the aim of finding a solution to this issue, the Hybrid HMM and ANFIS models become a subject to an examination. Combining different types of models (ANFIS and HMM can prevent misunderstanding by the system for identification of user intention in dialogue system. Based on these models, the hybrid system may be employed in various language and call routing domains due to nonusage of lexical or syntactic analysis in classification process.

  7. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report...

  8. Elder Abuse: The Hidden Problem. A Briefing by the Select Committee on Aging, House of Representatives, Ninety-Sixth Congress, First Session (Boston, Massachusetts, June 23, 1979).

    Science.gov (United States)

    Congress of the U.S., Washington, DC. House Select Committee on Aging.

    This briefing by the Congressional Select Committee on Aging was designed to gather information on the physical and psychological abuse of the elderly. A number of witness reports are included, testifying to the seriousness and extent of the problem of elder abuse. It is pointed out that many victims refuse to admit abuse; public discussions of…

  9. Hidden costs of nuclear power

    International Nuclear Information System (INIS)

    England, R.W.

    1979-01-01

    Mr. England contends that these hidden costs add up to a figure much higher than those that appear in the electric utilities' profit and loss account - costs that are borne by Federal taxpayers, by nuclear industry workers, and by all those people who must share their environment with nuclear facilities. Costs he details are additional deaths and illnesses resulting from exposure to radiation, and the use of tax dollars to clean up the lethal garbage produced by those activities. He asserts that careless handling of uranium ore and mill tailings in past years has apparently resulted in serious public health problems in those mining communities. In another example, Mr. England states that the failure to isolate uranium tailings physically from their environment has probably contributed to an acute leukemia rate in Mesa County, Colorado. He mentions much of the technology development for power reactors being done by the Federal government, not by private reactor manufacturers - thus, again, hidden costs that do not show up in electric bills of customers. The back end of the nuclear fuel cycle as a place for Federally subsidized research and development is discussed briefly. 1 figure, 2 tables

  10. Cytogenetic prognostication within medulloblastoma subgroups.

    Science.gov (United States)

    Shih, David J H; Northcott, Paul A; Remke, Marc; Korshunov, Andrey; Ramaswamy, Vijay; Kool, Marcel; Luu, Betty; Yao, Yuan; Wang, Xin; Dubuc, Adrian M; Garzia, Livia; Peacock, John; Mack, Stephen C; Wu, Xiaochong; Rolider, Adi; Morrissy, A Sorana; Cavalli, Florence M G; Jones, David T W; Zitterbart, Karel; Faria, Claudia C; Schüller, Ulrich; Kren, Leos; Kumabe, Toshihiro; Tominaga, Teiji; Shin Ra, Young; Garami, Miklós; Hauser, Peter; Chan, Jennifer A; Robinson, Shenandoah; Bognár, László; Klekner, Almos; Saad, Ali G; Liau, Linda M; Albrecht, Steffen; Fontebasso, Adam; Cinalli, Giuseppe; De Antonellis, Pasqualino; Zollo, Massimo; Cooper, Michael K; Thompson, Reid C; Bailey, Simon; Lindsey, Janet C; Di Rocco, Concezio; Massimi, Luca; Michiels, Erna M C; Scherer, Stephen W; Phillips, Joanna J; Gupta, Nalin; Fan, Xing; Muraszko, Karin M; Vibhakar, Rajeev; Eberhart, Charles G; Fouladi, Maryam; Lach, Boleslaw; Jung, Shin; Wechsler-Reya, Robert J; Fèvre-Montange, Michelle; Jouvet, Anne; Jabado, Nada; Pollack, Ian F; Weiss, William A; Lee, Ji-Yeoun; Cho, Byung-Kyu; Kim, Seung-Ki; Wang, Kyu-Chang; Leonard, Jeffrey R; Rubin, Joshua B; de Torres, Carmen; Lavarino, Cinzia; Mora, Jaume; Cho, Yoon-Jae; Tabori, Uri; Olson, James M; Gajjar, Amar; Packer, Roger J; Rutkowski, Stefan; Pomeroy, Scott L; French, Pim J; Kloosterhof, Nanne K; Kros, Johan M; Van Meir, Erwin G; Clifford, Steven C; Bourdeaut, Franck; Delattre, Olivier; Doz, François F; Hawkins, Cynthia E; Malkin, David; Grajkowska, Wieslawa A; Perek-Polnik, Marta; Bouffet, Eric; Rutka, James T; Pfister, Stefan M; Taylor, Michael D

    2014-03-20

    Medulloblastoma comprises four distinct molecular subgroups: WNT, SHH, Group 3, and Group 4. Current medulloblastoma protocols stratify patients based on clinical features: patient age, metastatic stage, extent of resection, and histologic variant. Stark prognostic and genetic differences among the four subgroups suggest that subgroup-specific molecular biomarkers could improve patient prognostication. Molecular biomarkers were identified from a discovery set of 673 medulloblastomas from 43 cities around the world. Combined risk stratification models were designed based on clinical and cytogenetic biomarkers identified by multivariable Cox proportional hazards analyses. Identified biomarkers were tested using fluorescent in situ hybridization (FISH) on a nonoverlapping medulloblastoma tissue microarray (n = 453), with subsequent validation of the risk stratification models. Subgroup information improves the predictive accuracy of a multivariable survival model compared with clinical biomarkers alone. Most previously published cytogenetic biomarkers are only prognostic within a single medulloblastoma subgroup. Profiling six FISH biomarkers (GLI2, MYC, chromosome 11 [chr11], chr14, 17p, and 17q) on formalin-fixed paraffin-embedded tissues, we can reliably and reproducibly identify very low-risk and very high-risk patients within SHH, Group 3, and Group 4 medulloblastomas. Combining subgroup and cytogenetic biomarkers with established clinical biomarkers substantially improves patient prognostication, even in the context of heterogeneous clinical therapies. The prognostic significance of most molecular biomarkers is restricted to a specific subgroup. We have identified a small panel of cytogenetic biomarkers that reliably identifies very high-risk and very low-risk groups of patients, making it an excellent tool for selecting patients for therapy intensification and therapy de-escalation in future clinical trials.

  11. Quantum mechanics and hidden superconformal symmetry

    Science.gov (United States)

    Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.

    2017-12-01

    Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).

  12. Histopathological subgroups in knee osteoarthritis.

    Science.gov (United States)

    Wyatt, L A; Moreton, B J; Mapp, P I; Wilson, D; Hill, R; Ferguson, E; Scammell, B E; Walsh, D A

    2017-01-01

    Osteoarthritis (OA) is a heterogeneous, multi-tissue disease. We hypothesised that different histopathological features characterise different stages during knee OA progression, and that discrete subgroups can be defined based on validated measures of OA histopathological features. Medial tibial plateaux and synovium were from 343 post-mortem (PM) and 143 OA arthroplasty donations. A 'chondropathy/osteophyte' group (n = 217) was classified as PM cases with osteophytes or macroscopic medial tibiofemoral chondropathy lesions ≥grade 3 to represent pre-surgical (early) OA. 'Non-arthritic' controls (n = 48) were identified from the remaining PM cases. Mankin histopathological scores were subjected to Rasch analysis and supplemented with histopathological scores for subchondral bone marrow replacement and synovitis. Item weightings were derived by principle components analysis (PCA). Histopathological subgroups were sought using latent class analysis (LCA). Chondropathy, synovitis and osteochondral pathology were each associated with OA at arthroplasty, but each was also identified in some 'non-arthritic' controls. Tidemark breaching in the chondropathy/osteophyte group was greater than in non-arthritic controls. Three histopathological subgroups were identified, characterised as 'mild OA', or 'severe OA' with mild or moderate/severe synovitis. Presence and severity of synovitis helps define distinct histopathological OA subgroups. The absence of a discrete 'normal' subgroup indicates a pathological continuum between normality and OA status. Identifying specific pathological processes and their clinical correlates in OA subgroups has potential to accelerate the development of more effective therapies. Copyright © 2016 Osteoarthritis Research Society International. Published by Elsevier Ltd. All rights reserved.

  13. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  14. A hidden history

    OpenAIRE

    Peppers, Emily

    2008-01-01

    The Cultural Collections Audit project began at the University of Edinburgh in 2004, searching for hidden treasures in its 'distributed heritage collections' across the university. The objects and collections recorded in the Audit ranged widely from fine art and furniture to historical scientific and teaching equipment and personalia relating to key figures in the university's long tradition of academic excellence. This information was gathered in order to create a central database of informa...

  15. Coupling of Hidden Sector

    OpenAIRE

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fer\\-mions (``sterinos'') and sterile mediating bosons (``sterons'') of mass dimension 1 (not 2!) --- the last described by an antisymmetric tensor field --- requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, sugge...

  16. Adaptive filtering for hidden node detection and tracking in networks.

    Science.gov (United States)

    Hamilton, Franz; Setzer, Beverly; Chavez, Sergio; Tran, Hien; Lloyd, Alun L

    2017-07-01

    The identification of network connectivity from noisy time series is of great interest in the study of network dynamics. This connectivity estimation problem becomes more complicated when we consider the possibility of hidden nodes within the network. These hidden nodes act as unknown drivers on our network and their presence can lead to the identification of false connections, resulting in incorrect network inference. Detecting the parts of the network they are acting on is thus critical. Here, we propose a novel method for hidden node detection based on an adaptive filtering framework with specific application to neuronal networks. We consider the hidden node as a problem of missing variables when model fitting and show that the estimated system noise covariance provided by the adaptive filter can be used to localize the influence of the hidden nodes and distinguish the effects of different hidden nodes. Additionally, we show that the sequential nature of our algorithm allows for tracking changes in the hidden node influence over time.

  17. Los problemas evolutivos de coordinación en la adolescencia: Análisis de una dificultad oculta. Developmental coordination problems in the adolescence: analisys of a hidden difficulty.

    Directory of Open Access Journals (Sweden)

    Ruiz Pérez , Luis Miguel

    2006-04-01

    Full Text Available ResumenEl presente artículo realiza un análisis de los problemas evolutivos de coordinación motriz en la edad escolar, un asunto que ha recibido una escasa atención en los ámbitos educativos españoles. La existencia de estas dificultades de estos adolescentes tiene su mayor expresión más relevante en las sesiones de educación física, de aprendizaje deportivo o en los juegos, ha provocado una gran preocupación en los países de nuestro entorno y el desarrollo de programas de intervención que palie esta condición y la remedie. Más allá de las relevancias que se puedan otorgar a las diferentes materias del currículo escolar, la competencia motriz es un elemento imprescindible para favorecer un estilo de vida saludable entre los escolares de la educación secundaria, desvelar al existencia de esta dificultad es un primer paso en esta dirección.AbstractThe objective of this article has been to analyze developmental coordination problems in school ages, a matter that has received a short attention among educators in our country. The clear expression of this difficulty is in the physical education and sport classes. Many countries have begun to study and analyze this problem worried about the increased incidence of it, and have developed intervention programmes in order to improve the motor competence of these children. Physical education has the objective of developing of motor competence in all our secondary school children and promote a healthy life style among them, to uncover this hidden difficulty is a necessary step in this direction.

  18. MPACT Subgroup Self-Shielding Efficiency Improvements

    International Nuclear Information System (INIS)

    Stimpson, Shane; Liu, Yuxuan; Collins, Benjamin S.; Clarno, Kevin T.

    2016-01-01

    Recent developments to improve the efficiency of the MOC solvers in MPACT have yielded effective kernels that loop over several energy groups at once, rather that looping over one group at a time. These kernels have produced roughly a 2x speedup on the MOC sweeping time during eigenvalue calculation. However, the self-shielding subgroup calculation had not been reevaluated to take advantage of these new kernels, which typically requires substantial solve time. The improvements covered in this report start by integrating the multigroup kernel concepts into the subgroup calculation, which are then used as the basis for further extensions. The next improvement that is covered is what is currently being termed as ''Lumped Parameter MOC''. Because the subgroup calculation is a purely fixed source problem and multiple sweeps are performed only to update the boundary angular fluxes, the sweep procedure can be condensed to allow for the instantaneous propagation of the flux across a spatial domain, without the need to sweep along all segments in a ray. Once the boundary angular fluxes are considered to be converged, an additional sweep that will tally the scalar flux is completed. The last improvement that is investigated is the possible reduction of the number of azimuthal angles per octant in the shielding sweep. Typically 16 azimuthal angles per octant are used for self-shielding and eigenvalue calculations, but it is possible that the self-shielding sweeps are less sensitive to the number of angles than the full eigenvalue calculation.

  19. Is mammary reconstruction with the anatomical Becker expander a simple procedure? Complications and hidden problems leading to secondary surgical procedures: a follow-up study.

    Science.gov (United States)

    Farace, Francesco; Faenza, Mario; Bulla, Antonio; Rubino, Corrado; Campus, Gian Vittorio

    2013-06-01

    Debate over the role of Becker expander implants (BEIs) in breast reconstruction is still ongoing. There are no clear indications for BEI use. The main indications for BEI use are one-stage breast reconstruction procedure and congenital breast deformities correction, due to the postoperative ability to vary BEI volume. Recent studies showed that BEIs were removed 5 years after mammary reconstruction in 68% of operated patients. This entails a further surgical procedure. BEIs should not, therefore, be regarded as one-stage prostheses. We performed a case-series study of breast reconstructions with anatomically shaped Becker-35™ implants, in order to highlight complications and to flag unseen problems, which might entail a second surgical procedure. A total of 229 patients, reconstructed from 2005 to 2010, were enrolled in this study. Data relating to implant type, volume, mean operative time and complications were recorded. All the patients underwent the same surgical procedure. The minimum follow-up period was 18 months. During a 5-year follow-up, 99 patients required secondary surgery to correct their complications or sequelae; 46 of them underwent BEI removal within 2 years of implantation, 56 within 3 years, 65 within 4 years and 74 within 5 years. Our findings show that two different sorts of complications can arise with these devices, leading to premature implant removal, one common to any breast implant and one peculiar to BEIs. The Becker implant is a permanent expander. Surgeons must, therefore, be aware that, once positioned, the Becker expander cannot be adjusted at a later date, as in two-stage expander/prosthesis reconstructions for instance. Surgeons must have a clear understanding of possible BEI complications in order to be able to discuss these with their patients. Therefore, only surgeons experienced in breast reconstruction should use BEIs. Copyright © 2013 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by

  20. Suppressing the QCD axion abundance by hidden monopoles

    International Nuclear Information System (INIS)

    Kawasaki, Masahiro

    2015-11-01

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10 12 GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  1. Localization of hidden Chua's attractors

    International Nuclear Information System (INIS)

    Leonov, G.A.; Kuznetsov, N.V.; Vagaitsev, V.I.

    2011-01-01

    The classical attractors of Lorenz, Rossler, Chua, Chen, and other widely-known attractors are those excited from unstable equilibria. From computational point of view this allows one to use numerical method, in which after transient process a trajectory, started from a point of unstable manifold in the neighborhood of equilibrium, reaches an attractor and identifies it. However there are attractors of another type: hidden attractors, a basin of attraction of which does not contain neighborhoods of equilibria. In the present Letter for localization of hidden attractors of Chua's circuit it is suggested to use a special analytical-numerical algorithm. -- Highlights: → There are hidden attractors: basin doesn't contain neighborhoods of equilibria. → Hidden attractors cannot be reached by trajectory from neighborhoods of equilibria. → We suggested special procedure for localization of hidden attractors. → We discovered hidden attractor in Chua's system, L. Chua in his work didn't expect this.

  2. Hidden Liquidity: Determinants and Impact

    OpenAIRE

    Gökhan Cebiroglu; Ulrich Horst

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, ...

  3. Intertumoral Heterogeneity within Medulloblastoma Subgroups.

    Science.gov (United States)

    Cavalli, Florence M G; Remke, Marc; Rampasek, Ladislav; Peacock, John; Shih, David J H; Luu, Betty; Garzia, Livia; Torchia, Jonathon; Nor, Carolina; Morrissy, A Sorana; Agnihotri, Sameer; Thompson, Yuan Yao; Kuzan-Fischer, Claudia M; Farooq, Hamza; Isaev, Keren; Daniels, Craig; Cho, Byung-Kyu; Kim, Seung-Ki; Wang, Kyu-Chang; Lee, Ji Yeoun; Grajkowska, Wieslawa A; Perek-Polnik, Marta; Vasiljevic, Alexandre; Faure-Conter, Cecile; Jouvet, Anne; Giannini, Caterina; Nageswara Rao, Amulya A; Li, Kay Ka Wai; Ng, Ho-Keung; Eberhart, Charles G; Pollack, Ian F; Hamilton, Ronald L; Gillespie, G Yancey; Olson, James M; Leary, Sarah; Weiss, William A; Lach, Boleslaw; Chambless, Lola B; Thompson, Reid C; Cooper, Michael K; Vibhakar, Rajeev; Hauser, Peter; van Veelen, Marie-Lise C; Kros, Johan M; French, Pim J; Ra, Young Shin; Kumabe, Toshihiro; López-Aguilar, Enrique; Zitterbart, Karel; Sterba, Jaroslav; Finocchiaro, Gaetano; Massimino, Maura; Van Meir, Erwin G; Osuka, Satoru; Shofuda, Tomoko; Klekner, Almos; Zollo, Massimo; Leonard, Jeffrey R; Rubin, Joshua B; Jabado, Nada; Albrecht, Steffen; Mora, Jaume; Van Meter, Timothy E; Jung, Shin; Moore, Andrew S; Hallahan, Andrew R; Chan, Jennifer A; Tirapelli, Daniela P C; Carlotti, Carlos G; Fouladi, Maryam; Pimentel, José; Faria, Claudia C; Saad, Ali G; Massimi, Luca; Liau, Linda M; Wheeler, Helen; Nakamura, Hideo; Elbabaa, Samer K; Perezpeña-Diazconti, Mario; Chico Ponce de León, Fernando; Robinson, Shenandoah; Zapotocky, Michal; Lassaletta, Alvaro; Huang, Annie; Hawkins, Cynthia E; Tabori, Uri; Bouffet, Eric; Bartels, Ute; Dirks, Peter B; Rutka, James T; Bader, Gary D; Reimand, Jüri; Goldenberg, Anna; Ramaswamy, Vijay; Taylor, Michael D

    2017-06-12

    While molecular subgrouping has revolutionized medulloblastoma classification, the extent of heterogeneity within subgroups is unknown. Similarity network fusion (SNF) applied to genome-wide DNA methylation and gene expression data across 763 primary samples identifies very homogeneous clusters of patients, supporting the presence of medulloblastoma subtypes. After integration of somatic copy-number alterations, and clinical features specific to each cluster, we identify 12 different subtypes of medulloblastoma. Integrative analysis using SNF further delineates group 3 from group 4 medulloblastoma, which is not as readily apparent through analyses of individual data types. Two clear subtypes of infants with Sonic Hedgehog medulloblastoma with disparate outcomes and biology are identified. Medulloblastoma subtypes identified through integrative clustering have important implications for stratification of future clinical trials. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Model-Based Recursive Partitioning for Subgroup Analyses.

    Science.gov (United States)

    Seibold, Heidi; Zeileis, Achim; Hothorn, Torsten

    2016-05-01

    The identification of patient subgroups with differential treatment effects is the first step towards individualised treatments. A current draft guideline by the EMA discusses potentials and problems in subgroup analyses and formulated challenges to the development of appropriate statistical procedures for the data-driven identification of patient subgroups. We introduce model-based recursive partitioning as a procedure for the automated detection of patient subgroups that are identifiable by predictive factors. The method starts with a model for the overall treatment effect as defined for the primary analysis in the study protocol and uses measures for detecting parameter instabilities in this treatment effect. The procedure produces a segmented model with differential treatment parameters corresponding to each patient subgroup. The subgroups are linked to predictive factors by means of a decision tree. The method is applied to the search for subgroups of patients suffering from amyotrophic lateral sclerosis that differ with respect to their Riluzole treatment effect, the only currently approved drug for this disease.

  5. Hidden Risk Factors for Women

    Science.gov (United States)

    ... A.S.T. Quiz Hidden Stroke Risk Factors for Women Updated:Nov 22,2016 Excerpted from "What Women Need To Know About The Hidden Risk Factors ... 2012) This year, more than 100,000 U.S. women under 65 will have a stroke. Stroke is ...

  6. Higgs Portal into Hidden Sectors

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    Several attractive theoretical ideas suggest the existence of one or more 'hidden sectors' consisting of standard model singlet fields, some of which may not be too heavy. There is a profound reason to think that the Higgs sector might provide the first access to these hidden sectors. This scenario could affect Higgs phenomenology in drastic ways.

  7. Sociocultural Dimension of Hidden Content in a Professional Language Curriculum

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2017-12-01

    Full Text Available Introduction: studying curriculum as a pedagogical problem has traditionally been reduced to the analysis of its explicit content, set in official educational documents. However, a much less studied hidden content plays a significant role in education. So, what is the role of the hidden curriculum during professional language training? The purpose of the article is to determine the potential impact of hidden curriculum on students’ conceptual worldview. Comparing the worldview presented in textbooks with students’ one has allowed us to estimate the rate of influence of hidden curr iculum. Materials and Methods: the methodological basis of the work is the cultural concept of personalityoriented education. The methodology for studying the role of hidden curriculum includes four stages: at the first stage, the authors set the criteria for selecting textbooks for analysis and do the selection; at the second stage, the authors select sociocultural concepts for analysis; at the third stage, the scheme of analysis is designed and the analysis of textbooks is done; at the fourth stage, the authors identify the potential influence of hidden curriculum on students’ conceptual worldview. Results: the structure of hidden curriculum has been determined and the scheme for analysing its subject component has been developed. The authors have identified a significant influence of hidden curriculum on students’ worldview, which represents the scientific novelty of the article. Discussion and Conclusions: the article gives the definition of a hidden curriculum which is new for Russian pedagogy and presents a methodology for its analysis in EFL textbooks. That analysis is recommended to be conducted when selecting teaching materials both i n languages and other humanities.

  8. Finite groups in which some particular subgroups are TI-subgroups

    DEFF Research Database (Denmark)

    Shi, Jiangtao; Zhang, Cui

    2013-01-01

    We prove that G is a group in which all noncyclic subgroups are TI-subgroups if and only if all noncyclic subgroups of G are normal in G. Moreover, we classify groups in which all subgroups of even order are TI-subgroups....

  9. Finite groups all of whose minimal subgroups are NE-subgroups

    Indian Academy of Sciences (India)

    Logo of the Indian Academy of Sciences. Indian Academy of Sciences ... In this article, we investigate the structure of under the assumption that subgroups of prime order are *-subgroups of . The finite groups, all of whose minimal subgroups of the generalized Fitting subgroup are *-subgroups are classified.

  10. The hidden SO(4) symmetry of general SU(2) Thirring models

    International Nuclear Information System (INIS)

    Curci, G.; Paffuti, G.; Rossi, P.

    1988-01-01

    General four-fermion interactions in two dimensions with SU(2) invariance are shown to possess a hidden SO(4) symmetry. As a consequence physical states belong to irreducible representations of the two commuting O(3) subgroups and their interactions decouple accordingly. Two independent stable trajectories of the renormalization group are shown to exist perturbatively and are consistently reproduced by abelian bosonization. (orig.)

  11. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  12. Burnside structures of finite subgroups

    International Nuclear Information System (INIS)

    Lysenok, I G

    2007-01-01

    We establish conditions guaranteeing that a group B possesses the following property: there is a number l such that if elements w, x -1 wx,...,x -l+1 wx l-1 of B generate a finite subgroup G then x lies in the normalizer of G. These conditions are of a quite special form. They hold for groups with relations of the form x n =1 which appear as approximating groups for the free Burnside groups B(m,n) of sufficiently large even exponent n. We extract an algebraic assertion which plays an important role in all known approaches to substantial results on the groups B(m,n) of large even exponent, in particular, to proving their infiniteness. The main theorem asserts that when n is divisible by 16, B has the above property with l=6

  13. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group....

  14. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...

  15. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... for Families - Vietnamese Spanish Facts for Families Guide Child Abuse - The Hidden Bruises No. 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ...

  16. Research methods for subgrouping low back pain

    DEFF Research Database (Denmark)

    Kent, Peter; Keating, Jennifer L; Leboeuf-Yde, Charlotte

    2010-01-01

    important distinctions in their treatment needs or prognoses. Due to a proliferation of research methods and variability in how subgrouping results are interpreted, it is timely to open discussion regarding a conceptual framework for the research designs and statistical methods available for subgrouping...... studies (a method framework). The aims of this debate article are: (1) to present a method framework to inform the design and evaluation of subgrouping research in low back pain, (2) to describe method options when investigating prognostic effects or subgroup treatment effects, and (3) to discuss...... the strengths and limitations of research methods suitable for the hypothesis-setting phase of subgroup studies....

  17. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  18. Hidden Curriculum: An Analytical Definition

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Andarvazh

    2018-03-01

    Full Text Available Background: The concept of hidden curriculum was first used by Philip Jackson in 1968, and Hafferty brought this concept to the medical education. Many of the subjects that medical students learn are attributed to this curriculum. So far several definitions have been presented for the hidden curriculum, which on the one hand made this concept richer, and on the other hand, led to confusion and ambiguity.This paper tries to provide a clear and comprehensive definition of it.Methods: In this study, concept analysis of McKenna method was used. Using keywords and searching in the databases, 561 English and 26 Persian references related to the concept was found, then by limitingthe research scope, 125 abstracts and by finding more relevant references, 55 articles were fully studied.Results: After analyzing the definitions by McKenna method, the hidden curriculum is defined as follows: The hidden curriculum is a hidden, powerful, intrinsic in organizational structure and culture and sometimes contradictory message, conveyed implicitly and tacitly in the learning environment by structural and human factors and its contents includes cultural habits and customs, norms, values, belief systems, attitudes, skills, desires and behavioral and social expectations can have a positive or negative effect, unplanned, neither planners nor teachers, nor learners are aware of it. The ultimate consequence of the hidden curriculum includes reproducing the existing class structure, socialization, and familiarizing learners for transmission and joining the professional world.Conclusion: Based on the concept analysis, we arrived at an analytical definition of the hidden curriculum that could be useful for further studies in this area.Keywords: CONCEPT ANALYSIS, HIDDEN CURRICULUM, MCKENNA’S METHOD

  19. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  20. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  1. On the subgroups of PR groups

    International Nuclear Information System (INIS)

    Lebedenko, V.M.

    1979-01-01

    The subgroups of PR-groups are being studied, i.e., the subgroups of connected and simply connected nonabelian Lie groups, their Lie algebras being defined by the commuting relations of the type [Hsub(i), Hsub(j)] = rsub(ij)Hsub(i) (i 1 of PR-group G there exists such complementary subgroup G 2 and that group G is expanded in semidirect product G = G 1 xG 2 [ru

  2. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  3. Improvements to the subgroup option and the QA of MONK5W

    International Nuclear Information System (INIS)

    Grimshaw, D.; Davies, N.; Hutton, L.

    1988-10-01

    This report covers the changes that have been made to MONK5W since release 5A. These include an improved SUBGROUP treatment which removes the approximations inherent in previous versions of the code and which reduces the storage requirements which had previously made some calculations impossible to perform. A minor error has also been corrected which occurred when using P0 scattering with NOVICE data. Furthermore 13 minor code changes have been made which are mainly additional user error traps, or user hidden changes to improve the code probability. However 3 were minor bug corrections: an incorrect output format; an incorrect calculation of the standard deviation on the flux and an overwriting problem for large storage burnup calculations. Finally, one of the largest and most varied verification and validation exercises ever to be performed with MONK5W has been done. This exercise used the MONK5W QA database which has been previously reported. It contains a hundred test cases which have been specially designed to provide a testbed and some method of determining the range of the validity of the MONK5W package. The code has been improved so that it can be applied more successfully to a wider range of problems. Together with the vigorous testing of the code, MONK5W is now in a better shape than it has ever been. The improvements are important because users can use the code in circumstances where previously it could not be used. The stringent testing is important because users now demand a better quality assessed package than was once acceptable. (author)

  4. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  5. Hidden photons in connection to dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah; Ringwald, Andreas; Goodsell, Mark D.

    2013-06-01

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  6. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  7. Detecting hidden particles with MATHUSLA

    Science.gov (United States)

    Evans, Jared A.

    2018-03-01

    A hidden sector containing light long-lived particles provides a well-motivated place to find new physics. The recently proposed MATHUSLA experiment has the potential to be extremely sensitive to light particles originating from rare meson decays in the very long lifetime region. In this work, we illustrate this strength with the specific example of a light scalar mixed with the standard model-like Higgs boson, a model where MATHUSLA can further probe unexplored parameter space from exotic Higgs decays. Design augmentations should be considered in order to maximize the ability of MATHUSLA to discover very light hidden sector particles.

  8. Applications of hidden symmetries to black hole physics

    International Nuclear Information System (INIS)

    Frolov, Valeri

    2011-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  9. Infinite hidden conditional random fields for human behavior analysis.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time.

  10. Hidden Crises and Communication: An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  11. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  12. Urinary infection caused by Micrococcus subgroup 3

    Science.gov (United States)

    Kerr, Helen

    1973-01-01

    The laboratory findings and clinical presentations in urinary infections in 23 nurses, 10 caused by Micrococcus subgroup 3 and 13 by Escherichia coli, were studied, and the symptoms and possible predisposing factors compared. There were no important differences between the two groups. The infections caused by Micrococcus subgroup 3 were symptomatically severe, as were those caused by Escherichia coli. PMID:4593863

  13. ∗-supplemented subgroups of finite groups

    Indian Academy of Sciences (India)

    A subgroup H of a group G is said to be M∗-supplemented in G if ... normal subgroups and determined the structure of finite groups by using some ...... [12] Monakhov V S and Shnyparkov A V, On the p-supersolubility of a finite group with a.

  14. Gauging hidden symmetries in two dimensions

    International Nuclear Information System (INIS)

    Samtleben, Henning; Weidner, Martin

    2007-01-01

    We initiate the systematic construction of gauged matter-coupled supergravity theories in two dimensions. Subgroups of the affine global symmetry group of toroidally compactified supergravity can be gauged by coupling vector fields with minimal couplings and a particular topological term. The gauge groups typically include hidden symmetries that are not among the target-space isometries of the ungauged theory. The gaugings constructed in this paper are described group-theoretically in terms of a constant embedding tensor subject to a number of constraints which parametrizes the different theories and entirely encodes the gauged Lagrangian. The prime example is the bosonic sector of the maximally supersymmetric theory whose ungauged version admits an affine e 9 global symmetry algebra. The various parameters (related to higher-dimensional p-form fluxes, geometric and non-geometric fluxes, etc.) which characterize the possible gaugings, combine into an embedding tensor transforming in the basic representation of e 9 . This yields an infinite-dimensional class of maximally supersymmetric theories in two dimensions. We work out and discuss several examples of higher-dimensional origin which can be systematically analyzed using the different gradings of e 9

  15. Background-cross-section-dependent subgroup parameters

    International Nuclear Information System (INIS)

    Yamamoto, Toshihisa

    2003-01-01

    A new set of subgroup parameters was derived that can reproduce the self-shielded cross section against a wide range of background cross sections. The subgroup parameters are expressed with a rational equation which numerator and denominator are expressed as the expansion series of background cross section, so that the background cross section dependence is exactly taken into account in the parameters. The advantage of the new subgroup parameters is that they can reproduce the self-shielded effect not only by group basis but also by subgroup basis. Then an adaptive method is also proposed which uses fitting procedure to evaluate the background-cross-section-dependence of the parameters. One of the simple fitting formula was able to reproduce the self-shielded subgroup cross section by less than 1% error from the precise evaluation. (author)

  16. Existence of a dictatorial subgroup in social choice with independent subgroup utility scales, an alternative proof

    NARCIS (Netherlands)

    Khmelnitskaya, Anna Borisovna; van Deemen, Adrian; Rusinowska, Agnieszka

    2010-01-01

    Social welfare orderings for different scales of individual utility measurement in distinct population subgroups are studied. In Khmelnitskaya (2000), employing the continuous version of Arrow’s impossibility theorem, it was shown that for combinations of independent subgroups scales every

  17. Entry deterrence and hidden competition

    NARCIS (Netherlands)

    Lavrutich, Maria; Huisman, Kuno; Kort, Peter

    This paper studies strategic investment behavior of firms facing an uncertain demand in a duopoly setting. Firms choose both investment timing and the capacity level while facing additional uncertainty about market participants, which is introduced via the concept of hidden competition. We focus on

  18. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  19. The Hidden Dimensions of Databases.

    Science.gov (United States)

    Jacso, Peter

    1994-01-01

    Discusses methods of evaluating commercial online databases and provides examples that illustrate their hidden dimensions. Topics addressed include size, including the number of records or the number of titles; the number of years covered; and the frequency of updates. Comparisons of Readers' Guide Abstracts and Magazine Article Summaries are…

  20. Identification of subgroups among fibromyalgia patients.

    Science.gov (United States)

    Auvinet, B; Chaleil, D

    2012-09-28

    This paper presents some hypotheses concerning the identification of homogeneous subgroups among fibromyalgia (FM) patients in order to improve the management of the disease. It also reviews the available literature about this subject. Three methods for subgrouping are discussed according to clinical features, biomarkers, and gait analysis. Clinical subgrouping based on cluster analysis has been used for the identification of homogeneous subgroups of patients and, more recently, homogeneous clinical features. So far, longitudinal studies using clinical subgroups to direct treatment and predict outcome are still required. Biomarkers in FM, which is a neurobiological disease, are of promising interest, nevertheless currently, none of them can be used to subgroup FM patients. Due to the fact that cortical and subcortical mechanisms of gait control share some cognitive functions which are involved in FM, gait markers have been proposed to evaluate and to subgroup FM patients, in clinical settings. Three out of 4 core FM symptoms are linked to gait markers. Kinesia measured by means of cranio-caudal power is correlated to pain, and could be proposed to assess pain behavior (kinesiophobia). Stride frequency, which is linked to physical component, allows the identification of a hyperkinetic subgroup. Moreover, SF has been correlated to fatigue during the 6 minute walking test. Stride regularity, which expresses the unsteadiness of gait, is correlated to cognitive dysfunction in FM. Decreased stride regularity allows the recognition of a homogeneous subgroup characterized by an increased anxiety and depression, and decreased cognitive functions. These results need further studies to be validated and so used in the daily clinical practice.

  1. Identification of subgroups among fibromyalgia patients

    Directory of Open Access Journals (Sweden)

    D. Chaleil

    2012-09-01

    Full Text Available This paper presents some hypotheses concerning the identification of homogeneous subgroups among fibromyalgia (FM patients in order to improve the management of the disease. It also reviews the available literature about this subject. Three methods for subgrouping are discussed according to clinical features, biomarkers, and gait analysis. Clinical subgrouping based on cluster analysis has been used for the identification of homogeneous subgroups of patients and, more recently, homogeneous clinical features. So far, longitudinal studies using clinical subgroups to direct treatment and predict outcome are still required. Biomarkers in FM, which is a neurobiological disease, are of promising interest, nevertheless currently, none of them can be used to subgroup FM patients. Due to the fact that cortical and subcortical mechanisms of gait control share some cognitive functions which are involved in FM, gait markers have been proposed to evaluate and to subgroup FM patients, in clinical settings. Three out of 4 core FM symptoms are linked to gait markers. Kinesia measured by means of cranio-caudal power is correlated to pain, and could be proposed to assess pain behavior (kinesiophobia. Stride frequency, which is linked to physical component, allows the identification of a hyperkinetic subgroup. Moreover, SF has been correlated to fatigue during the 6 minute walking test. Stride regularity, which expresses the unsteadiness of gait, is correlated to cognitive dysfunction in FM. Decreased stride regularity allows the recognition of a homogeneous subgroup characterized by an increased anxiety and depression, and decreased cognitive functions. These results need further studies to be validated and so used in the daily clinical practice.

  2. SUBGR: A Program to Generate Subgroup Data for the Subgroup Resonance Self-Shielding Calculation

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kang Seog [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-06-06

    The Subgroup Data Generation (SUBGR) program generates subgroup data, including levels and weights from the resonance self-shielded cross section table as a function of background cross section. Depending on the nuclide and the energy range, these subgroup data can be generated by (a) narrow resonance approximation, (b) pointwise flux calculations for homogeneous media; and (c) pointwise flux calculations for heterogeneous lattice cells. The latter two options are performed by the AMPX module IRFFACTOR. These subgroup data are to be used in the Consortium for Advanced Simulation of Light Water Reactors (CASL) neutronic simulator MPACT, for which the primary resonance self-shielding method is the subgroup method.

  3. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  4. Crouching tiger - Hidden payload

    DEFF Research Database (Denmark)

    Heiderich, Mario; Frosch, Tilman; Jensen, Meiko

    2011-01-01

    functional, one-file web applications potentially containing HTML, JavaScript, Flash, and other interactive code structures. We found that even more severe problems have resulted from the often improper handling of complex and maliciously prepared SVG files by the browsers. In this paper, we introduce...... several novel attack techniques targeted at major websites, as well as modern browsers, email clients and other comparable tools. In particular, we illustrate that SVG images embedded via tag and CSS can execute arbitrary JavaScript code. We examine and present how current filtering techniques...

  5. Post hoc subgroups in clinical trials: Anathema or analytics?

    Science.gov (United States)

    Weisberg, Herbert I; Pontes, Victor P

    2015-08-01

    There is currently much interest in generating more individualized estimates of treatment effects. However, traditional statistical methods are not well suited to this task. Post hoc subgroup analyses of clinical trials are fraught with methodological problems. We suggest that the alternative research paradigm of predictive analytics, widely used in many business contexts, can be adapted to help. We compare the statistical and analytics perspectives and suggest that predictive modeling should often replace subgroup analysis. We then introduce a new approach, cadit modeling, that can be useful to identify and test individualized causal effects. The cadit technique is particularly useful in the context of selecting from among a large number of potential predictors. We describe a new variable-selection algorithm that has been applied in conjunction with cadit. The cadit approach is illustrated through a reanalysis of data from the Randomized Aldactone Evaluation Study trial, which studied the efficacy of spironolactone in heart-failure patients. The trial was successful, but a serious adverse effect (hyperkalemia) was subsequently discovered. Our reanalysis suggests that it may be possible to predict the degree of hyperkalemia based on a logistic model and to identify a subgroup in which the effect is negligible. Cadit modeling is a promising alternative to subgroup analyses. Cadit regression is relatively straightforward to implement, generates results that are easy to present and explain, and can mesh straightforwardly with many variable-selection algorithms. © The Author(s) 2015.

  6. Analysing the hidden curriculum: use of a cultural web.

    Science.gov (United States)

    Mossop, Liz; Dennick, Reg; Hammond, Richard; Robbé, Iain

    2013-02-01

    Major influences on learning about medical professionalism come from the hidden curriculum. These influences can contribute positively or negatively towards the professional enculturation of clinical students. The fact that there is no validated method for identifying the components of the hidden curriculum poses problems for educators considering professionalism. The aim of this study was to analyse whether a cultural web, adapted from a business context, might assist in the identification of elements of the hidden curriculum at a UK veterinary school. A qualitative approach was used. Seven focus groups consisting of three staff groups and four student groups were organised. Questioning was framed using the cultural web, which is a model used by business owners to assess their environment and consider how it affects their employees and customers. The focus group discussions were recorded, transcribed and analysed thematically using a combination of a priori and emergent themes. The cultural web identified elements of the hidden curriculum for both students and staff. These included: core assumptions; routines; rituals; control systems; organisational factors; power structures, and symbols. Discussions occurred about how and where these issues may affect students' professional identity development. The cultural web framework functioned well to help participants identify elements of the hidden curriculum. These aspects aligned broadly with previously described factors such as role models and institutional slang. The influence of these issues on a student's development of a professional identity requires discussion amongst faculty staff, and could be used to develop learning opportunities for students. The framework is promising for the analysis of the hidden curriculum and could be developed as an instrument for implementation in other clinical teaching environments. © Blackwell Publishing Ltd 2013.

  7. Health care expenditures among Asian American subgroups.

    Science.gov (United States)

    Chen, Jie; Vargas-Bustamante, Arturo; Ortega, Alexander N

    2013-06-01

    Using two nationally representative data sets, this study examined health care expenditure disparities between Caucasians and different Asian American subgroups. Multivariate analyses demonstrate that Asian Americans, as a group, have significantly lower total expenditures compared with Caucasians. Results also point to considerable heterogeneities in health care spending within Asian American subgroups. Findings suggest that language assistance programs would be effective in reducing disparities among Caucasians and Asian American subgroups with the exception of Indians and Filipinos, who tend to be more proficient in English. Results also indicate that citizenship and nativity were major factors associated with expenditure disparities. Socioeconomic status, however, could not explain expenditure disparities. Results also show that Asian Americans have lower physician and pharmaceutical costs but not emergency department or hospital expenditures. These findings suggest the need for culturally competent policies specific to Asian American subgroups and the necessity to encourage cost-effective treatments among Asian Americans.

  8. Hidden supersymmetry and large N

    International Nuclear Information System (INIS)

    Alfaro, J.

    1988-01-01

    In this paper we present a new method to deal with the leading order in the large-N expansion of a quantum field theory. The method uses explicitly the hidden supersymmetry that is present in the path-integral formulation of a stochastic process. In addition to this we derive a new relation that is valid in the leading order of the large-N expansion of the hermitian-matrix model for any spacetime dimension. (orig.)

  9. Nonparametric model validations for hidden Markov models with applications in financial econometrics.

    Science.gov (United States)

    Zhao, Zhibiao

    2011-06-01

    We address the nonparametric model validation problem for hidden Markov models with partially observable variables and hidden states. We achieve this goal by constructing a nonparametric simultaneous confidence envelope for transition density function of the observable variables and checking whether the parametric density estimate is contained within such an envelope. Our specification test procedure is motivated by a functional connection between the transition density of the observable variables and the Markov transition kernel of the hidden states. Our approach is applicable for continuous time diffusion models, stochastic volatility models, nonlinear time series models, and models with market microstructure noise.

  10. Hidden particle production at the ILC

    International Nuclear Information System (INIS)

    Fujii, Keisuke; Itoh, Hideo; Okada, Nobuchika; Hano, Hitoshi; Yoshioka, Tamaki

    2008-01-01

    In a class of new physics models, the new physics sector is completely or partly hidden, namely, a singlet under the standard model (SM) gauge group. Hidden fields included in such new physics models communicate with the standard model sector through higher-dimensional operators. If a cutoff lies in the TeV range, such hidden fields can be produced at future colliders. We consider a scalar field as an example of the hidden fields. Collider phenomenology on this hidden scalar is similar to that of the SM Higgs boson, but there are several features quite different from those of the Higgs boson. We investigate productions of the hidden scalar at the International Linear Collider (ILC) and study the feasibility of its measurements, in particular, how well the ILC distinguishes the scalar from the Higgs boson, through realistic Monte Carlo simulations.

  11. About hidden influence of predictor variables: Suppressor and mediator variables

    Directory of Open Access Journals (Sweden)

    Milovanović Boško

    2013-01-01

    Full Text Available In this paper procedure for researching hidden influence of predictor variables in regression models and depicting suppressor variables and mediator variables is shown. It is also shown that detection of suppressor variables and mediator variables could provide refined information about the research problem. As an example for applying this procedure, relation between Atlantic atmospheric centers and air temperature and precipitation amount in Serbia is chosen. [Projekat Ministarstva nauke Republike Srbije, br. 47007

  12. Irreducible geometric subgroups of classical algebraic groups

    CERN Document Server

    Burness, Timothy C; Testerman, Donna M

    2016-01-01

    Let G be a simple classical algebraic group over an algebraically closed field K of characteristic p \\ge 0 with natural module W. Let H be a closed subgroup of G and let V be a non-trivial irreducible tensor-indecomposable p-restricted rational KG-module such that the restriction of V to H is irreducible. In this paper the authors classify the triples (G,H,V) of this form, where H is a disconnected maximal positive-dimensional closed subgroup of G preserving a natural geometric structure on W.

  13. Hidden Symmetries for Thermodynamics and Emergence of Relativity

    International Nuclear Information System (INIS)

    Zhao Liu

    2010-01-01

    Erik Verlinde recently proposed an idea about the thermodynamic origin of gravity. Though this is a beautiful idea, which may resolve many long standing problems in the theories of gravity, it also raises many other problems. In this article I will comment on some of the problems of Verlinde's proposal with special emphasis on the thermodynamical origin of the principle of relativity. It is found that there is a large group of hidden symmetries of thermodynamics, which contains the Poincare group of the spacetime for which space is emergent. This explains the thermodynamic origin of the principle of relativity. (general)

  14. Hidden measurements, hidden variables and the volume representation of transition probabilities

    OpenAIRE

    Oliynyk, Todd A.

    2005-01-01

    We construct, for any finite dimension $n$, a new hidden measurement model for quantum mechanics based on representing quantum transition probabilities by the volume of regions in projective Hilbert space. For $n=2$ our model is equivalent to the Aerts sphere model and serves as a generalization of it for dimensions $n \\geq 3$. We also show how to construct a hidden variables scheme based on hidden measurements and we discuss how joint distributions arise in our hidden variables scheme and th...

  15. Dissipative hidden sector dark matter

    Science.gov (United States)

    Foot, R.; Vagnozzi, S.

    2015-01-01

    A simple way of explaining dark matter without modifying known Standard Model physics is to require the existence of a hidden (dark) sector, which interacts with the visible one predominantly via gravity. We consider a hidden sector containing two stable particles charged under an unbroken U (1 )' gauge symmetry, hence featuring dissipative interactions. The massless gauge field associated with this symmetry, the dark photon, can interact via kinetic mixing with the ordinary photon. In fact, such an interaction of strength ε ˜10-9 appears to be necessary in order to explain galactic structure. We calculate the effect of this new physics on big bang nucleosynthesis and its contribution to the relativistic energy density at hydrogen recombination. We then examine the process of dark recombination, during which neutral dark states are formed, which is important for large-scale structure formation. Galactic structure is considered next, focusing on spiral and irregular galaxies. For these galaxies we modeled the dark matter halo (at the current epoch) as a dissipative plasma of dark matter particles, where the energy lost due to dissipation is compensated by the energy produced from ordinary supernovae (the core-collapse energy is transferred to the hidden sector via kinetic mixing induced processes in the supernova core). We find that such a dynamical halo model can reproduce several observed features of disk galaxies, including the cored density profile and the Tully-Fisher relation. We also discuss how elliptical and dwarf spheroidal galaxies could fit into this picture. Finally, these analyses are combined to set bounds on the parameter space of our model, which can serve as a guideline for future experimental searches.

  16. On the growth of rank for subgroups of finitely generated groups

    International Nuclear Information System (INIS)

    Osin, D V

    1999-01-01

    In [1] and [2] the functions of rank growth were independently introduced and investigated for subgroups of a finitely generated free group. In the present paper the concept of growth of rank is extended to subgroups of an arbitrary finitely generated group G, and the dependence of the asymptotic behaviour of the above functions on the choice of a finite generating set in G is studied. For a broad class of groups (which includes, in particular, the free polynilpotent groups) estimates for the growth of rank for subgroups are obtained that generalize the wellknown Baumslag-Eidel'kind result on finitely generated normal subgroups. Some problems related to the realization of arbitrary functions as functions of rank growth for subgroups of soluble groups are treated

  17. Interpretation of Subgroup Effects in Published Trials

    DEFF Research Database (Denmark)

    Hancock, Mark J; Kjær, Per; Korsholm, Lars

    2013-01-01

    With the rapidly expanding number of studies reporting on treatment subgroups come new challenges in analyzing and interpreting this sometimes complex area of the literature. This article discusses 3 important issues regarding the analysis and interpretation of existing trials or systematic revie...

  18. Verification of a Subgroup Generation Method for Thorium Fuel Assemblies

    International Nuclear Information System (INIS)

    Sim, Ohsung; Kim, Myunghyun

    2013-01-01

    Resonance parameter consists of subgroup level and weight. The subgroup weight is obtained by solving the ultrafine slowing down equation and fixed source problem. That means this cross section library procedure considers conservation of the shielded cross section for pin-cell in order to obtain subgroup parameters. There are some isotopes to be concerned for research such as actinides and thorium. Minor actinides(MA) are existing with very small amount in a spent fuel, but effect is not negligible in a high burnup fuel assemblies. Some MAs have high fission cross sections under thermal neutron spectrum. Thorium isotopes was not investigated as much as uranium, but it has high potential for future application. In this study, a new cross section library to be replaced with HELIOS library was generated and compared for the assembly calculation, specially for assembly with thorium. An average capture cross section value at a certain fuel pin and multiplication factor of assembly were compared with nTRACER calculation with HELIOS library and Monte Carlo calculation of MCNP with ENDF-B/II. The accuracy of library data generated for thorium isotope in nTRACER calculation was tested for WASB model. There was a great improvement in K-eff and capture cross section for this assembly compared with old library, HELIOS library

  19. Sequential formation of subgroups in OB associations

    International Nuclear Information System (INIS)

    Elmegreen, B.G.; Lada, C.J.

    1977-01-01

    We reconsider the structure and formation of OB association in view of recent radio and infrared observations of the adjacent molecular clouds. As a result of this reexamination, we propose that OB subgroups are formed in a step-by-step process which involves the propagation of ionization (I) and shock (S) fronts through a molecular cloud complex. OB stars formed at the edge of a molecular cloud drive these I-S fronts into the cloud. A layer of dense neutral material accumulates between the I and S fronts and eventually becomes gravitationally unstable. This process is analyzed in detail. Several arguments concerning the temperature and mass of this layer suggest that a new OB subgroup will form. After approximately one-half million years, these stars will emerge from and disrupt the star-forming layer. A new shock will be driven into the remaining molecular cloud and will initiate another cycle of star formation.Several observed properties of OB associations are shown to follow from a sequential star-forming mechanism. These include the spatial separation and systematic differences in age of OB subgroups in a given association, the regularity of subgroup masses, the alignment of subgroups along the galactic plane, and their physical expansion. Detailed observations of ionization fronts, masers, IR sources, and molecular clouds are also in agreement with this model. Finally, this mechanism provides a means of dissipating a molecular cloud and exposing less massive stars (e.g., T Tauri stars) which may have formed ahead of the shock as part of the original cloud collapsed and fragmented

  20. Hidden inventory and safety considerations

    International Nuclear Information System (INIS)

    Anderson, A.R.; James, R.H.; Morgan, F.

    1976-01-01

    Preliminary results are described of the evaluation of residual plutonium in a process line used for the production of experimental fast reactor fuel. Initial attention has been focussed on a selection of work boxes used for processing powders and solutions. Amounts of material measured as ''hidden inventory'' are generally less than 0.1 percent of throughput but in one box containing very complex equipment the amount was exceptionally about 0.5 percent. The total surface area of the box and the installed equipment appears to be the most significant factor in determining the amount of plutonium held-up as ''hidden inventory,'' representing an average of about 4 x 10 -4 g cm -2 . Present results are based on gamma spectrometer measurements but neutron techniques are being developed to overcome some of the inherent uncertainties in the gamma method. It is suggested that the routine use of sample plates of known surface area would be valuable in monitoring the deposition of plutonium in work boxes

  1. The Hidden Reason Behind Children's Misbehavior.

    Science.gov (United States)

    Nystul, Michael S.

    1986-01-01

    Discusses hidden reason theory based on the assumptions that: (1) the nature of people is positive; (2) a child's most basic psychological need is involvement; and (3) a child has four possible choices in life (good somebody, good nobody, bad somebody, or severely mentally ill.) A three step approach for implementing hidden reason theory is…

  2. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...

  3. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  4. Hidden variables and locality in quantum theory

    International Nuclear Information System (INIS)

    Shiva, Vandana.

    1978-12-01

    The status of hidden variables in quantum theory has been debated since the 1920s. The author examines the no-hidden-variable theories of von Neumann, Kochen, Specker and Bell, and finds that they all share one basic assumption: averaging over the hidden variables should reproduce the quantum mechanical probabilities. Von Neumann also makes a linearity assumption, Kochen and Specker require the preservation of certain functional relations between magnitudes, and Bell proposes a locality condition. It has been assumed that the extrastatistical requirements are needed to serve as criteria of success for the introduction of hidden variables because the statistical condition is trivially satisfied, and that Bell's result is based on a locality condition that is physically motivated. The author shows that the requirement of weak locality, which is not physically motivated, is enough to give Bell's result. The proof of Bell's inequality works equally well for any pair of commuting magnitudes satisfying a condition called the degeneracy principle. None of the no-hidden-variable proofs apply to a class of hidden variable theories that are not phase-space reconstructions of quantum mechanics. The author discusses one of these theories, the Bohm-Bub theory, and finds that hidden variable theories that re all the quantum statistics, for single and sequential measurements, must introduce a randomization process for the hidden variables after each measurement. The philosophical significance of this theory lies in the role it can play in solving the conceptual puzzles posed by quantum theory

  5. Hidden supersymmetry and Fermion number fractionalization

    International Nuclear Information System (INIS)

    Akhoury, R.

    1985-01-01

    This paper discusses how a hidden supersymmetry of the underlying field theories can be used to interpret and to calculate fermion number fractionalization in different dimensions. This is made possible by relating it to a corresponding Witten index of the hidden supersymmetry. The closely related anomalies in odd dimensions are also discussed

  6. Helioscope bounds on hidden sector photons

    International Nuclear Information System (INIS)

    Redondo, J.

    2008-01-01

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to χ -14 , depending on the hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter χ at low masses (m γ' <1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  7. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De......_different are integrated. We experimentally validate our approach on the biologically motivated problem of global pairwise alignment.......A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference...

  8. A Note on TI-Subgroups of Finite Groups

    Indian Academy of Sciences (India)

    A subgroup of a finite group is called a TI-subgroup if H ∩ H x = 1 or for any x ∈ G . In this short note, the finite groups all of whose nonabelian subgroups are TI-subgroups are classified. Author Affiliations. Jiakuan Lu1 Linna Pang1. Department of Mathematics, Guangxi Normal University, Guangxi, Guilin 541004, ...

  9. Intergroup Leadership Across Distinct Subgroups and Identities.

    Science.gov (United States)

    Rast, David E; Hogg, Michael A; van Knippenberg, Daan

    2018-03-01

    Resolving intergroup conflict is a significant and often arduous leadership challenge, yet existing theory and research rarely, if ever, discuss or examine this situation. Leaders confront a significant challenge when they provide leadership across deep divisions between distinct subgroups defined by self-contained identities-The challenge is to avoid provoking subgroup identity distinctiveness threat. Drawing on intergroup leadership theory, three studies were conducted to test the core hypothesis that, where identity threat exists, leaders promoting an intergroup relational identity will be better evaluated and are more effective than leaders promoting a collective identity; in the absence of threat, leaders promoting a collective identity will prevail. Studies 1 and 2 ( N = 170; N = 120) supported this general proposition. Study 3 ( N = 136) extended these findings, showing that leaders promoting an intergroup relational identity, but not a collective identity, improved intergroup attitudes when participants experienced an identity distinctiveness threat.

  10. Hidden Markov processes theory and applications to biology

    CERN Document Server

    Vidyasagar, M

    2014-01-01

    This book explores important aspects of Markov and hidden Markov processes and the applications of these ideas to various problems in computational biology. The book starts from first principles, so that no previous knowledge of probability is necessary. However, the work is rigorous and mathematical, making it useful to engineers and mathematicians, even those not interested in biological applications. A range of exercises is provided, including drills to familiarize the reader with concepts and more advanced problems that require deep thinking about the theory. Biological applications are t

  11. Planar algebra of the subgroup-subfactor

    Indian Academy of Sciences (India)

    We think of R α G as the II1-factor (R ∪{ug: g ∈ G}) ⊂ L(L2(R)), where ug(ˆx) ..... define a global trace on P, where for 0± the trace for P0± ∼= C is the obvious identity .... function for strings is either a local maximum or a local minimum. ..... In order to understand how the inclusion tangles act on the subgroup-subfactor planar.

  12. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were...... available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...

  13. Hidden Valley Search at ATLAS

    CERN Document Server

    Verducci, M

    2011-01-01

    A number of extensions of the Standard Model result in neutral and weakly-coupled particles that decay to multi hadrons or multi leptons with macroscopic decay lengths. These particles with decay paths that can be comparable with ATLAS detector dimensions represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS detector. We will present a set of signature driven triggers for the ATLAS detector that target such displaced decays and evaluate their performances for some benchmark models and describe analysis strategies and limits on the production of such long-lived particles. A first estimation of the Hidden Valley trigger rates has been evaluated with 6 pb-1 of data collected at ATLAS during the data taking of 2010.

  14. The ubiquitin-proteasome system and chromosome 17 in cerebellar granule cells and medulloblastoma subgroups.

    Science.gov (United States)

    Vriend, Jerry; Marzban, Hassan

    2017-02-01

    Chromosome 17 abnormalities are often observed in medulloblastomas (MBs), particularly those classified in the consensus Groups 3 and 4. Herein we review MB signature genes associated with chromosome 17 and the relationship of these signature genes to the ubiquitin-proteasome system. While clinical investigators have not focused on the ubiquitin-proteasome system in relation to MB, a substantial amount of data on the topic has been hidden in the form of supplemental datasets of gene expression. A supplemental dataset associated with the Thompson classification of MBs shows that a subgroup of MB with 17p deletions is characterized by reduced expression of genes for several core particle subunits of the beta ring of the proteasome (β1, β4, β5, β7). One of these genes (PSMB6, the gene for the β1 subunit) is located on chromosome 17, near the telomeric end of 17p. By comparison, in the WNT group of MBs only one core proteasome subunit, β6, associated with loss of a gene (PSMB1) on chromosome 6, was down-regulated in this dataset. The MB subgroups with the worst prognosis have a significant association with chromosome 17 abnormalities and irregularities of APC/C cyclosome genes. We conclude that the expression of proteasome subunit genes and genes for ubiquitin ligases can contribute to prognostic classification of MBs. The therapeutic value of targeting proteasome subunits and ubiquitin ligases in the various subgroups of MB remains to be determined separately for each classification of MB.

  15. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  16. A classification of hidden-variable properties

    International Nuclear Information System (INIS)

    Brandenburger, Adam; Yanofsky, Noson

    2008-01-01

    Hidden variables are extra components added to try to banish counterintuitive features of quantum mechanics. We start with a quantum-mechanical model and describe various properties that can be asked of a hidden-variable model. We present six such properties and a Venn diagram of how they are related. With two existence theorems and three no-go theorems (EPR, Bell and Kochen-Specker), we show which properties of empirically equivalent hidden-variable models are possible and which are not. Formally, our treatment relies only on classical probability models, and physical phenomena are used only to motivate which models to choose

  17. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  18. Dietary phytate, zinc and hidden zinc deficiency.

    Science.gov (United States)

    Sandstead, Harold H; Freeland-Graves, Jeanne H

    2014-10-01

    Epidemiological data suggest at least one in five humans are at risk of zinc deficiency. This is in large part because the phytate in cereals and legumes has not been removed during food preparation. Phytate, a potent indigestible ligand for zinc prevents it's absorption. Without knowledge of the frequency of consumption of foods rich in phytate, and foods rich in bioavailable zinc, the recognition of zinc deficiency early in the illness may be difficult. Plasma zinc is insensitive to early zinc deficiency. Serum ferritin concentration≤20μg/L is a potential indirect biomarker. Early effects of zinc deficiency are chemical, functional and may be "hidden". The clinical problem is illustrated by 2 studies that involved US Mexican-American children, and US premenopausal women. The children were consuming home diets that included traditional foods high in phytate. The premenopausal women were not eating red meat on a regular basis, and their consumption of phytate was mainly from bran breakfast cereals. In both studies the presence of zinc deficiency was proven by functional responses to controlled zinc treatment. In the children lean-mass, reasoning, and immunity were significantly affected. In the women memory, reasoning, and eye-hand coordination were significantly affected. A screening self-administered food frequency questionnaire for office might help caregiver's identify patients at risk of zinc deficiency. Copyright © 2014 Elsevier GmbH. All rights reserved.

  19. Exploring inequality violations by classical hidden variables numerically

    International Nuclear Information System (INIS)

    Vongehr, Sascha

    2013-01-01

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability, and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs

  20. Mass spectra of hidden-charm molecular pentaquarks states

    International Nuclear Information System (INIS)

    Patel, Smruti; Vinodkumar, P.C.

    2016-01-01

    Very recently, the LHCb Collaboration has reported two hidden-charmed resonances P_c(4380) and P_c(4450) consistent with pentaquark states in the Λ_b"0 → K"-J/Ψp process with masses (widths) (4380 ±8 ± 29) MeV ((205 ±18 ± 86) MeV) and (4449.8 ±1.7 ± 2.5) MeV ((39 ±5 ±19) MeV), respectively. The observation of the P_c states has aroused the theorist's strong interest in the hidden-charm pentaquark states. They have been studied in various frameworks, such as the molecule-like pentaquark states, the diquark-diquark-antiquark type pentaquark states, the diquark-triquark type pentaquark states, re-scattering effects, etc. An identification of pentaquark states as exotic hadron has been one of the long standing problems in the physics of strong interaction and quantum chromodynamics (QCD). A decade ago lots of discussion were made about pentaquarks states but due to lack of further experimental evidences the study of pentaquarks have been almost gone in the darkness. But, recent remarkable observation of two resonances i.e. P_c(4380) and P_c(4450) with hidden charm and the minimal quark content cc-baruud provided new impact for studies of pentaquark states and opens a new window to study the exotic hadronic matter

  1. The selection and implementation of hidden line algorithms

    International Nuclear Information System (INIS)

    Schneider, A.

    1983-06-01

    One of the most challenging problems in the field of computer graphics is the elimination of hidden lines in images of nontransparent bodies. In the real world the nontransparent material hinders the light ray coming from hidden regions to the observer. In the computer based image formation process there is no automatic visibility regulation of this kind. So many lines are created which result in a poor quality of the spacial representation. Therefore a three-dimensional representation on the screen is only meaningfull if the hidden lines are eliminated. For this process many algorithms have been developed in the past. A common feature of these codes is the large amount of computer time needed. In the first generation of algorithms, which are commonly used today, the bodies are modeled by plane polygons. More recently, however, also algorithms are in use, which are able to treat curved surfaces without discretisation by plane surfaces. In this paper the first group of algorithms is reviewed, and the most important codes are described. The experience obtained during the implementation of two algorithms is presented. (orig.) [de

  2. Caveats on Bayesian and hidden-Markov models (v2.8)

    OpenAIRE

    Schomaker, Lambert

    2016-01-01

    This paper describes a number of fundamental and practical problems in the application of hidden-Markov models and Bayes when applied to cursive-script recognition. Several problems, however, will have an effect in other application areas. The most fundamental problem is the propagation of error in the product of probabilities. This is a common and pervasive problem which deserves more attention. On the basis of Monte Carlo modeling, tables for the expected relative error are given. It seems ...

  3. High Energy Colliders and Hidden Sectors

    Science.gov (United States)

    Dror, Asaf Jeff

    This thesis explores two dominant frontiers of theoretical physics, high energy colliders and hidden sectors. The Large Hadron Collider (LHC) is just starting to reach its maximum operational capabilities. However, already with the current data, large classes of models are being put under significant pressure. It is crucial to understand whether the (thus far) null results are a consequence of a lack of solution to the hierarchy problem around the weak scale or requires expanding the search strategy employed at the LHC. It is the duty of the current generation of physicists to design new searches to ensure that no stone is left unturned. To this end, we study the sensitivity of the LHC to the couplings in the Standard Model top sector. We find it can significantly improve the measurements on ZtRtR coupling by a novel search strategy, making use of an implied unitarity violation in such models. Analogously, we show that other couplings in the top sector can also be measured with the same technique. Furthermore, we critically analyze a set of anomalies in the LHC data and how they may appear from consistent UV completions. We also propose a technique to measure lifetimes of new colored particles with non-trivial spin. While the high energy frontier will continue to take data, it is likely the only collider of its kind for the next couple decades. On the other hand, low-energy experiments have a promising future with many new proposed experiments to probe the existence of particles well below the weak scale but with small couplings to the Standard Model. In this work we survey the different possibilities, focusingon the constraints as well as possible new hidden sector dynamics. In particular, we show that vector portals which couple to an anomalous current, e.g., baryon number, are significantly constrained from flavor changing meson decays and rare Z decays. Furthermore, we present a new mechanism for dark matter freezeout which depletes the dark sector through an

  4. The ergodic theory of lattice subgroups

    CERN Document Server

    Gorodnik, Alexander

    2010-01-01

    The results established in this book constitute a new departure in ergodic theory and a significant expansion of its scope. Traditional ergodic theorems focused on amenable groups, and relied on the existence of an asymptotically invariant sequence in the group, the resulting maximal inequalities based on covering arguments, and the transference principle. Here, Alexander Gorodnik and Amos Nevo develop a systematic general approach to the proof of ergodic theorems for a large class of non-amenable locally compact groups and their lattice subgroups. Simple general conditions on the spectral theory of the group and the regularity of the averaging sets are formulated, which suffice to guarantee convergence to the ergodic mean

  5. Density character of subgroups of topological groups

    OpenAIRE

    Leiderman, Arkady; Morris, Sidney A.; Tkachenko, Mikhail G.

    2015-01-01

    A subspace Y of a separable metrizable space X is separable, but without X metrizable this is not true even If Y is a closed linear subspace of a topological vector space X. K.H. Hofmann and S.A. Morris introduced the class of pro-Lie groups which consists of projective limits of finite-dimensional Lie groups and proved that it contains all compact groups, locally compact abelian groups and connected locally compact groups and is closed under products and closed subgroups. A topological group...

  6. Clinimetrics corner: choosing appropriate study designs for particular questions about treatment subgroups

    DEFF Research Database (Denmark)

    Kent, Peter; Hancock, Mark; Petersen, Ditte H.D

    2010-01-01

    that are inappropriate given the randomized controlled trial design used. The research design to choose, when developing a study protocol that investigates the effect of treatment subgroups, depends on the particular research question. Similarly, the inferences that can be drawn from an existing study will vary...... receive the same treatment?'; and (4) 'Are outcomes for a number of treatments better if those treatments are matched to patients in specific subgroups, than if the SAME treatments are randomly given to patients?'. Illustrative examples of these studies are provided. Conclusion: If the clinical usefulness......Background: Many clinicians and researchers believe that there are subgroups of people with spinal pain who respond differently to treatment and have different prognoses. There has been considerable interest in this topic recently. However, problems occur when conclusions about subgroups are made...

  7. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  8. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  9. Hidden costs, value lost: uninsurance in America

    National Research Council Canada - National Science Library

    Committee on the Consequences of Uninsurance

    2003-01-01

    Hidden Cost, Value Lost , the fifth of a series of six books on the consequences of uninsurance in the United States, illustrates some of the economic and social losses to the country of maintaining...

  10. The hidden epidemic: confronting sexually transmitted diseases

    National Research Council Canada - National Science Library

    Eng, Thomas R; Butler, William T

    .... In addition, STDs increase the risk of HIV transmission. The Hidden Epidemic examines the scope of sexually transmitted infections in the United States and provides a critical assessment of the nation's response to this public health crisis...

  11. Perspective: Disclosing hidden sources of funding.

    Science.gov (United States)

    Resnik, David B

    2009-09-01

    In this article, the author discusses ethical and policy issues related to the disclosure of hidden sources of funding in research. The author argues that authors have an ethical obligation to disclose hidden sources of funding and that journals should adopt policies to enforce this obligation. Journal policies should require disclosure of hidden sources of funding that authors know about and that have a direct relation to their research. To stimulate this discussion, the author describes a recent case: investigators who conducted a lung cancer screening study had received funding from a private foundation that was supported by a tobacco company, but they did not disclose this relationship to the journal. Investigators and journal editors must be prepared to deal with these issues in a manner that promotes honesty, transparency, fairness, and accountability in research. The development of well-defined, reasonable policies pertaining to hidden sources of funding can be a step in this direction.

  12. Petro Rents, Political Institutions, and Hidden Wealth

    DEFF Research Database (Denmark)

    Andersen, Jørgen Juel; Johannesen, Niels; Lassen, David Dreyer

    2017-01-01

    Do political institutions limit rent seeking by politicians? We study the transformation of petroleum rents, almost universally under direct government control, into hidden wealth using unique data on bank deposits in offshore financial centers that specialize in secrecy and asset protection. Our...... rulers is diverted to secret accounts. We find very limited evidence that shocks to other types of income not directly controlled by governments affect hidden wealth....

  13. Treatment implications of posterior fossa ependymoma subgroups.

    Science.gov (United States)

    Ramaswamy, Vijay; Taylor, Michael D

    2016-11-15

    Posterior fossa ependymoma comprises two distinct molecular entities, ependymoma_posterior fossa A (EPN_PFA) and ependymoma_posterior fossa B (EPN_PFB), with differentiable gene expression profiles. As yet, the response of the two entities to treatment is unclear. To determine the relationship between the two molecular subgroups of posterior fossa ependymoma and treatment, we studied a cohort of 820 patients with molecularly profiled, clinically annotated posterior fossa ependymomas. We found that the strongest predictor of poor outcome in patients with posterior fossa ependymoma across the entire age spectrum was molecular subgroup EPN_PFA, which was recently reported in the paper entitled "Therapeutic impact of cytoreductive surgery and irradiation of posterior fossa ependymoma in the molecular era: a retrospective multicohort analysis" in the Journal of Clinical Oncology. Patients with incompletely resected EPN_PFA tumors had a very poor outcome despite receiving adjuvant radiation therapy, whereas a substantial proportion of patients with EPN_PFB tumors can be cured with surgery alone.

  14. Myasthenia gravis: subgroup classification and therapeutic strategies.

    Science.gov (United States)

    Gilhus, Nils Erik; Verschuuren, Jan J

    2015-10-01

    Myasthenia gravis is an autoimmune disease that is characterised by muscle weakness and fatigue, is B-cell mediated, and is associated with antibodies directed against the acetylcholine receptor, muscle-specific kinase (MUSK), lipoprotein-related protein 4 (LRP4), or agrin in the postsynaptic membrane at the neuromuscular junction. Patients with myasthenia gravis should be classified into subgroups to help with therapeutic decisions and prognosis. Subgroups based on serum antibodies and clinical features include early-onset, late-onset, thymoma, MUSK, LRP4, antibody-negative, and ocular forms of myasthenia gravis. Agrin-associated myasthenia gravis might emerge as a new entity. The prognosis is good with optimum symptomatic, immunosuppressive, and supportive treatment. Pyridostigmine is the preferred symptomatic treatment, and for patients who do not adequately respond to symptomatic therapy, corticosteroids, azathioprine, and thymectomy are first-line immunosuppressive treatments. Additional immunomodulatory drugs are emerging, but therapeutic decisions are hampered by the scarcity of controlled studies. Long-term drug treatment is essential for most patients and must be tailored to the particular form of myasthenia gravis. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Workplace ageism: discovering hidden bias.

    Science.gov (United States)

    Malinen, Sanna; Johnston, Lucy

    2013-01-01

    BACKGROUND/STUDY CONTEXT: Research largely shows no performance differences between older and younger employees, or that older workers even outperform younger employees, yet negative attitudes towards older workers can underpin discrimination. Unfortunately, traditional "explicit" techniques for assessing attitudes (i.e., self-report measures) have serious drawbacks. Therefore, using an approach that is novel to organizational contexts, the authors supplemented explicit with implicit (indirect) measures of attitudes towards older workers, and examined the malleability of both. This research consists of two studies. The authors measured self-report (explicit) attitudes towards older and younger workers with a survey, and implicit attitudes with a reaction-time-based measure of implicit associations. In addition, to test whether attitudes were malleable, the authors measured attitudes before and after a mental imagery intervention, where the authors asked participants in the experimental group to imagine respected and valued older workers from their surroundings. Negative, stable implicit attitudes towards older workers emerged in two studies. Conversely, explicit attitudes showed no age bias and were more susceptible to change intervention, such that attitudes became more positive towards older workers following the experimental manipulation. This research demonstrates the unconscious nature of bias against older workers, and highlights the utility of implicit attitude measures in the context of the workplace. In the current era of aging workforce and skill shortages, implicit measures may be necessary to illuminate hidden workplace ageism.

  16. Hidden slow pulsars in binaries

    Science.gov (United States)

    Tavani, Marco; Brookshaw, Leigh

    1993-01-01

    The recent discovery of the binary containing the slow pulsar PSR 1718-19 orbiting around a low-mass companion star adds new light on the characteristics of binary pulsars. The properties of the radio eclipses of PSR 1718-19 are the most striking observational characteristics of this system. The surface of the companion star produces a mass outflow which leaves only a small 'window' in orbital phase for the detection of PSR 1718-19 around 400 MHz. At this observing frequency, PSR 1718-19 is clearly observable only for about 1 hr out of the total 6.2 hr orbital period. The aim of this Letter is twofold: (1) to model the hydrodynamical behavior of the eclipsing material from the companion star of PSR 1718-19 and (2) to argue that a population of binary slow pulsars might have escaped detection in pulsar surveys carried out at 400 MHz. The possible existence of a population of partially or totally hidden slow pulsars in binaries will have a strong impact on current theories of binary evolution of neutron stars.

  17. Identifying and Assessing Interesting Subgroups in a Heterogeneous Population.

    Science.gov (United States)

    Lee, Woojoo; Alexeyenko, Andrey; Pernemalm, Maria; Guegan, Justine; Dessen, Philippe; Lazar, Vladimir; Lehtiö, Janne; Pawitan, Yudi

    2015-01-01

    Biological heterogeneity is common in many diseases and it is often the reason for therapeutic failures. Thus, there is great interest in classifying a disease into subtypes that have clinical significance in terms of prognosis or therapy response. One of the most popular methods to uncover unrecognized subtypes is cluster analysis. However, classical clustering methods such as k-means clustering or hierarchical clustering are not guaranteed to produce clinically interesting subtypes. This could be because the main statistical variability--the basis of cluster generation--is dominated by genes not associated with the clinical phenotype of interest. Furthermore, a strong prognostic factor might be relevant for a certain subgroup but not for the whole population; thus an analysis of the whole sample may not reveal this prognostic factor. To address these problems we investigate methods to identify and assess clinically interesting subgroups in a heterogeneous population. The identification step uses a clustering algorithm and to assess significance we use a false discovery rate- (FDR-) based measure. Under the heterogeneity condition the standard FDR estimate is shown to overestimate the true FDR value, but this is remedied by an improved FDR estimation procedure. As illustrations, two real data examples from gene expression studies of lung cancer are provided.

  18. Segmentation of laser range radar images using hidden Markov field models

    International Nuclear Information System (INIS)

    Pucar, P.

    1993-01-01

    Segmentation of images in the context of model based stochastic techniques is connected with high, very often unpracticle computational complexity. The objective with this thesis is to take the models used in model based image processing, simplify and use them in suboptimal, but not computationally demanding algorithms. Algorithms that are essentially one-dimensional, and their extensions to two dimensions are given. The model used in this thesis is the well known hidden Markov model. Estimation of the number of hidden states from observed data is a problem that is addressed. The state order estimation problem is of general interest and is not specifically connected to image processing. An investigation of three state order estimation techniques for hidden Markov models is given. 76 refs

  19. Additive subgroups of topological vector spaces

    CERN Document Server

    Banaszczyk, Wojciech

    1991-01-01

    The Pontryagin-van Kampen duality theorem and the Bochner theorem on positive-definite functions are known to be true for certain abelian topological groups that are not locally compact. The book sets out to present in a systematic way the existing material. It is based on the original notion of a nuclear group, which includes LCA groups and nuclear locally convex spaces together with their additive subgroups, quotient groups and products. For (metrizable, complete) nuclear groups one obtains analogues of the Pontryagin duality theorem, of the Bochner theorem and of the Lévy-Steinitz theorem on rearrangement of series (an answer to an old question of S. Ulam). The book is written in the language of functional analysis. The methods used are taken mainly from geometry of numbers, geometry of Banach spaces and topological algebra. The reader is expected only to know the basics of functional analysis and abstract harmonic analysis.

  20. Subgroup analysis in burnout : Relations between fatigue, anxiety, and depression.

    NARCIS (Netherlands)

    van Dam, A.

    2016-01-01

    Several authors have suggested that burned out patients do not form a homogeneous group and that subgroups should be considered. The identification of these subgroups may contribute to a better understanding of the burnout construct and lead to more specific therapeutic interventions. Subgroup

  1. Effectiveness of lifestyle intervention in subgroups of obese infertile women : a subgroup analysis of a RCT

    NARCIS (Netherlands)

    van Oers, A M; Groen, H; Mutsaerts, M A Q; Burggraaff, J M; Kuchenbecker, W K H; Perquin, D A M; Koks, C A M; van Golde, R; Kaaijk, E M; Schierbeek, J M; Oosterhuis, G J E; Broekmans, F J; Vogel, N E A; Land, J A; Mol, B W J; Hoek, A

    2016-01-01

    STUDY QUESTION: Do age, ovulatory status, severity of obesity and body fat distribution affect the effectiveness of lifestyle intervention in obese infertile women? SUMMARY ANSWER: We did not identify a subgroup in which lifestyle intervention increased the healthy live birth rate however it did

  2. A fast resonance interference treatment scheme with subgroup method

    International Nuclear Information System (INIS)

    Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.

    2015-01-01

    A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)

  3. Subgroup effects of occupational therapy-based intervention for people with advanced cancer.

    Science.gov (United States)

    Sampedro Pilegaard, Marc; Oestergaard, Lisa Gregersen; la Cour, Karen; Thit Johnsen, Anna; Brandt, Åse

    2018-03-23

    Many people with advanced cancer have decreased ability to perform activities of daily living (ADL). We recently performed a randomized, controlled trial (RCT) assessing the efficacy of an occupational therapy-based program, the 'Cancer Home-Life Intervention' in people with advanced cancer (N = 242) and found no overall effects on ADL ability. However, heterogeneity of treatment effect may disguise subgroup differences. To investigate whether subgroups of people with advanced cancer gain positive effects from the 'Cancer Home-Life Intervention' on ADL ability. An exploratory subgroup analysis including 191 participants from a RCT. The outcome was ADL motor ability measured by the Assessment of Motor and Process Skills (AMPS). Subgroups were defined by age, gender, years of education, type of primary tumor, functional level, and activity problems. The 'Cancer Home-Life Intervention' had no statistically significant effect in the six subgroups. Modifying effects of age (0.30 [95% CI: -0.05 to 0.64]) and gender (0.23 [95% CI: -0.11 to 0.57]) were not found. There were no subgroup effects of the 'Cancer Home-Life Intervention'on ADL motor ability. Some indications suggest greater effects for those aged below 69 years; however, this result should be interpreted with caution.

  4. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, M.

    2008-07-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  5. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, Markus; Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the standard model Higgs via a renormalizable quartic term - sometimes called the Higgs portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs, we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone.

  6. Hidden burden of malaria in Indian women

    Directory of Open Access Journals (Sweden)

    Sharma Vinod P

    2009-12-01

    Full Text Available Abstract Malaria is endemic in India with an estimated 70-100 million cases each year (1.6-1.8 million reported by NVBDCP; of this 50-55% are Plasmodium vivax and 45-50% Plasmodium falciparum. A recent study on malaria in pregnancy reported from undivided Madhya Pradesh state (includes Chhattisgarh state, that an estimated over 220,000 pregnant women contract malaria infection each year. Malaria in pregnancy caused- abortions 34.5%; stillbirths 9%; and maternal deaths 0.45%. Bulk of this tragic outcome can be averted by following the Roll Back Malaria/WHO recommendations of the use of malaria prevention i.e. indoor residual spraying (IRS/insecticide-treated bed nets (ITN preferably long-lasting treated bed nets (LLIN; intermittent preventive therapy (IPT; early diagnosis, prompt and complete treatment using microscopic/malaria rapid diagnostics test (RDT and case management. High incidence in pregnancy has arisen because of malaria surveillance lacking coverage, lack of age and sex wise data, staff shortages, and intermittent preventive treatment (IPT applicable in high transmission states/pockets is not included in the national drug policy- an essential component of fighting malaria in pregnancy in African settings. Inadequate surveillance and gross under-reporting has been highlighted time and again for over three decades. As a result the huge problem of malaria in pregnancy reported occasionally by researchers has remained hidden. Malaria in pregnancy may quicken severity in patients with drug resistant parasites, anaemia, endemic poverty, and malnutrition. There is, therefore, urgent need to streamline malaria control strategies to make a difference in tackling this grim scenario in human health.

  7. Identifying hidden voice and video streams

    Science.gov (United States)

    Fan, Jieyan; Wu, Dapeng; Nucci, Antonio; Keralapura, Ram; Gao, Lixin

    2009-04-01

    Given the rising popularity of voice and video services over the Internet, accurately identifying voice and video traffic that traverse their networks has become a critical task for Internet service providers (ISPs). As the number of proprietary applications that deliver voice and video services to end users increases over time, the search for the one methodology that can accurately detect such services while being application independent still remains open. This problem becomes even more complicated when voice and video service providers like Skype, Microsoft, and Google bundle their voice and video services with other services like file transfer and chat. For example, a bundled Skype session can contain both voice stream and file transfer stream in the same layer-3/layer-4 flow. In this context, traditional techniques to identify voice and video streams do not work. In this paper, we propose a novel self-learning classifier, called VVS-I , that detects the presence of voice and video streams in flows with minimum manual intervention. Our classifier works in two phases: training phase and detection phase. In the training phase, VVS-I first extracts the relevant features, and subsequently constructs a fingerprint of a flow using the power spectral density (PSD) analysis. In the detection phase, it compares the fingerprint of a flow to the existing fingerprints learned during the training phase, and subsequently classifies the flow. Our classifier is not only capable of detecting voice and video streams that are hidden in different flows, but is also capable of detecting different applications (like Skype, MSN, etc.) that generate these voice/video streams. We show that our classifier can achieve close to 100% detection rate while keeping the false positive rate to less that 1%.

  8. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  9. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  10. Geometric phases and hidden local gauge symmetry

    International Nuclear Information System (INIS)

    Fujikawa, Kazuo

    2005-01-01

    The analysis of geometric phases associated with level crossing is reduced to the familiar diagonalization of the Hamiltonian in the second quantized formulation. A hidden local gauge symmetry, which is associated with the arbitrariness of the phase choice of a complete orthonormal basis set, becomes explicit in this formulation (in particular, in the adiabatic approximation) and specifies physical observables. The choice of a basis set which specifies the coordinate in the functional space is arbitrary in the second quantization, and a subclass of coordinate transformations, which keeps the form of the action invariant, is recognized as the gauge symmetry. We discuss the implications of this hidden local gauge symmetry in detail by analyzing geometric phases for cyclic and noncyclic evolutions. It is shown that the hidden local symmetry provides a basic concept alternative to the notion of holonomy to analyze geometric phases and that the analysis based on the hidden local gauge symmetry leads to results consistent with the general prescription of Pancharatnam. We however note an important difference between the geometric phases for cyclic and noncyclic evolutions. We also explain a basic difference between our hidden local gauge symmetry and a gauge symmetry (or equivalence class) used by Aharonov and Anandan in their definition of generalized geometric phases

  11. Hidden Markov latent variable models with multivariate longitudinal data.

    Science.gov (United States)

    Song, Xinyuan; Xia, Yemao; Zhu, Hongtu

    2017-03-01

    Cocaine addiction is chronic and persistent, and has become a major social and health problem in many countries. Existing studies have shown that cocaine addicts often undergo episodic periods of addiction to, moderate dependence on, or swearing off cocaine. Given its reversible feature, cocaine use can be formulated as a stochastic process that transits from one state to another, while the impacts of various factors, such as treatment received and individuals' psychological problems on cocaine use, may vary across states. This article develops a hidden Markov latent variable model to study multivariate longitudinal data concerning cocaine use from a California Civil Addict Program. The proposed model generalizes conventional latent variable models to allow bidirectional transition between cocaine-addiction states and conventional hidden Markov models to allow latent variables and their dynamic interrelationship. We develop a maximum-likelihood approach, along with a Monte Carlo expectation conditional maximization (MCECM) algorithm, to conduct parameter estimation. The asymptotic properties of the parameter estimates and statistics for testing the heterogeneity of model parameters are investigated. The finite sample performance of the proposed methodology is demonstrated by simulation studies. The application to cocaine use study provides insights into the prevention of cocaine use. © 2016, The International Biometric Society.

  12. Automatic Hidden-Web Table Interpretation by Sibling Page Comparison

    Science.gov (United States)

    Tao, Cui; Embley, David W.

    The longstanding problem of automatic table interpretation still illudes us. Its solution would not only be an aid to table processing applications such as large volume table conversion, but would also be an aid in solving related problems such as information extraction and semi-structured data management. In this paper, we offer a conceptual modeling solution for the common special case in which so-called sibling pages are available. The sibling pages we consider are pages on the hidden web, commonly generated from underlying databases. We compare them to identify and connect nonvarying components (category labels) and varying components (data values). We tested our solution using more than 2,000 tables in source pages from three different domains—car advertisements, molecular biology, and geopolitical information. Experimental results show that the system can successfully identify sibling tables, generate structure patterns, interpret tables using the generated patterns, and automatically adjust the structure patterns, if necessary, as it processes a sequence of hidden-web pages. For these activities, the system was able to achieve an overall F-measure of 94.5%.

  13. Massive hidden photons as lukewarm dark matter

    International Nuclear Information System (INIS)

    Redondo, Javier; Postma, Marieke

    2008-11-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  14. Massive hidden photons as lukewarm dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Postma, Marieke [Nationaal Inst. voor Kernfysica en Hoge-Energiefysica (NIKHEF), Amsterdam (Netherlands)

    2008-11-15

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  15. Religious Tolerance in the Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Kevin Nobel Kurniawan

    2018-03-01

    Full Text Available Religious intolerance is spreading within the Indonesian institution of education. Previous studies have shown that the growth of intolerance is due to the state’s regulation and pedagogical apparatus. In contrast to the previous studies, I argue that the intolerance is related to hidden curriculum applied by the institution of education.  Normatively, the hidden curriculum contains the value of religious tolerance. However, factually, the author found that there are practices of intolerance, through the formal and informal spheres in the school’s structure, within the hidden curriculum. This article applies a qualitative approach with a mixed method research strategy to analyze data collected from students, teachers, and alumnis through field observation, in-depth interview, and survey.

  16. Lymphogranuloma venereum: a hidden emerging problem, Barcelona, 2011.

    Science.gov (United States)

    Vargas-Leguas, H; Garcia de Olalla, P; Arando, M; Armengol, P; Barbera, Mj; Vall, M; Vives, A; Martin-Ezquerra, G; Alsina, M; Blanco, J; Munoz, C; Caballero, E; Andreu, A; Ros, M; Gorrindo, P; Dominguez, A; Cayla, Ja

    2012-01-12

    From the beginning of 2007 until the end of 2011, 146 cases of lymphogranuloma venereum (LGV) were notified to the Barcelona Public Health Agency. Some 49% of them were diagnosed and reported in 2011, mainly in men who have sex with men. Almost half of them, 32 cases, were reported between July and September. This cluster represents the largest since 2004. This article presents the ongoing outbreak of LGV in Barcelona.

  17. A realistic extension of gauge-mediated SUSY-breaking model with superconformal hidden sector

    International Nuclear Information System (INIS)

    Asano, Masaki; Hisano, Junji; Okada, Takashi; Sugiyama, Shohei

    2009-01-01

    The sequestering of supersymmetry (SUSY) breaking parameters, which is induced by superconformal hidden sector, is one of the solutions for the μ/B μ problem in gauge-mediated SUSY-breaking scenario. However, it is found that the minimal messenger model does not derive the correct electroweak symmetry breaking. In this Letter we present a model which has the coupling of the messengers with the SO(10) GUT-symmetry breaking Higgs fields. The model is one of the realistic extensions of the gauge mediation model with superconformal hidden sector. It is shown that the extension is applicable for a broad range of conformality breaking scale

  18. Selection of hidden layer nodes in neural networks by statistical tests

    International Nuclear Information System (INIS)

    Ciftcioglu, Ozer

    1992-05-01

    A statistical methodology for selection of the number of hidden layer nodes in feedforward neural networks is described. The method considers the network as an empirical model for the experimental data set subject to pattern classification so that the selection process becomes a model estimation through parameter identification. The solution is performed for an overdetermined estimation problem for identification using nonlinear least squares minimization technique. The number of the hidden layer nodes is determined as result of hypothesis testing. Accordingly the redundant network structure with respect to the number of parameters is avoided and the classification error being kept to a minimum. (author). 11 refs.; 4 figs.; 1 tab

  19. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  20. Signatures of a hidden cosmic microwave background.

    Science.gov (United States)

    Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-09-26

    If there is a light Abelian gauge boson gamma' in the hidden sector its kinetic mixing with the photon can produce a hidden cosmic microwave background (HCMB). For meV masses, resonant oscillations gammagamma' happen after big bang nucleosynthesis (BBN) but before CMB decoupling, increasing the effective number of neutrinos Nnu(eff) and the baryon to photon ratio, and distorting the CMB blackbody spectrum. The agreement between BBN and CMB data provides new constraints. However, including Lyman-alpha data, Nnu(eff) > 3 is preferred. It is tempting to attribute this effect to the HCMB. The interesting parameter range will be tested in upcoming laboratory experiments.

  1. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  2. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2016-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  3. Identifying subgroups of patients using latent class analysis

    DEFF Research Database (Denmark)

    Nielsen, Anne Mølgaard; Kent, Peter; Hestbæk, Lise

    2017-01-01

    BACKGROUND: Heterogeneity in patients with low back pain (LBP) is well recognised and different approaches to subgrouping have been proposed. Latent Class Analysis (LCA) is a statistical technique that is increasingly being used to identify subgroups based on patient characteristics. However......, as LBP is a complex multi-domain condition, the optimal approach when using LCA is unknown. Therefore, this paper describes the exploration of two approaches to LCA that may help improve the identification of clinically relevant and interpretable LBP subgroups. METHODS: From 928 LBP patients consulting...... of statistical performance measures, qualitative evaluation of clinical interpretability (face validity) and a subgroup membership comparison. RESULTS: For the single-stage LCA, a model solution with seven patient subgroups was preferred, and for the two-stage LCA, a nine patient subgroup model. Both approaches...

  4. Compressing the hidden variable space of a qubit

    OpenAIRE

    Montina, Alberto

    2010-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of a single realization is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with the quantum states satisfy reasonable criteria ...

  5. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  6. The Hidden Cost of Buying a Computer.

    Science.gov (United States)

    Johnson, Michael

    1983-01-01

    In order to process data in a computer, application software must be either developed or purchased. Costs for modifications of the software package and maintenance are often hidden. The decision to buy or develop software packages should be based upon factors of time and maintenance. (MLF)

  7. Hidden symmetries in five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, M.

    2003-05-01

    This thesis is concerned with the study of hidden symmetries in supergravity, which play an important role in the present picture of supergravity and string theory. Concretely, the appearance of a hidden G 2(+2) /SO(4) symmetry is studied in the dimensional reduction of d=5, N=2 supergravity to three dimensions - a parallel model to the more famous E 8(+8) /SO(16) case in eleven-dimensional supergravity. Extending previous partial results for the bosonic part, I give a derivation that includes fermionic terms. This sheds new light on the appearance of the local hidden symmetry SO(4) in the reduction, and shows up an unusual feature which follows from an analysis of the R-symmetry associated with N=4 supergravity and of the supersymmetry variations, and which has no parallel in the eleven-dimensional case: The emergence of an additional SO(3) as part of the enhanced local symmetry, invisible in the dimensional reduction of the gravitino, and corresponding to the fact that, of the SO(4) used in the coset model, only the diagonal SO(3) is visible immediately upon dimensional reduction. The uncovering of the hidden symmetries proceeds via the construction of the proper coset gravity in three dimensions, and matching it with the Lagrangian obtained from the reduction. (orig.)

  8. Discovering hidden sectors with monophoton Z' searches

    International Nuclear Information System (INIS)

    Gershtein, Yuri; Petriello, Frank; Quackenbush, Seth; Zurek, Kathryn M.

    2008-01-01

    In many theories of physics beyond the standard model, from extra dimensions to Hidden Valleys and models of dark matter, Z ' bosons mediate between standard model particles and hidden sector states. We study the feasibility of observing such hidden states through an invisibly decaying Z ' at the LHC. We focus on the process pp→γZ ' →γXX † , where X is any neutral, (quasi-) stable particle, whether a standard model neutrino or a new state. This complements a previous study using pp→ZZ ' →l + l - XX † . Only the Z ' mass and two effective charges are needed to describe this process. If the Z ' decays invisibly only to standard model neutrinos, then these charges are predicted by observation of the Z ' through the Drell-Yan process, allowing discrimination between Z ' decays to standard model ν's and invisible decays to new states. We carefully discuss all backgrounds and systematic errors that affect this search. We find that hidden sector decays of a 1 TeV Z ' can be observed at 5σ significance with 50 fb -1 at the LHC. Observation of a 1.5 TeV state requires super-LHC statistics of 1 ab -1 . Control of the systematic errors, in particular, the parton distribution function uncertainty of the dominant Zγ background, is crucial to maximize the LHC search reach.

  9. Hidden Markov models for labeled sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1994-01-01

    A hidden Markov model for labeled observations, called a class HMM, is introduced and a maximum likelihood method is developed for estimating the parameters of the model. Instead of training it to model the statistics of the training sequences it is trained to optimize recognition. It resembles MMI...

  10. THE DIFFERENCES IN THE TORUS GEOMETRY BETWEEN HIDDEN AND NON-HIDDEN BROAD LINE ACTIVE GALACTIC NUCLEI

    Energy Technology Data Exchange (ETDEWEB)

    Ichikawa, Kohei; Ueda, Yoshihiro [Department of Astronomy, Kyoto University, Kitashirakawa-Oiwake-cho, Sakyo-ku, Kyoto 606-8502 (Japan); Packham, Christopher; Lopez-Rodriguez, Enrique; Alsip, Crystal D. [Department of Physics and Astronomy, University of Texas at San Antonio, One UTSA Circle, San Antonio, TX 78249 (United States); Almeida, Cristina Ramos; Ramos, Andrés Asensio; González-Martín, Omaira [Instituto de Astrofísica de Canarias, C/Vía Láctea, s/n, E-38205 La Laguna, Tenerife (Spain); Alonso-Herrero, Almudena [Instituto de Física de Cantabria, CSIC-Universidad de Cantabria, E-39005 Santander (Spain); Díaz-Santos, Tanio [Spitzer Science Center, California Institute of Technology, MS 220-6, Pasadena, CA 91125 (United States); Elitzur, Moshe [Department of Physics and Astronomy, University of Kentucky, Lexington, KY 40506-0055 (United States); Hönig, Sebastian F. [School of Physics and Astronomy, University of Southampton, Southampton SO17 1BJ (United Kingdom); Imanishi, Masatoshi [Subaru Telescope, 650 North A’ohoku Place, Hilo, HI 96720 (United States); Levenson, Nancy A. [Gemini Observatory, Southern Operations Center, c/o AURA, Casilla 603, La Serena (Chile); Mason, Rachel E. [Gemini Observatory, Northern Operations Center, 670 N. A’ohoku Place, Hilo, HI 96720 (United States); Perlman, Eric S., E-mail: ichikawa@kusastro.kyoto-u.ac.jp [Department of Physics and Space Sciences, 150 W. University Blvd., Florida Institute of Technology, Melbourne, FL 32901 (United States)

    2015-04-20

    We present results from the fitting of infrared (IR) spectral energy distributions of 21 active galactic nuclei (AGNs) with clumpy torus models. We compiled high spatial resolution (∼0.3–0.7 arcsec) mid-IR (MIR) N-band spectroscopy, Q-band imaging, and nuclear near- and MIR photometry from the literature. Combining these nuclear near- and MIR observations, far-IR photometry, and clumpy torus models enables us to put constraints on the torus properties and geometry. We divide the sample into three types according to the broad line region (BLR) properties: type-1s, type-2s with scattered or hidden broad line region (HBLR) previously observed, and type-2s without any published HBLR signature (NHBLR). Comparing the torus model parameters gives us the first quantitative torus geometrical view for each subgroup. We find that NHBLR AGNs have smaller torus opening angles and larger covering factors than HBLR AGNs. This suggests that the chance to observe scattered (polarized) flux from the BLR in NHBLR could be reduced by the dual effects of (a) less scattering medium due to the reduced scattering volume given the small torus opening angle and (b) the increased torus obscuration between the observer and the scattering region. These effects give a reasonable explanation for the lack of observed HBLR in some type-2 AGNs.

  11. The Hidden Diversity of Flagellated Protists in Soil.

    Science.gov (United States)

    Venter, Paul Christiaan; Nitsche, Frank; Arndt, Hartmut

    2018-07-01

    Protists are among the most diverse and abundant eukaryotes in soil. However, gaps between described and sequenced protist morphospecies still present a pending problem when surveying environmental samples for known species using molecular methods. The number of sequences in the molecular PR 2 database (∼130,000) is limited compared to the species richness expected (>1 million protist species) - limiting the recovery rate. This is important, since high throughput sequencing (HTS) methods are used to find associative patterns between functional traits, taxa and environmental parameters. We performed HTS to survey soil flagellates in 150 grasslands of central Europe, and tested the recovery rate of ten previously isolated and cultivated cercomonad species, among locally found diversity. We recovered sequences for reference soil flagellate species, but also a great number of their phylogenetically evaluated genetic variants, among rare and dominant taxa with presumably own biogeography. This was recorded among dominant (cercozoans, Sandona), rare (apusozoans) and a large hidden diversity of predominantly aquatic protists in soil (choanoflagellates, bicosoecids) often forming novel clades associated with uncultured environmental sequences. Evaluating the reads, instead of the OTUs that individual reads are usually clustered into, we discovered that much of this hidden diversity may be lost due to clustering. Copyright © 2018 Elsevier GmbH. All rights reserved.

  12. Tropical myeloneuropathies: the hidden endemias.

    Science.gov (United States)

    Román, G C; Spencer, P S; Schoenberg, B S

    1985-08-01

    Tropical myeloneuropathies include tropical ataxic neuropathy and tropical spastic paraparesis. These disorders occur in geographic isolates in several developing countries and are associated with malnutrition, cyanide intoxication from cassava consumption, tropical malabsorption (TM), vegetarian diets, and lathyrism. TM-malnutrition was a probable cause of myeloneuropathies among Far East prisoners of war in World War II. Clusters of unknown etiology occur in India, Africa, the Seychelles, several Caribbean islands, Jamaica, and Colombia. Treponemal infection (yaws) could be an etiologic factor in the last two. Tropical myeloneuropathies, a serious health problem, are multifactorial conditions that provide unsurpassed opportunities for international cooperation and neurologic research.

  13. Subgroup on engineering needs: summary report

    International Nuclear Information System (INIS)

    Gupta, G.D.; Blass, J.; Coffin, L.F.; Cramer, B.A.; Hart, E.W.; McClintock, F.A.; Moon, D.M.; Richerson, D.

    1979-01-01

    The need to bridge the gap between academic knowledge and industrial application was generally agreed upon in the summary report. Five areas were identified in which future work needs to be performed. These areas refer to metallic as well as ceramic materials and include cumulative damage concepts for crack initiation, environmental studies, more realistic approaches to contitutive equations, design methodology, and fabrication problems in welding, casting, forging, machining, forming, coatings, and powder sintering

  14. Home-Explorer: Ontology-Based Physical Artifact Search and Hidden Object Detection System

    Directory of Open Access Journals (Sweden)

    Bin Guo

    2008-01-01

    Full Text Available A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses sensors attached to the everyday artifacts (called smart objects in the real world. This paper makes two main contributions: First, it addresses, the robustness of the embedded sensors, which is seldom discussed in previous smart artifact research. Because sensors may sometimes be broken or fail to work under certain conditions, smart objects become hidden ones. However, current systems provide no mechanism to detect and manage objects when this problem occurs. Second, there is no common context infrastructure for building smart artifact systems, which makes it difficult for separately developed applications to interact with each other and uneasy for them to share and reuse knowledge. Unlike previous systems, Home-Explorer builds on an ontology-based knowledge infrastructure named Sixth-Sense, which makes it easy for the system to interact with other applications or agents also based on this ontology. The hidden object problem is also reflected in our ontology, which enables Home-Explorer to deal with both smart objects and hidden objects. A set of rules for deducing an object's status or location information and for locating hidden objects are described and evaluated.

  15. Germ cell tumours in neonates and infants: a distinct subgroup?

    NARCIS (Netherlands)

    Veltman, I.M.; Schepens, M.T.M.; Looijenga, L.H.J.; Strong, L.C.; Geurts van Kessel, A.H.M.

    2003-01-01

    Human germ cell tumours (GCTs) constitute a heterogeneous group of tumours that can be classified into four major subgroups. One of these subgroups encompasses (immature) teratomas and yolk sac tumours of patients under the age of 5 years. In this paper we review the various clinical, histological

  16. Personalized dementia care: proven effectiveness of psychosocial interventions in subgroups

    NARCIS (Netherlands)

    van Mierlo, L.D.; van der Roest, H.G.; Meiland, F.J.M.; Dröes, R.M.

    2010-01-01

    Many psychosocial intervention studies report effects in subgroups of people with dementia. Insight into the characteristics of these subgroups is important for care practice. This study reviews personal characteristics of people with dementia (living in the community or in an institution) that are

  17. Finite Groups with Given Quantitative Non-Nilpotent Subgroups II

    DEFF Research Database (Denmark)

    Shi, Jiangtao; Zhang, Cui

    2014-01-01

    As an extension of Shi and Zhang's 2011 article [4], we prove that any finite group having at most 23 non-normal non-nilpotent proper subgroups is solvable except for G ≅ A 5 or SL(2, 5), and any finite group having at most three conjugacy classes of non-normal non-nilpotent proper subgroups is s...

  18. Adult-acquired hidden penis in obese patients: a critical survey of the literature.

    Science.gov (United States)

    Cavayero, Chase T; Cooper, Meghan A; Harlin, Stephen L

    2015-03-01

    Hidden penis is anatomically defined by a lack of firm attachments of the skin and dartos fascia to the underlying Buck fascia. To critically appraise the research evidence that could support the most effective surgical techniques for adult-acquired hidden penis in obese patients. Studies investigating patients with a diagnosis of hidden penis were identified. Of these studies, only those with adult patients classified as overweight or obese (body mass index >25) were included in the review. Three reviewers examined the abstracts of the studies identified in the initial Medline search, and abstracts considered potentially relevant underwent full-text review. Studies that included patients with congenital, iatrogenic (eg, circumcision issues or aesthetic genital surgery), or traumatic causes of hidden penis were excluded. Studies that did not define the diagnostic criteria for hidden penis were excluded to minimize the risk of definition bias. The quality of evidence for each study was determined after considering the following sources of bias: method of allocation to study groups, data analysis, presence of baseline differences between groups, objectivity of outcome, and completeness of follow-up. Using these criteria, studies were then graded as high, moderate, or low in quality. Seven studies with a total of 119 patients met the inclusion criteria. All but 1 of the studies were nonrandomized. One study provided a clear presentation of results and appropriate statistical analysis. Six studies accounted for individual-based differences, and 1 study failed to account for baseline differences altogether. Four studies addressed follow-up. One study was of high quality, 2 were of moderate quality, and 4 were of low quality. Building a clinical practice guideline for the surgical management of hidden penis has proven difficult because of a lack of high-quality, statistically significant data in the research synthesis. The authors elucidate the challenges and epitomize

  19. Subgroups of GLn(R) for local rings R

    International Nuclear Information System (INIS)

    Kuku, A.O.; Mahdavi-Hezavehi, M.

    2002-07-01

    Let R be a local ring, with maximal ideal m, and residue class division ring R/m=D. Put A=M n (R)-n≥1, and denote by A*=GL n (R) the group of units of A. Here we investigate some algebraic structure of subnormal and maximal subgroups of A * . For instance, when D is of finite dimension over its center, it is shown that finitely generated subnormal subgroups of A* are central. It is also proved that maximal subgroups of A* are not finitely generated. Furthermore, assume that P is a nonabelian maximal subgroup of GL 1 (R) such that P contains a noncentral soluble normal subgroup of finite index, it is shown that D is a crossed product division algebra. (author)

  20. Hidden Symmetries of Stochastic Models

    Directory of Open Access Journals (Sweden)

    Boyka Aneva

    2007-05-01

    Full Text Available In the matrix product states approach to $n$ species diffusion processes the stationary probability distribution is expressed as a matrix product state with respect to a quadratic algebra determined by the dynamics of the process. The quadratic algebra defines a noncommutative space with a $SU_q(n$ quantum group action as its symmetry. Boundary processes amount to the appearance of parameter dependent linear terms in the algebraic relations and lead to a reduction of the $SU_q(n$ symmetry. We argue that the boundary operators of the asymmetric simple exclusion process generate a tridiagonal algebra whose irriducible representations are expressed in terms of the Askey-Wilson polynomials. The Askey-Wilson algebra arises as a symmetry of the boundary problem and allows to solve the model exactly.

  1. Molecular subgroups of medulloblastoma identification using noninvasive magnetic resonance spectroscopy.

    Science.gov (United States)

    Blüml, Stefan; Margol, Ashley S; Sposto, Richard; Kennedy, Rebekah J; Robison, Nathan J; Vali, Marzieh; Hung, Long T; Muthugounder, Sakunthala; Finlay, Jonathan L; Erdreich-Epstein, Anat; Gilles, Floyd H; Judkins, Alexander R; Krieger, Mark D; Dhall, Girish; Nelson, Marvin D; Asgharzadeh, Shahab

    2016-01-01

    Medulloblastomas in children can be categorized into 4 molecular subgroups with differing clinical characteristics, such that subgroup determination aids in prognostication and risk-adaptive treatment strategies. Magnetic resonance spectroscopy (MRS) is a widely available, noninvasive tool that is used to determine the metabolic characteristics of tumors and provide diagnostic information without the need for tumor tissue. In this study, we investigated the hypothesis that metabolite concentrations measured by MRS would differ between molecular subgroups of medulloblastoma and allow accurate subgroup determination. MRS was used to measure metabolites in medulloblastomas across molecular subgroups (SHH = 12, Groups 3/4 = 17, WNT = 1). Levels of 14 metabolites were analyzed to determine those that were the most discriminant for medulloblastoma subgroups in order to construct a multivariable classifier for distinguishing between combined Group 3/4 and SHH tumors. Medulloblastomas across molecular subgroups revealed distinct spectral features. Group 3 and Group 4 tumors demonstrated metabolic profiles with readily detectable taurine, lower levels of lipids, and high levels of creatine. SHH tumors showed prominent choline and lipid with low levels of creatine and little or no evidence of taurine. A 5-metabolite subgroup classifier inclusive of creatine, myo-inositol, taurine, aspartate, and lipid 13a was developed that could discriminate between Group 3/4 and SHH medulloblastomas with excellent accuracy (cross-validated area under the curve [AUC] = 0.88). The data show that medulloblastomas of Group 3/4 differ metabolically as measured using MRS when compared with SHH molecular subgroups. MRS is a useful and accurate tool to determine medulloblastoma molecular subgroups. © The Author(s) 2015. Published by Oxford University Press on behalf of the Society for Neuro-Oncology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  2. Universal primers that amplify RNA from all three flavivirus subgroups

    Directory of Open Access Journals (Sweden)

    Barnard Ross T

    2008-01-01

    Full Text Available Abstract Background Species within the Flavivirus genus pose public health problems around the world. Increasing cases of Dengue and Japanese encephalitis virus in Asia, frequent outbreaks of Yellow fever virus in Africa and South America, and the ongoing spread of West Nile virus throughout the Americas, show the geographical burden of flavivirus diseases. Flavivirus infections are often indistinct from and confused with other febrile illnesses. Here we review the specificity of published primers, and describe a new universal primer pair that can detect a wide range of flaviviruses, including viruses from each of the recognised subgroups. Results Bioinformatic analysis of 257 published full-length Flavivirus genomes revealed conserved regions not previously targeted by primers. Two degenerate primers, Flav100F and Flav200R were designed from these regions and used to generate an 800 base pair cDNA product. The region amplified encoded part of the methyltransferase and most of the RNA-dependent-RNA-polymerase (NS5 coding sequence. One-step RT-PCR testing was successful using standard conditions with RNA from over 60 different flavivirus strains representing about 50 species. The cDNA from each virus isolate was sequenced then used in phylogenetic analyses and database searches to confirm the identity of the template RNA. Conclusion Comprehensive testing has revealed the broad specificity of these primers. We briefly discuss the advantages and uses of these universal primers.

  3. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  4. Laser experiments explore the hidden sector

    International Nuclear Information System (INIS)

    Ahlers, M.

    2007-11-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses -7 times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background. (orig.)

  5. Hidden Costs and the Role of Modularity

    DEFF Research Database (Denmark)

    Larsen, Marcus M.

    2013-01-01

    that the inability to effectively estimate the costs of implementing an activity in a foreign location has a negative impact on the process performance of that activity. Performance is deterred as operations are likely to be disrupted by opportunity costs and managerial responses. However, this relationship......This paper addresses estimation errors in strategic decision-making processes due to hidden costs. While previous research has investigated the antecedents of hidden costs, this paper investigates performance consequences. Using unique data on 221 offshoring implementations, it is argued...... is mitigated by the degree of modularity in the activity as it reduces the need for costly coordination in offshoring. This paper contributes to research on offshoring and strategic decision-making by emphasizing the importance of organizational design and of estimating the costs of internal organizational...

  6. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  7. A masking index for quantifying hidden glitches

    OpenAIRE

    Berti-Equille, Laure; Loh, J. M.; Dasu, T.

    2015-01-01

    Data glitches are errors in a dataset. They are complex entities that often span multiple attributes and records. When they co-occur in data, the presence of one type of glitch can hinder the detection of another type of glitch. This phenomenon is called masking. In this paper, we define two important types of masking and propose a novel, statistically rigorous indicator called masking index for quantifying the hidden glitches. We outline four cases of masking: outliers masked by missing valu...

  8. Cold dark matter from the hidden sector

    International Nuclear Information System (INIS)

    Arias, Paola; Pontificia Univ. Catolica de Chile, Santiago

    2012-02-01

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  9. Completing Quantum Mechanics with Quantized Hidden Variables

    OpenAIRE

    van Enk, S. J.

    2015-01-01

    I explore the possibility that a quantum system S may be described completely by the combination of its standard quantum state $|\\psi\\rangle$ and a (hidden) quantum state $|\\phi\\rangle$ (that lives in the same Hilbert space), such that the outcome of any standard projective measurement on the system S is determined once the two quantum states are specified. I construct an algorithm that retrieves the standard quantum-mechanical probabilities, which depend only on $|\\psi\\rangle$, by assuming t...

  10. Cold dark matter from the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Arias, Paola [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Pontificia Univ. Catolica de Chile, Santiago (Chile). Facultad de Fisica

    2012-02-15

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  11. Hidden histories: challenges for pedagogy and participation

    OpenAIRE

    Morrice, Linda

    2013-01-01

    Higher Education has become and an increasingly diverse and globalised system in which the binaries between ‘traditional’ and ‘non-traditional’ students, exclusion and inclusion have less resonance and analytical purchase. Drawing on research with refugees Linda will suggest that higher education can be marked simultaneously by belonging and recognition, deficit and exclusion. Complex differences and inequalities remain hidden and unspoken, raising new questions and challenges for pedagogy an...

  12. Modeling promoter grammars with evolving hidden Markov models

    DEFF Research Database (Denmark)

    Won, Kyoung-Jae; Sandelin, Albin; Marstrand, Troels Torben

    2008-01-01

    MOTIVATION: Describing and modeling biological features of eukaryotic promoters remains an important and challenging problem within computational biology. The promoters of higher eukaryotes in particular display a wide variation in regulatory features, which are difficult to model. Often several...... factors are involved in the regulation of a set of co-regulated genes. If so, promoters can be modeled with connected regulatory features, where the network of connections is characteristic for a particular mode of regulation. RESULTS: With the goal of automatically deciphering such regulatory structures......, we present a method that iteratively evolves an ensemble of regulatory grammars using a hidden Markov Model (HMM) architecture composed of interconnected blocks representing transcription factor binding sites (TFBSs) and background regions of promoter sequences. The ensemble approach reduces the risk...

  13. Motion Imitation and Recognition using Parametric Hidden Markov Models

    DEFF Research Database (Denmark)

    Herzog, Dennis; Ude, Ales; Krüger, Volker

    2008-01-01

    ) are important. Only together they convey the whole meaning of an action. Similarly, to imitate a movement, the robot needs to select the proper action and parameterize it, e.g., by the relative position of the object that needs to be grasped. We propose to utilize parametric hidden Markov models (PHMMs), which...... extend the classical HMMs by introducing a joint parameterization of the observation densities, to simultaneously solve the problems of action recognition, parameterization of the observed actions, and action synthesis. The proposed approach was fully implemented on a humanoid robot HOAP-3. To evaluate...... the approach, we focused on reaching and pointing actions. Even though the movements are very similar in appearance, our approach is able to distinguish the two movement types and discover the parameterization, and is thus enabling both, action recognition and action synthesis. Through parameterization we...

  14. Hidden sector behind the CKM matrix

    Science.gov (United States)

    Okawa, Shohei; Omura, Yuji

    2017-08-01

    The small quark mixing, described by the Cabibbo-Kobayashi-Maskawa (CKM) matrix in the standard model, may be a clue to reveal new physics around the TeV scale. We consider a simple scenario that extra particles in a hidden sector radiatively mediate the flavor violation to the quark sector around the TeV scale and effectively realize the observed CKM matrix. The lightest particle in the hidden sector, whose contribution to the CKM matrix is expected to be dominant, is a good dark matter (DM) candidate. There are many possible setups to describe this scenario, so that we investigate some universal predictions of this kind of model, focusing on the contribution of DM to the quark mixing and flavor physics. In this scenario, there is an explicit relation between the CKM matrix and flavor violating couplings, such as four-quark couplings, because both are radiatively induced by the particles in the hidden sector. Then, we can explicitly find the DM mass region and the size of Yukawa couplings between the DM and quarks, based on the study of flavor physics and DM physics. In conclusion, we show that DM mass in our scenario is around the TeV scale, and the Yukawa couplings are between O (0.01 ) and O (1 ). The spin-independent DM scattering cross section is estimated as O (10-9) [pb]. An extra colored particle is also predicted at the O (10 ) TeV scale.

  15. Subgrouping of A and AB blood groups in Indian blood centres: is it required?

    Science.gov (United States)

    Hazarika, Ranjita; Basu, Sabita; Kaur, Paramjit

    2011-08-01

    Anti A1 antibody in the serum of A2 and A2B individuals is rare but when present can have laboratory and clinical significance. Routine subgrouping of all A and AB blood groups in blood centres in India is difficult due to economic constraints and has always been a point of debate. This study thus brings out the prevalence of anti A1 antibody and the clinical significance related to its presence. The results of the study showed a low prevalence of anti A1 antibody and when present, it had a low thermal amplitude and titre. Further, no blood group discrepancy or problems during compatibility testing were encountered with these (A1 antibody positive) blood units. Thus, it may be concluded that in India and other developing countries where resources are scarce, routine subgrouping of A and AB may not be really worthwhile unless there is a group discrepancy, problem during compatibility testing or history of a transfusion reaction.

  16. A method for generating subgroup parameters from resonance tables

    International Nuclear Information System (INIS)

    Devan, K.; Mohanakrishnan, P.

    1993-01-01

    A method for generating subgroup or band parameters from resonance tables is described. A computer code SPART was written using this method. This code generates the subgroup parameters for any number of bands within the specified broad groups at different temperatures by reading the required input data from the binary cross section library in the Cadarache format. The results obtained with SPART code for two bands were compared with that obtained from GROUPIE code and a good agreement was obtained. Results of the generation of subgroup parameters in four bands for sample case of 239 Pu from resonance tables of Cadarache Ver.2 library is also presented. (author). 8 refs., 2 tabs

  17. Advances in the development of a subgroup method for the self-shielding of resonant isotopes in arbitrary geometries

    International Nuclear Information System (INIS)

    Hebert, A.

    1997-01-01

    The subgroup method is used to compute self-shielded cross sections defined over coarse energy groups in the resolved energy domain. The validity of the subgroup approach was extended beyond the unresolved energy domain by partially taking into account correlation effects between the slowing-down source with the collision probability terms of the transport equation. This approach enables one to obtain a pure subgroup solution of the self-shielding problem without relying on any form of equivalence in dilution. Specific improvements are presented on existing subgroup methods: an N-term rational approximation for the fuel-to-fuel collision probability, a new Pade deflation technique for computing probability tables, and the introduction of a superhomogenization correction. The absorption rates obtained after self-shielding are compared with exact values obtained using an elastic slowing-down calculation where each resonance is modeled individually in the resolved energy domain

  18. Mining geriatric assessment data for in-patient fall prediction models and high-risk subgroups

    OpenAIRE

    Marschollek, Michael; Gövercin, Mehmet; Rust, Stefan; Gietzelt, Matthias; Schulze, Mareike; Wolf, Klaus-Hendrik; Steinhagen-Thiessen, Elisabeth

    2012-01-01

    Abstract Background Hospital in-patient falls constitute a prominent problem in terms of costs and consequences. Geriatric institutions are most often affected, and common screening tools cannot predict in-patient falls consistently. Our objectives are to derive comprehensible fall risk classification models from a large data set of geriatric in-patients' assessment data and to evaluate their predictive performance (aim#1), and to identify high-risk subgroups from the data (aim#2). Methods A ...

  19. Addressing the hidden curriculum in the clinical workplace: A practical tool for trainees and faculty.

    Science.gov (United States)

    Mulder, Hanneke; Ter Braak, Edith; Chen, H Carrie; Ten Cate, Olle

    2018-02-28

    The hidden curriculum, commonly described in negative terms, is considered highly influential in medical education, especially in the clinical workplace. Structured approaches to address it are limited in number and scope. This paper presents a practical, value-neutral method called REVIEW (Reflecting & Evaluating Values Implicit in Education in the Workplace), to facilitate reflection and discussion on the hidden curriculum by faculty members and trainees. REVIEW approaches the hidden curriculum as a reflection of the professional microculture of a clinical team. This microculture results from collective problem solving and mutual negotiation when facing different, often conflicting, demands and interests, and their underlying values in daily clinical practice. Using this nonjudgmental conceptual framework, REVIEW employs a series of 50 culture statements that must be prioritized using Q-sort methodology, reflecting how the culture in a particular clinical context (e.g. ward or department) is perceived by faculty members and trainees. This procedure can be done individually or in groups. Most important is the resulting team discussion after the exercise - a discussion about perceptions of actual team culture and the culture desired by the team. Our early experiences suggest that REVIEW can be a useful tool for addressing the hidden curriculum.

  20. Summary of the activities of the subgroup on data acquisition and processing

    International Nuclear Information System (INIS)

    Connolly, P.L.; Doughty, D.C.; Elias, J.E.

    1981-01-01

    A data acquisition and handling subgroup consisting of approximately 20 members met during the 1981 ISABELLE summer study. Discussions were led by members of the BNL ISABELLE Data Acquisition Group (DAG) with lively participation from outside users. Particularly large contributions were made by representatives of BNL experiments 734, 735, and the MPS, as well as the Fermilab Colliding Detector Facility and the SLAC LASS Facility. In contrast to the 1978 study, the subgroup did not divide its activities into investigations of various individual detectors, but instead attempted to review the current state-of-the-art in the data acquisition, trigger processing, and data handling fields. A series of meetings first reviewed individual pieces of the problem, including status of the Fastbus Project, the Nevis trigger processor, the SLAC 168/E and 3081/E emulators, and efforts within DAG. Additional meetings dealt with the question involving specifying and building complete data acquisition systems. For any given problem, a series of possible solutions was proposed by the members of the subgroup. In general, any given solution had both advantages and disadvantages, and there was never any consensus on which approach was best. However, there was agreement that certain problems could only be handled by systems of a given power or greater. what will be given here is a review of various solutions with associated powers, costs, advantages, and disadvantages

  1. A Stochastic Flows Approach for Asset Allocation with Hidden Economic Environment

    Directory of Open Access Journals (Sweden)

    Tak Kuen Siu

    2015-01-01

    Full Text Available An optimal asset allocation problem for a quite general class of utility functions is discussed in a simple two-state Markovian regime-switching model, where the appreciation rate of a risky share changes over time according to the state of a hidden economy. As usual, standard filtering theory is used to transform a financial model with hidden information into one with complete information, where a martingale approach is applied to discuss the optimal asset allocation problem. Using a martingale representation coupled with stochastic flows of diffeomorphisms for the filtering equation, the integrand in the martingale representation is identified which gives rise to an optimal portfolio strategy under some differentiability conditions.

  2. Reports of MC and A system design workshop subgroups

    International Nuclear Information System (INIS)

    Hatcher, C.R.

    1984-01-01

    A summary of subgroup reports from the workshop on design of a materials control and accounting system for a low-enrichment fuel fabrication facility is presented. Responses to a MC and A design system questionnaire are also summarized

  3. Microwave background constraints on mixing of photons with hidden photons

    International Nuclear Information System (INIS)

    Mirizzi, Alessandro; Redondo, Javier; Sigl, Guenter

    2008-12-01

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle χ 0 -7 - 10 -5 for hidden photon masses between 10 -14 eV and 10 -7 eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  4. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  5. The central subgroup of the nonabelian tensor square of Bieberbach ...

    African Journals Online (AJOL)

    A Bieberbach group with point group C2 xC2 is a free torsion crystallographic group. A central subgroup of a nonabelian tensor square of a group G, denoted by ∇(G) is a normal subgroup generated by generator g⊗g for all g∈G and essentially depends on the abelianization of the group. In this paper, the formula of the ...

  6. Demonstration of Microbial Subgroups among Normal Vaginal Microbiota Data

    OpenAIRE

    Lee, M.-L. T.

    2011-01-01

    In this study we identified subgroups of observations relating to the healthy vaginal microbiota. This microbiota resides in a dynamic environment that undergoes cyclic change during the menstrual cycle. Cluster analysis procedures were applied to divide a set of 226 normal microbiota observations into groups. Three subgroups containing 100, 65, and 61 observations were identified. Plots of principal components determined by canonical analysis were obtained to demonstrate graphically the clus...

  7. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  8. Fuzzy Modeled K-Cluster Quality Mining of Hidden Knowledge for Decision Support

    OpenAIRE

    S. Parkash  Kumar; K. S. Ramaswami

    2011-01-01

    Problem statement: The work presented Fuzzy Modeled K-means Cluster Quality Mining of hidden knowledge for Decision Support. Based on the number of clusters, number of objects in each cluster and its cohesiveness, precision and recall values, the cluster quality metrics is measured. The fuzzy k-means is adapted approach by using heuristic method which iterates the cluster to form an efficient valid cluster. With the obtained data clusters, quality assessment is made by predictive mining using...

  9. On Throughput Improvement of Wireless Ad Hoc Networks with Hidden Nodes

    Science.gov (United States)

    Choi, Hong-Seok; Lim, Jong-Tae

    In this letter, we present the throughput analysis of the wireless ad hoc networks based on the IEEE 802.11 MAC (Medium Access Control). Especially, our analysis includes the case with the hidden node problem so that it can be applied to the multi-hop networks. In addition, we suggest a new channel access control algorithm to maximize the network throughput and show the usefulness of the proposed algorithm through simulations.

  10. Compressing the hidden variable space of a qubit

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of single realizations is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with quantum states satisfy reasonable criteria of regularity. Possible generalizations of this shrinking to an N-dimensional Hilbert space are discussed.

  11. Zipf exponent of trajectory distribution in the hidden Markov model

    Science.gov (United States)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  12. Zipf exponent of trajectory distribution in the hidden Markov model

    International Nuclear Information System (INIS)

    Bochkarev, V V; Lerner, E Yu

    2014-01-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different

  13. Hidden acoustic information revealed by intentional nonlinearity

    Science.gov (United States)

    Dowling, David R.

    2017-11-01

    Acoustic waves are omnipresent in modern life and are well described by the linearized equations of fluid dynamics. Once generated, acoustic waves carry and collect information about their source and the environment through which they propagate, respectively, and this information may be retrieved by analyzing recordings of these waves. Because of this, acoustics is the primary means for observation, surveillance, reconnaissance, and remote sensing in otherwise opaque environments, such as the Earth's oceans and crust, and the interior of the human body. For such information-retrieval tasks, acoustic fields are nearly always interrogated within their recorded frequency range or bandwidth. However, this frequency-range restriction is not general; acoustic fields may also carry (hidden) information at frequencies outside their bandwidth. Although such a claim may seem counter intuitive, hidden acoustic-field information can be revealed by re-introducing a marquee trait of fluid dynamics: nonlinearity. In particular, an intentional quadratic nonlinearity - a form of intra-signal heterodyning - can be used to obtain acoustic field information at frequencies outside a recorded acoustic field's bandwidth. This quadratic nonlinearity enables a variety of acoustic remote sensing applications that were long thought to be impossible. In particular, it allows the detrimental effects of sparse recordings and random scattering to be suppressed when the original acoustic field has sufficient bandwidth. In this presentation, the topic is developed heuristically, with a just brief exposition of the relevant mathematics. Hidden acoustic field information is then revealed from simulated and measured acoustic fields in simple and complicated acoustic environments involving frequencies from a few Hertz to more than 100 kHz, and propagation distances from tens of centimeters to hundreds of kilometers. Sponsored by ONR, NAVSEA, and NSF.

  14. Recovering a hidden polarization by ghost polarimetry.

    Science.gov (United States)

    Janassek, Patrick; Blumenstein, Sébastien; Elsäßer, Wolfgang

    2018-02-15

    By exploiting polarization correlations of light from a broadband fiber-based amplified spontaneous emission source we succeed in reconstructing a hidden polarization in a ghost polarimetry experiment in close analogy to ghost imaging and ghost spectroscopy. Thereby, an original linear polarization state in the object arm of a Mach-Zehnder interferometer configuration which has been camouflaged by a subsequent depolarizer is recovered by correlating it with light from a reference beam. The variation of a linear polarizer placed inside the reference beam results in a Malus law type second-order intensity correlation with high contrast, thus measuring a ghost polarigram.

  15. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  16. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  17. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  18. The hidden face of the petroleum

    International Nuclear Information System (INIS)

    Laurent, E.

    2006-02-01

    For the first time, a book reveals what that was hidden to the public opinions: why the petroleum crisis of 1973 what only a manipulation, an arrangement between the OPEC and the petroleum companies, why the data concerning the petroleum reserves are wrong and increased by the producers countries, how Washington used the Saudi petroleum weapon to create the Soviet Union fall, and why from march 2001 maps of the Iraq (where were drawn the future petroleum explorations) were working documents for the vice President Cheney and petroleum managers for the ''secret society''. (A.L.B.)

  19. The hidden costs of nuclear power

    International Nuclear Information System (INIS)

    Keough, C.

    1981-01-01

    The two basic hidden costs of nuclear power are public money and public health. Nuclear power appears to be economical because many of the costs of producins electricity in these plants are paid by the federal government. So, like it or not, the citizens are footing the bill with their taxes. Design and development of plants have been paid for with public money, and disposal and cleanup costs will also be paid in this manner. The economic and health costs associated with nuclear accidents are staggering

  20. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The estimation of the HMM is conducted using a variant of the Iterative Conditional Expectation-Generalized Mixture (ICE-GEMI) algorithm proposed by Delignon et al. (1997), that permits analysis of the conditional distributions of economic data and allows for different functional forms across regimes...

  1. Harnessing the Hidden Curriculum: A Four-Step Approach to Developing and Reinforcing Reflective Competencies in Medical Clinical Clerkship

    Science.gov (United States)

    Holmes, Cheryl L.; Harris, Ilene B.; Schwartz, Alan J.; Regehr, Glenn

    2015-01-01

    Changing the culture of medicine through the education of medical students has been proposed as a solution to the intractable problems of our profession. Yet few have explored the issues associated with making students partners in this change. There is a powerful hidden curriculum that perpetuates not only desired attitudes and behaviors but also…

  2. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index

    Science.gov (United States)

    Stevens, Gretchen A.; Ezzati, Majid; Black, Robert E.; Kraemer, Klaus

    2015-01-01

    Background Deficiencies in essential vitamins and minerals–also termed hidden hunger–are pervasive and hold negative consequences for the cognitive and physical development of children. Methods This analysis evaluates the change in hidden hunger over time in the form of one composite indicator–the Hidden Hunger Index (HHI)–using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency). Net changes from 1995–2011 and population weighted regional means for various time periods are measured. Findings Globally, hidden hunger improved (-6.7 net change in HHI) from 1995–2011. Africa was the only region to see a deterioration in hidden hunger (+1.9) over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0), while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased. Interpretation This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs). However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda. Funding Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish. PMID:26673631

  3. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index.

    Directory of Open Access Journals (Sweden)

    Julie C Ruel-Bergeron

    Full Text Available Deficiencies in essential vitamins and minerals-also termed hidden hunger-are pervasive and hold negative consequences for the cognitive and physical development of children.This analysis evaluates the change in hidden hunger over time in the form of one composite indicator-the Hidden Hunger Index (HHI-using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency. Net changes from 1995-2011 and population weighted regional means for various time periods are measured.Globally, hidden hunger improved (-6.7 net change in HHI from 1995-2011. Africa was the only region to see a deterioration in hidden hunger (+1.9 over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0, while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased.This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs. However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda.Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish.

  4. Hidden in plain sight: the formal, informal, and hidden curricula of a psychiatry clerkship.

    Science.gov (United States)

    Wear, Delese; Skillicorn, Jodie

    2009-04-01

    To examine perceptions of the formal, informal, and hidden curricula in psychiatry as they are observed and experienced by (1) attending physicians who have teaching responsibilities for residents and medical students, (2) residents who are taught by those same physicians and who have teaching responsibilities for medical students, and (3) medical students who are taught by attendings and residents during their psychiatry rotation. From June to November 2007, the authors conducted focus groups with attendings, residents, and students in one midwestern academic setting. The sessions were audiotaped, transcribed, and analyzed for themes surrounding the formal, informal, and hidden curricula. All three groups offered a similar belief that the knowledge, skills, and values of the formal curriculum focused on building relationships. Similarly, all three suggested that elements of the informal and hidden curricula were expressed primarily as the values arising from attendings' role modeling, as the nature and amount of time attendings spend with patients, and as attendings' advice arising from experience and intuition versus "textbook learning." Whereas students and residents offered negative values arising from the informal and hidden curricula, attendings did not, offering instead the more positive values they intended to encourage through the informal and hidden curricula. The process described here has great potential in local settings across all disciplines. Asking teachers and learners in any setting to think about how they experience the educational environment and what sense they make of all curricular efforts can provide a reality check for educators and a values check for learners as they critically reflect on the meanings of what they are learning.

  5. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  6. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier, E-mail: redondo@mpp.mpg.de [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza, España (Spain)

    2015-07-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  7. Bayesian structural inference for hidden processes

    Science.gov (United States)

    Strelioff, Christopher C.; Crutchfield, James P.

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ɛ-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ɛ-machines, irrespective of estimated transition probabilities. Properties of ɛ-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  8. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  9. Hidden ion population of the magnetosphere

    International Nuclear Information System (INIS)

    Olsen, R.C.

    1982-01-01

    Particle data from two geosynchronous satellites (Applied Technology Satellite 6 and SCATHA) show a normally hidden ion population appearing when the satellites are in the earth's shadow. Ion and electron data show the spacecraft potential dropping from +10 V in sunlight to +4 and +5 V in eclipse at local midnight, in low-energy (T/sub e/ -2 ), isotropic ion population appears which was invisible in sunlight because of the larger positive spacecraft potential. Higher-energy populations generally cover the tails of the hidden ion populations, so they cannot be inferred from daylight data. The isotropic populations appears only in a few percent of the spacecraft eclipse events, appearing only at times of low Kp (2 or less, preceded by a day with Σ Kp< or =20). A low-energy (T = 1--2 eV) field-aligned population often appears with and without the isotropic population, at slightly higher flux levels. These fluxes are visible in sunlight, but again the distribution functions obtained in eclipse differ from those that would be inferred from daylight data. Measurement of the thermal plasma population on a consistent basis, particularly in the plasma sheet, will require some method of controlling the detector potential with respect to the ambient plamsa

  10. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  11. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  12. Pentaquarks with hidden charm as hadroquarkonia

    Energy Technology Data Exchange (ETDEWEB)

    Eides, Michael I. [University of Kentucky, Department of Physics and Astronomy, Lexington, KY (United States); Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Petrov, Victor Yu. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Polyakov, Maxim V. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Ruhr-Universitaet Bochum, Institut fuer Theoretische Physik II, Bochum (Germany)

    2018-01-15

    We consider hidden charm pentaquarks as hadroquarkonium states in a QCD inspired approach. Pentaquarks arise naturally as bound states of quarkonia excitations and ordinary baryons. The LHCb P{sub c}(4450) pentaquark is interpreted as a ψ{sup '}-nucleon bound state with spin-parity J{sup P} = 3/2{sup -}. The partial decay width Γ(P{sub c}(4450) → J/ψ + N) ∼ 11 MeV is calculated and turned out to be in agreement with the experimental data for P{sub c}(4450). The P{sub c}(4450) pentaquark is predicted to be a member of one of the two almost degenerate hidden-charm baryon octets with spin-parities J{sup P} = 1/2{sup -}, 3/2{sup -}. The masses and decay widths of the octet pentaquarks are calculated. The widths are small and comparable with the width of the P{sub c}(4450) pentaquark, and the masses of the octet pentaquarks satisfy the Gell-Mann-Okubo relation. Interpretation of pentaquarks as loosely bound Σ{sub c} anti D* and Σ{sub c}{sup *} anti D* deuteronlike states is also considered. We determine quantum numbers of these bound states and calculate their masses in the one-pion exchange scenario. The hadroquarkonium and molecular approaches to exotic hadrons are compared and the relative advantages and drawbacks of each approach are discussed. (orig.)

  13. Low energy theorems of hidden local symmetries

    International Nuclear Information System (INIS)

    Harada, Masayasu; Kugo, Taichiro; Yamawaki, Koichi.

    1994-01-01

    We prove to all orders of the loop expansion the low energy theorems of hidden local symmetries in four-dimensional nonlinear sigma models based on the coset space G/H, with G and H being arbitrary compact groups. Although the models are non-renormalizable, the proof is done in an analogous manner to the renormalization proof of gauge theories and two-dimensional nonlinear sigma models by restricting ourselves to the operators with two derivatives (counting a hidden gauge boson field as one derivative), i.e., with dimension 2, which are the only operators relevant to the low energy limit. Through loop-wise mathematical induction based on the Ward-Takahashi identity for the BRS symmetry, we solve renormalization equation for the effective action up to dimension-2 terms plus terms with the relevant BRS sources. We then show that all the quantum corrections to the dimension-2 operators, including the finite parts as well as the divergent ones, can be entirely absorbed into a re-definition (renormalization) of the parameters and the fields in the dimension-2 part of the tree-level Lagrangian. (author)

  14. Black holes, hidden symmetries, and complete integrability.

    Science.gov (United States)

    Frolov, Valeri P; Krtouš, Pavel; Kubizňák, David

    2017-01-01

    The study of higher-dimensional black holes is a subject which has recently attracted vast interest. Perhaps one of the most surprising discoveries is a realization that the properties of higher-dimensional black holes with the spherical horizon topology and described by the Kerr-NUT-(A)dS metrics are very similar to the properties of the well known four-dimensional Kerr metric. This remarkable result stems from the existence of a single object called the principal tensor. In our review we discuss explicit and hidden symmetries of higher-dimensional Kerr-NUT-(A)dS black hole spacetimes. We start with discussion of the Killing and Killing-Yano objects representing explicit and hidden symmetries. We demonstrate that the principal tensor can be used as a "seed object" which generates all these symmetries. It determines the form of the geometry, as well as guarantees its remarkable properties, such as special algebraic type of the spacetime, complete integrability of geodesic motion, and separability of the Hamilton-Jacobi, Klein-Gordon, and Dirac equations. The review also contains a discussion of different applications of the developed formalism and its possible generalizations.

  15. Subgroup Analysis in Burnout: Relations Between Fatigue, Anxiety, and Depression

    Science.gov (United States)

    van Dam, Arno

    2016-01-01

    Several authors have suggested that burned out patients do not form a homogeneous group and that subgroups should be considered. The identification of these subgroups may contribute to a better understanding of the burnout construct and lead to more specific therapeutic interventions. Subgroup analysis may also help clarify whether burnout is a distinct entity and whether subgroups of burnout overlap with other disorders such as depression and chronic fatigue syndrome. In a group of 113 clinically diagnosed burned out patients, levels of fatigue, depression, and anxiety were assessed. In order to identify possible subgroups, we performed a two-step cluster analysis. The analysis revealed two clusters that differed from one another in terms of symptom severity on the three aforementioned measures. Depression appeared to be the strongest predictor of group membership. These results are considered in the light of the scientific debate on whether burnout can be distinguished from depression and whether burnout subtyping is useful. Finally, implications for clinical practice and future research are discussed. PMID:26869983

  16. Subgroup analysis in burnout: relations between fatigue, anxiety and depression

    Directory of Open Access Journals (Sweden)

    Arno eVan Dam

    2016-02-01

    Full Text Available Several authors have suggested that burned out patients do not form a homogeneous group and that subgroups should be considered. The identification of these subgroups may contribute to a better understanding of the burnout construct and lead to more specific therapeutic interventions. Subgroup analysis may also help clarify whether burnout is a distinct entity and whether subgroups of burnout overlap with other disorders such as depression and chronic fatigue syndrome. In a group of 113 clinically-diagnosed burned out patients, levels of fatigue, depression and anxiety were assessed. In order to identify possible subgroups, we performed a two-step cluster analysis. The analysis revealed two clusters that differed from one another in terms of symptom severity on the three aforementioned measures. Depression appeared to be the strongest predictor of group membership. These results are considered in the light of the scientific debate on whether burnout can be distinguished from depression and whether burnout subtyping is useful. Finally, implications for clinical practice and future research are discussed.

  17. Cluster analysis of clinical data identifies fibromyalgia subgroups.

    Directory of Open Access Journals (Sweden)

    Elisa Docampo

    Full Text Available INTRODUCTION: Fibromyalgia (FM is mainly characterized by widespread pain and multiple accompanying symptoms, which hinder FM assessment and management. In order to reduce FM heterogeneity we classified clinical data into simplified dimensions that were used to define FM subgroups. MATERIAL AND METHODS: 48 variables were evaluated in 1,446 Spanish FM cases fulfilling 1990 ACR FM criteria. A partitioning analysis was performed to find groups of variables similar to each other. Similarities between variables were identified and the variables were grouped into dimensions. This was performed in a subset of 559 patients, and cross-validated in the remaining 887 patients. For each sample and dimension, a composite index was obtained based on the weights of the variables included in the dimension. Finally, a clustering procedure was applied to the indexes, resulting in FM subgroups. RESULTS: VARIABLES CLUSTERED INTO THREE INDEPENDENT DIMENSIONS: "symptomatology", "comorbidities" and "clinical scales". Only the two first dimensions were considered for the construction of FM subgroups. Resulting scores classified FM samples into three subgroups: low symptomatology and comorbidities (Cluster 1, high symptomatology and comorbidities (Cluster 2, and high symptomatology but low comorbidities (Cluster 3, showing differences in measures of disease severity. CONCLUSIONS: We have identified three subgroups of FM samples in a large cohort of FM by clustering clinical data. Our analysis stresses the importance of family and personal history of FM comorbidities. Also, the resulting patient clusters could indicate different forms of the disease, relevant to future research, and might have an impact on clinical assessment.

  18. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  19. Asymptotics for Estimating Equations in Hidden Markov Models

    DEFF Research Database (Denmark)

    Hansen, Jørgen Vinsløv; Jensen, Jens Ledet

    Results on asymptotic normality for the maximum likelihood estimate in hidden Markov models are extended in two directions. The stationarity assumption is relaxed, which allows for a covariate process influencing the hidden Markov process. Furthermore a class of estimating equations is considered...

  20. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  1. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  2. Hidden symmetries in minimal five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, Markus; Silva, Sebastian

    2004-01-01

    We study the hidden symmetries arising in the dimensional reduction of d=5, N=2 supergravity to three dimensions. Extending previous partial results for the bosonic part, we give a derivation that includes fermionic terms, shedding light on the appearance of the local hidden symmetry SO(4) in the reduction

  3. Genetically meaningful phenotypic subgroups in autism spectrum disorders.

    Science.gov (United States)

    Veatch, O J; Veenstra-Vanderweele, J; Potter, M; Pericak-Vance, M A; Haines, J L

    2014-03-01

    Autism spectrum disorder (ASD) is a complex neurodevelopmental disorder with strong evidence for genetic susceptibility. However, the effect sizes for implicated chromosomal loci are small, hard to replicate and current evidence does not explain the majority of the estimated heritability. Phenotypic heterogeneity could be one phenomenon complicating identification of genetic factors. We used data from the Autism Diagnostic Interview-Revised, Autism Diagnostic Observation Schedule, Vineland Adaptive Behavior Scales, head circumferences, and ages at exams as classifying variables to identify more clinically similar subgroups of individuals with ASD. We identified two distinct subgroups of cases within the Autism Genetic Resource Exchange dataset, primarily defined by the overall severity of evaluated traits. In addition, there was significant familial clustering within subgroups (odds ratio, OR ≈ 1.38-1.42, P definition that should increase power to detect genetic factors influencing risk for ASD. © 2013 John Wiley & Sons Ltd and International Behavioural and Neural Genetics Society.

  4. Clebsch-Gordan coefficients of discrete groups in subgroup bases

    Science.gov (United States)

    Chen, Gaoli

    2018-04-01

    We express each Clebsch-Gordan (CG) coefficient of a discrete group as a product of a CG coefficient of its subgroup and a factor, which we call an embedding factor. With an appropriate definition, such factors are fixed up to phase ambiguities. Particularly, they are invariant under basis transformations of irreducible representations of both the group and its subgroup. We then impose on the embedding factors constraints, which relate them to their counterparts under complex conjugate and therefore restrict the phases of embedding factors. In some cases, the phase ambiguities are reduced to sign ambiguities. We describe the procedure of obtaining embedding factors and then calculate CG coefficients of the group 𝒫𝒮ℒ2(7) in terms of embedding factors of its subgroups S4 and 𝒯7.

  5. For whom does it work? Subgroup differences in the effects of a school-based universal prevention program

    NARCIS (Netherlands)

    Spilt, J.L.; Koot, H.M.; van Lier, P.A.C.

    2013-01-01

    This study examined subgroup differences in the effectiveness of a universal classroom-based preventive intervention. The Good Behavior Game (GBG) was delivered in Grade 1 and 2 in a randomized controlled trial including 759 students. Changes in externalizing and internalizing problems were modeled

  6. Research on hidden variable theories: A review of recent progresses

    International Nuclear Information System (INIS)

    Genovese, Marco

    2005-01-01

    Quantum Mechanics (QM) is one of the pillars of modern physics: an impressive amount of experiments have confirmed this theory and many technological applications are based on it. Nevertheless, at one century since its development, various aspects concerning its very foundations still remain to be clarified. Among them, the transition from a microscopic probabilistic world into a macroscopic deterministic one and quantum non-locality. A possible way out from these problems would be if QM represents a statistical approximation of an unknown deterministic theory. This review is addressed to present the most recent progresses on the studies related to hidden variable theories (HVT), both from an experimental and a theoretical point of view, giving a larger emphasis to results with a direct experimental application. More in details, the first part of the review is a historical introduction to this problem. The Einstein-Podolsky-Rosen argument and the first discussions about HVT are introduced, describing the fundamental Bell's proposal for a general experimental test of every local HVT and the first attempts to realise it. The second part of the review is devoted to elucidate the recent progresses toward a conclusive Bell inequalities experiment obtained with entangled photons and other physical systems. Finally, the last sections are targeted to shortly discuss non-local HVT

  7. Hidden physics models: Machine learning of nonlinear partial differential equations

    Science.gov (United States)

    Raissi, Maziar; Karniadakis, George Em

    2018-03-01

    While there is currently a lot of enthusiasm about "big data", useful data is usually "small" and expensive to acquire. In this paper, we present a new paradigm of learning partial differential equations from small data. In particular, we introduce hidden physics models, which are essentially data-efficient learning machines capable of leveraging the underlying laws of physics, expressed by time dependent and nonlinear partial differential equations, to extract patterns from high-dimensional data generated from experiments. The proposed methodology may be applied to the problem of learning, system identification, or data-driven discovery of partial differential equations. Our framework relies on Gaussian processes, a powerful tool for probabilistic inference over functions, that enables us to strike a balance between model complexity and data fitting. The effectiveness of the proposed approach is demonstrated through a variety of canonical problems, spanning a number of scientific domains, including the Navier-Stokes, Schrödinger, Kuramoto-Sivashinsky, and time dependent linear fractional equations. The methodology provides a promising new direction for harnessing the long-standing developments of classical methods in applied mathematics and mathematical physics to design learning machines with the ability to operate in complex domains without requiring large quantities of data.

  8. Research on hidden variable theories: A review of recent progresses

    Energy Technology Data Exchange (ETDEWEB)

    Genovese, Marco [Istituto Elettrotecnico Nazionale Galileo Ferraris, Strada delle Cacce 91, 10135 Torino (Italy)]. E-mail: genovese@ien.it

    2005-07-01

    Quantum Mechanics (QM) is one of the pillars of modern physics: an impressive amount of experiments have confirmed this theory and many technological applications are based on it. Nevertheless, at one century since its development, various aspects concerning its very foundations still remain to be clarified. Among them, the transition from a microscopic probabilistic world into a macroscopic deterministic one and quantum non-locality. A possible way out from these problems would be if QM represents a statistical approximation of an unknown deterministic theory. This review is addressed to present the most recent progresses on the studies related to hidden variable theories (HVT), both from an experimental and a theoretical point of view, giving a larger emphasis to results with a direct experimental application. More in details, the first part of the review is a historical introduction to this problem. The Einstein-Podolsky-Rosen argument and the first discussions about HVT are introduced, describing the fundamental Bell's proposal for a general experimental test of every local HVT and the first attempts to realise it. The second part of the review is devoted to elucidate the recent progresses toward a conclusive Bell inequalities experiment obtained with entangled photons and other physical systems. Finally, the last sections are targeted to shortly discuss non-local HVT.

  9. Eating disorders: a hidden phenomenon in outpatient mental health?

    Science.gov (United States)

    Fursland, Anthea; Watson, Hunna J

    2014-05-01

    Eating disorders are common but underdiagnosed illnesses. Help-seeking for co-occurring issues, such as anxiety and depression, are common. To identify the prevalence of eating problems, using the SCOFF, and eating disorders when screening positive on the SCOFF (i.e., ≥2), among patients seeking help for anxiety and depression at a community-based mental health service. Patients (N = 260) consecutively referred and assessed for anxiety and depression treatment were administered the SCOFF screening questionnaire and a semi-structured standardized diagnostic interview during routine intake. 18.5% (48/260) scored ≥2 on the SCOFF, indicating eating problems. Of these, 41% (19/48) met criteria for an eating disorder. Thus, overall, 7.3% (19/260) of the sample met criteria for a DSM-IV eating disorder. Those scoring ≥2 on the SCOFF were more likely to: be female (p = 0.001), younger (p = 0.003), and have a history of self-harm (p eating disorders are a hidden phenomenon in general outpatient mental health. By using a standardized diagnostic interview to establish diagnosis rather than self- or staff-report, the study builds on limited previous findings. The naturalistic study setting shows that screening for eating disorders can be easily built into routine intake practice, and successfully identifies treatment need. Copyright © 2013 Wiley Periodicals, Inc.

  10. Clustering Multivariate Time Series Using Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Shima Ghassempour

    2014-03-01

    Full Text Available In this paper we describe an algorithm for clustering multivariate time series with variables taking both categorical and continuous values. Time series of this type are frequent in health care, where they represent the health trajectories of individuals. The problem is challenging because categorical variables make it difficult to define a meaningful distance between trajectories. We propose an approach based on Hidden Markov Models (HMMs, where we first map each trajectory into an HMM, then define a suitable distance between HMMs and finally proceed to cluster the HMMs with a method based on a distance matrix. We test our approach on a simulated, but realistic, data set of 1,255 trajectories of individuals of age 45 and over, on a synthetic validation set with known clustering structure, and on a smaller set of 268 trajectories extracted from the longitudinal Health and Retirement Survey. The proposed method can be implemented quite simply using standard packages in R and Matlab and may be a good candidate for solving the difficult problem of clustering multivariate time series with categorical variables using tools that do not require advanced statistic knowledge, and therefore are accessible to a wide range of researchers.

  11. May Stakeholders be Involved in Design Without Informed Consent? The Case of Hidden Design.

    Science.gov (United States)

    Pols, A J K

    2017-06-01

    Stakeholder involvement in design is desirable from both a practical and an ethical point of view. It is difficult to do well, however, and some problems recur again and again, both of a practical nature, e.g. stakeholders acting strategically rather than openly, and of an ethical nature, e.g. power imbalances unduly affecting the outcome of the process. Hidden Design has been proposed as a method to deal with the practical problems of stakeholder involvement. It aims to do so by taking the observation of stakeholder actions, rather than the outcomes of a deliberative process, as its input. Furthermore, it hides from stakeholders the fact that a design process is taking place so that they will not behave differently than they otherwise would. Both aspects of Hidden Design have raised ethical worries. In this paper I make an ethical analysis of what it means for a design process to leave participants uninformed or deceived rather than acquiring their informed consent beforehand, and to use observation of actions rather than deliberation as input for design, using Hidden Design as a case study. This analysis is based on two sets of normative guidelines: the ethical guidelines for psychological research involving deception or uninformed participants from two professional psychological organisations, and Habermasian norms for a fair and just (deliberative) process. It supports the conclusion that stakeholder involvement in design organised in this way can be ethically acceptable, though under a number of conditions and constraints.

  12. Hidden Markov models and other machine learning approaches in computational molecular biology

    Energy Technology Data Exchange (ETDEWEB)

    Baldi, P. [California Inst. of Tech., Pasadena, CA (United States)

    1995-12-31

    This tutorial was one of eight tutorials selected to be presented at the Third International Conference on Intelligent Systems for Molecular Biology which was held in the United Kingdom from July 16 to 19, 1995. Computational tools are increasingly needed to process the massive amounts of data, to organize and classify sequences, to detect weak similarities, to separate coding from non-coding regions, and reconstruct the underlying evolutionary history. The fundamental problem in machine learning is the same as in scientific reasoning in general, as well as statistical modeling: to come up with a good model for the data. In this tutorial four classes of models are reviewed. They are: Hidden Markov models; artificial Neural Networks; Belief Networks; and Stochastic Grammars. When dealing with DNA and protein primary sequences, Hidden Markov models are one of the most flexible and powerful alignments and data base searches. In this tutorial, attention is focused on the theory of Hidden Markov Models, and how to apply them to problems in molecular biology.

  13. Considerations for subgroups and phenocopies in complex disease genetics.

    Directory of Open Access Journals (Sweden)

    Ryan Ramanujam

    Full Text Available The number of identified genetic variants associated to complex disease cannot fully explain heritability. This may be partially due to more complicated patterns of predisposition than previously suspected. Diseases such as multiple sclerosis (MS may consist of multiple disease causing mechanisms, each comprised of several elements. We describe how the effect of subgroups can be calculated using the standard association measurement odds ratio, which is then manipulated to provide a formula for the true underlying association present within the subgroup. This is sensitive to the initial minor allele frequencies present in both cases and the subgroup of patients. The methodology is then extended to the χ(2 statistic, for two related scenarios. First, to determine the true χ(2 when phenocopies or disease subtypes reduce association and are reclassified as controls when calculating statistics. Here, the χ(2 is given by (1 + σ * (a + b/(c + d/(1 - σ, or (1 + σ/(1 - σ for equal numbers of cases and controls. Second, when subgroups corresponding to heterogeneity mask the true effect size, but no reclassification is made. Here, the proportion increase in total sample size required to attain the same χ(2 statistic as the subgroup is given as γ = (1 - σ/2/((1 - σ(1 - σc/(a + c(1 - σd/(b + d, and a python script to calculate and plot this value is provided at kirc.se. Practical examples show how in a study of modest size (1000 cases and 1000 controls, a non-significant SNP may exceed genome-wide significance when corresponding to a subgroup of 20% of cases, and may occur in heterozygous form in all cases. This methodology may explain the modest association found in diseases such as MS wherein heterogeneity confounds straightforward measurement of association.

  14. Abelian hidden sectors at a GeV

    International Nuclear Information System (INIS)

    Morrissey, David E.; Poland, David; Zurek, Kathryn M.

    2009-01-01

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1) x gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  15. Subgroups of some Fuchsian groups defined by two linear congruences

    Science.gov (United States)

    Yayenie, Omer

    In this article we define a new family of subgroups of Fuchsian groups H(√{m}) , for a squarefree positive integer m , and calculate their index in H(√{m}) and their parabolic class number. Moreover, we will show that the index of these subgroups is closely related to the solvability of a quadratic congruence x2≡ m(mod n) and the number of inequivalent solutions of a quadratic congruence x2≡ 1(mod n) . Finally, we will show that the results obtained by Yilmaz and Keskin [Acta Math. Sin 25 (2005), 215-222] are immediate corollaries of one of the main theorems of this article.

  16. Identities on maximal subgroups of GLn(D)

    International Nuclear Information System (INIS)

    Kiani, D.; Mahdavi-Hezavehi, M.

    2002-04-01

    Let D be a division ring with centre F. Assume that M is a maximal subgroup of GL n (D), n≥1 such that Z(M) is algebraic over F. Group identities on M and polynomial identities on the F-linear hull F[M] are investigated. It is shown that if F[M] is a PI-algebra, then [D:F] n (D) and M is a maximal subgroup of N. If M satisfies a group identity, it is shown that M is abelian-by-finite. (author)

  17. Subgroups of class groups of algebraic quadratic function fields

    International Nuclear Information System (INIS)

    Wang Kunpeng; Zhang Xianke

    2001-09-01

    Ideal class groups H(K) of algebraic quadratic function fields K are studied, by using mainly the theory of continued fractions of algebraic functions. Properties of such continued fractions are discussed first. Then a necessary and sufficient condition is given for the class group H(K) to contain a cyclic subgroup of any order n, this criterion condition holds true for both real and imaginary fields K. Furthermore, several series of function fields K, including real, inertia imaginary, as well as ramified imaginary quadratic function fields, are given, and their class groups H(K) are proved to contain cyclic subgroups of order n. (author)

  18. A Convergent Differential Evolution Algorithm with Hidden Adaptation Selection for Engineering Optimization

    Directory of Open Access Journals (Sweden)

    Zhongbo Hu

    2014-01-01

    Full Text Available Many improved differential Evolution (DE algorithms have emerged as a very competitive class of evolutionary computation more than a decade ago. However, few improved DE algorithms guarantee global convergence in theory. This paper developed a convergent DE algorithm in theory, which employs a self-adaptation scheme for the parameters and two operators, that is, uniform mutation and hidden adaptation selection (haS operators. The parameter self-adaptation and uniform mutation operator enhance the diversity of populations and guarantee ergodicity. The haS can automatically remove some inferior individuals in the process of the enhancing population diversity. The haS controls the proposed algorithm to break the loop of current generation with a small probability. The breaking probability is a hidden adaptation and proportional to the changes of the number of inferior individuals. The proposed algorithm is tested on ten engineering optimization problems taken from IEEE CEC2011.

  19. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  20. … To be hidden does not mean to be merely revealed – Part 1 Artistic research on hidden curriculum

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-09-01

    Full Text Available This text revisits the long-term project Hidden Curriculum, initiated by Annette Krauss. The project addresses unquestioned routines, hierarchies of knowledge (part 1, and the role of the body in learning processes (part 2 from the perspective of secondary/high school education (in the research on a hidden curriculum. A deeper analysis of educational studies on the phenomenon of ‘hidden curriculum’ in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire, and Jacques Rancière brings forward important insights generated through the artistic research within hidden curriculum. The aim of this text is to address academic canons, corporeality, and investigate everyday norms through revisiting the framework, results, and processes of the collaborative research into hidden curriculum with secondary high school students.

  1. Dynamic portfolio optimization across hidden market regimes

    DEFF Research Database (Denmark)

    Nystrup, Peter; Madsen, Henrik; Lindström, Erik

    2017-01-01

    Regime-based asset allocation has been shown to add value over rebalancing to static weights and, in particular, reduce potential drawdowns by reacting to changes in market conditions. The predominant approach in previous studies has been to specify in advance a static decision rule for changing...... the allocation based on the state of financial markets or the economy. In this article, model predictive control (MPC) is used to dynamically optimize a portfolio based on forecasts of the mean and variance of financial returns from a hidden Markov model with time-varying parameters. There are computational...... than a buy-and-hold investment in various major stock market indices. This is after accounting for transaction costs, with a one-day delay in the implementation of allocation changes, and with zero-interest cash as the only alternative to the stock indices. Imposing a trading penalty that reduces...

  2. Supersymmetric leptogenesis with a light hidden sector

    International Nuclear Information System (INIS)

    De Simone, Andrea

    2010-04-01

    Supersymmetric scenarios incorporating thermal leptogenesis as the origin of the observed matter-antimatter asymmetry generically predict abundances of the primordial elements which are in conflict with observations. In this paper we pro- pose a simple way to circumvent this tension and accommodate naturally ther- mal leptogenesis and primordial nucleosynthesis. We postulate the existence of a light hidden sector, coupled very weakly to the Minimal Supersymmetric Standard Model, which opens up new decay channels for the next-to-lightest supersymmetric particle, thus diluting its abundance during nucleosynthesis. We present a general model-independent analysis of this mechanism as well as two concrete realizations, and describe the relevant cosmological and astrophysical bounds and implications for this dark matter scenario. Possible experimental signatures at colliders and in cosmic-ray observations are also discussed. (orig.)

  3. Nuclear scissors modes and hidden angular momenta

    Energy Technology Data Exchange (ETDEWEB)

    Balbutsev, E. B., E-mail: balbuts@theor.jinr.ru; Molodtsova, I. V. [Joint Institute for Nuclear Research (Russian Federation); Schuck, P. [Université Paris-Sud, Institut de Physique Nucléaire, IN2P3–CNRS (France)

    2017-01-15

    The coupled dynamics of low-lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time-Dependent Hartree–Fock–Bogoliubov equations. The model of the harmonic oscillator including spin–orbit potential plus quadrupole–quadrupole and spin–spin interactions is considered. New low-lying spin-dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  4. Neuroevolution Mechanism for Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-12-01

    Full Text Available Hidden Markov Model (HMM is a statistical model based on probabilities. HMM is becoming one of the major models involved in many applications such as natural language
    processing, handwritten recognition, image processing, prediction systems and many more. In this research we are concerned with finding out the best HMM for a certain application domain. We propose a neuroevolution process that is based first on converting the HMM to a neural network, then generating many neural networks at random where each represents a HMM. We proceed by
    applying genetic operators to obtain new set of neural networks where each represents HMMs, and updating the population. Finally select the best neural network based on a fitness function.

  5. Improved hidden Markov model for nosocomial infections.

    Science.gov (United States)

    Khader, Karim; Leecaster, Molly; Greene, Tom; Samore, Matthew; Thomas, Alun

    2014-12-01

    We propose a novel hidden Markov model (HMM) for parameter estimation in hospital transmission models, and show that commonly made simplifying assumptions can lead to severe model misspecification and poor parameter estimates. A standard HMM that embodies two commonly made simplifying assumptions, namely a fixed patient count and binomially distributed detections is compared with a new alternative HMM that does not require these simplifying assumptions. Using simulated data, we demonstrate how each of the simplifying assumptions used by the standard model leads to model misspecification, whereas the alternative model results in accurate parameter estimates. © The Authors 2013. Published by Oxford University Press on behalf of the Institute of Mathematics and its Applications. All rights reserved.

  6. The elliptic genus and Hidden symmetry

    International Nuclear Information System (INIS)

    Jaffe, A.

    2001-01-01

    We study the elliptic genus (a partition function) in certain interacting, twist quantum field theories. Without twists, these theories have N=2 supersymmetry. The twists provide a regularization, and also partially break the supersymmetry. In spite of the regularization, one can establish a homotopy of the elliptic genus in a coupling parameter. Our construction relies on a priori estimates and other methods from constructive quantum field theory; this mathematical underpinning allows us to justify evaluating the elliptic genus at one endpoint of the homotopy. We obtain a version of Witten's proposed formula for the elliptic genus in terms of classical theta functions. As a consequence, the elliptic genus has a hidden SL(2,Z) symmetry characteristic of conformal theory, even though the underlying theory is not conformal. (orig.)

  7. Hidden conformal symmetry of extremal black holes

    International Nuclear Information System (INIS)

    Chen Bin; Long Jiang; Zhang Jiaju

    2010-01-01

    We study the hidden conformal symmetry of extremal black holes. We introduce a new set of conformal coordinates to write the SL(2,R) generators. We find that the Laplacian of the scalar field in many extremal black holes, including Kerr(-Newman), Reissner-Nordstrom, warped AdS 3 , and null warped black holes, could be written in terms of the SL(2,R) quadratic Casimir. This suggests that there exist dual conformal field theory (CFT) descriptions of these black holes. From the conformal coordinates, the temperatures of the dual CFTs could be read directly. For the extremal black hole, the Hawking temperature is vanishing. Correspondingly, only the left (right) temperature of the dual CFT is nonvanishing, and the excitations of the other sector are suppressed. In the probe limit, we compute the scattering amplitudes of the scalar off the extremal black holes and find perfect agreement with the CFT prediction.

  8. Exact solution of the hidden Markov processes

    Science.gov (United States)

    Saakian, David B.

    2017-11-01

    We write a master equation for the distributions related to hidden Markov processes (HMPs) and solve it using a functional equation. Thus the solution of HMPs is mapped exactly to the solution of the functional equation. For a general case the latter can be solved only numerically. We derive an exact expression for the entropy of HMPs. Our expression for the entropy is an alternative to the ones given before by the solution of integral equations. The exact solution is possible because actually the model can be considered as a generalized random walk on a one-dimensional strip. While we give the solution for the two second-order matrices, our solution can be easily generalized for the L values of the Markov process and M values of observables: We should be able to solve a system of L functional equations in the space of dimension M -1 .

  9. Hidden hunger or knowledge hunger? Nutritional knowledge, diet diversity and micronutrient intake in Rwanda: The case of Vitamin A

    OpenAIRE

    Okello, Julius J.; Sindi, Kirimi; Low, Jan; Shikuku, Kelvin M.

    2013-01-01

    The problem of hidden hunger has emerged as one of the major development issues alongside food security. This problem highlights the likelihood of households having access to inadequate amount of key micronutrients in a diet despite having access to adequate quantities of food. , This paper uses a recent detailed household consumption data to investigate households’ nutritional knowledge, the diversity of diets consumed, and the micronutrient uptake, focusing specifically on Vitamin A. The st...

  10. Social exclusion, health and hidden homelessness.

    Science.gov (United States)

    Watson, J; Crawley, J; Kane, D

    2016-10-01

    Homelessness and poverty are extreme forms of social exclusion which extend beyond the lack of physical or material needs. The purpose of this study was to explore and expand the concept of social exclusion within the social determinants of health perspective - to understand how the social environment, health behaviours and health status are associated with material and social deprivation. Fundamental qualitative description with tones of focused ethnography. Participants who identified as hidden homeless described their everyday living conditions and how these everyday conditions were impacted and influenced by their social environments, coping/health behaviours and current health status. Research Ethics Board approval was granted and informed consents were obtained from 21 participants prior to the completion of individual interviews. Qualitative content analysis examined the descriptions of men and women experiencing hidden homelessness. Participants described the 'lack of quality social interactions and supports' and their 'daily struggles of street life'. They also shared the 'pain of addiction' and how coping strategies influenced health. Participants were hopeful that their insights would 'better the health of homeless people' by helping shape public policy and funding of community resources that would reduce barriers and improve overall health. Health professionals who understand health behaviours as coping mechanisms for poor quality social environments can provide more comprehensive and holistic care. The findings of this study can be used to support the importance of housing as a key factor in the health and well-being of people experiencing poverty, homelessness and social exclusion; and consequently, reinforces the need for a national housing strategy. Copyright © 2016 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  11. Skyrmions with holography and hidden local symmetry

    International Nuclear Information System (INIS)

    Nawa, Kanabu; Hosaka, Atsushi; Suganuma, Hideo

    2009-01-01

    We study baryons as Skyrmions in holographic QCD with D4/D8/D8 multi-D brane system in type IIA superstring theory, and also in the nonlinear sigma model with hidden local symmetry. Comparing these two models, we find that the extra dimension and its nontrivial curvature can largely change the role of (axial) vector mesons for baryons in four-dimensional space-time. In the hidden local symmetry approach, the ρ-meson field as a massive Yang-Mills field has a singular configuration in Skyrmion, which gives a strong repulsion for the baryon as a stabilizer. When the a 1 meson is added in this approach, the stability of Skyrmion is lost by the cancellation of ρ and a 1 contributions. On the contrary, in holographic QCD, the ρ-meson field does not appear as a massive Yang-Mills field due to the extra dimension and its nontrivial curvature. We show that the ρ-meson field has a regular configuration in Skyrmion, which gives a weak attraction for the baryon in holographic QCD. We argue that Skyrmion with π, ρ, and a 1 mesons become stable due to the curved extra dimension and also the presence of the Skyrme term in holographic QCD. From this result, we also discuss the features of our truncated-resonance analysis on baryon properties with π and ρ mesons below the cutoff scale M KK ∼1 GeV in holographic QCD, which is compared with other 5D instanton analysis.

  12. Latino Male Ethnic Subgroups: Patterns in College Enrollment and Degree Completion

    Science.gov (United States)

    Ponjuan, Luis; Palomin, Leticia; Calise, Angela

    2015-01-01

    This chapter examines Latino male ethnic subgroups and their college enrollment and degree completion patterns. The chapter also offers recommendations to improve Latino male ethnic subgroups' educational achievement.

  13. The sociocommunicative deficit subgroup in anorexia nervosa: autism spectrum disorders and neurocognition in a community-based, longitudinal study

    OpenAIRE

    Anckarsäter, H.; Hofvander, B.; Billstedt, E.; Gillberg, I. C.; Gillberg, C.; Wentz, E.; Råstam, M.

    2011-01-01

    BACKGROUND: A subgroup of persons with anorexia nervosa (AN) have been proposed to have sociocommunicative problems corresponding to autism spectrum disorders [ASDs, i.e. DSM-IV pervasive developmental disorders (PDDs): autistic disorder, Asperger's disorder, PDD not otherwise specified (NOS)]. Here, clinical problems, personality traits, cognitive test results and outcome are compared across 16 subjects (32%) with teenage-onset AN who meet or have met ASD criteria (AN+ASD), 34 ASD-negati...

  14. Single-Phase Mail Survey Design for Rare Population Subgroups

    Science.gov (United States)

    Brick, J. Michael; Andrews, William R.; Mathiowetz, Nancy A.

    2016-01-01

    Although using random digit dialing (RDD) telephone samples was the preferred method for conducting surveys of households for many years, declining response and coverage rates have led researchers to explore alternative approaches. The use of address-based sampling (ABS) has been examined for sampling the general population and subgroups, most…

  15. Some topics on permutable subgroups in infinite groups

    OpenAIRE

    Ialenti, Roberto

    2017-01-01

    The aim of this thesis is to study permutability in different aspects of the theory of infinite groups. In particular, it will be studied the structure of groups in which all the members of a relevant system of subgroups satisfy a suitable generalized condition of permutability.

  16. Subgroup conflicts? Try the psychodramatic "double triad method".

    Science.gov (United States)

    Verhofstadt-Denève, Leni M F

    2012-04-01

    The present article suggests the application of a psychodramatic action method for tackling subgroup conflicts in which the direct dialogue between representatives of two opposing subgroups is prepared step by step through an indirect dialogue strategy within two triads, a strategy known as the Double Triad Method (DTM). In order to achieve integration in the group as a whole, it is important that all the members of both subgroups participate actively during the entire process. The first part of the article briefly explores the theoretical background, with a special emphasis on the Phenomenological-Dialectical Personality Model (Phe-Di PModel). In the second part, the DTM procedure is systematically described through its five action stages, each accompanied with 1) a spatial representation of the consecutive actions, 2) some illustrative statements for each stage, and 3) a theoretical interpretation of the dialectically involved personality dimensions in both protagonists. The article concludes with a discussion and suggestions for more extensive applications of the DTM method, including the question of its relationships to Agazarian's functional subgrouping, psychodrama, and sociodrama.

  17. On approximation of Lie groups by discrete subgroups

    Indian Academy of Sciences (India)

    2016-08-26

    Aug 26, 2016 ... The notion of approximation of Lie groups by discrete subgroups was introduced by Tôyama in Kodai Math. Sem. Rep. 1 (1949) 36–37 and investigated in detail by Kuranishi in Nagoya Math. J. 2 (1951) 63–71. It is known as a theorem of Tôyama that any connected Lie group approximated by discrete ...

  18. On approximation of Lie groups by discrete subgroups

    Indian Academy of Sciences (India)

    1Department of Mathematics, Faculty of Sciences at Sfax, University of Sfax,. Route Soukra ... Let S (G) denote the space of discrete co-compact subgroup of a Lie group G. We ..... For example, it suffices to apply the following fact: The mapping.

  19. electropherotypes and subgroups of group a rotaviruses circulating ...

    African Journals Online (AJOL)

    Emmanuel Ameh

    diarrhea caused by rotaviruses. The virus is a double stranded RNA (dsRNA) virus with 11 segments. Group A rotaviruses show a characteristic 4-2-3-2 pattern following electrophoresis. The VP6 subgroups, I and II exist. This work was carried out to study the prevalence of rotavirus infection among children 0-5 years with ...

  20. Non-meagre subgroups of reals disjoint with meagre sets

    Czech Academy of Sciences Publication Activity Database

    Kostana, Ziemowit

    2018-01-01

    Roč. 241, June (2018), s. 11-19 ISSN 0166-8641 Institutional support: RVO:67985840 Keywords : algebraic sum * Baire property * non-meaurable subgroup Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 0.377, year: 2016 https://www.sciencedirect.com/science/ article /pii/S0166864118300567

  1. Non-meagre subgroups of reals disjoint with meagre sets

    Czech Academy of Sciences Publication Activity Database

    Kostana, Ziemowit

    2018-01-01

    Roč. 241, June (2018), s. 11-19 ISSN 0166-8641 Institutional support: RVO:67985840 Keywords : algebraic sum * Baire property * non-meaurable subgroup Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 0.377, year: 2016 https://www. science direct.com/ science /article/pii/S0166864118300567

  2. Avian metapneumovirus subgroup C infection in chickens, China.

    Science.gov (United States)

    Wei, Li; Zhu, Shanshan; Yan, Xv; Wang, Jing; Zhang, Chunyan; Liu, Shuhang; She, Ruiping; Hu, Fengjiao; Quan, Rong; Liu, Jue

    2013-07-01

    Avian metapneumovirus causes acute respiratory tract infection and reductions in egg production in various avian species. We isolated and characterized an increasingly prevalent avian metapneumovirus subgroup C strain from meat-type commercial chickens with severe respiratory signs in China. Culling of infected flocks could lead to economic consequences.

  3. Avian Metapneumovirus Subgroup C Infection in Chickens, China

    OpenAIRE

    Wei, Li; Zhu, Shanshan; Yan, Xv; Wang, Jing; Zhang, Chunyan; Liu, Shuhang; She, Ruiping; Hu, Fengjiao; Quan, Rong; Liu, Jue

    2013-01-01

    Avian metapneumovirus causes acute respiratory tract infection and reductions in egg production in various avian species. We isolated and characterized an increasingly prevalent avian metapneumovirus subgroup C strain from meat-type commercial chickens with severe respiratory signs in China. Culling of infected flocks could lead to economic consequences.

  4. Notes on discrete subgroups of Möbius transformations

    Indian Academy of Sciences (India)

    Abstract. Jørgensen's inequality gives a necessary condition for a nonelementary two generator subgroup of SL(2, C) to be discrete. By embedding SL(2, C) into. ˆU(1, 1; H), we obtain a new type of Jørgensen's inequality, which is in terms of the coefficients of involved isometries. We provide an example to show that this ...

  5. High HIV prevalence among a high-risk subgroup of women attending sexually transmitted infection clinics in Pune, India.

    Science.gov (United States)

    Mehta, Shruti H; Gupta, Amita; Sahay, Seema; Godbole, Sheela V; Joshi, Smita N; Reynolds, Steven J; Celentano, David D; Risbud, Arun; Mehendale, Sanjay M; Bollinger, Robert C

    2006-01-01

    To investigate changes over a decade in prevalence and correlates of HIV among high-risk women attending sexually transmitted infection (STI) clinics in Pune, India, who deny a history of commercial sex work (CSW). Cross-sectional. From 1993 to 2002, 2376 women attending 3 STI clinics in Pune were offered HIV screening. Women who denied CSW were included (n = 1020). Of 1020 women, 21% were HIV infected. The annual HIV prevalence increased from 14% in 1993 to 29% in 2001-2002 (P women were older, more often employed, less likely to be currently married, and more likely to report condom use. In multivariate analysis, factors independently associated with HIV were calendar period (adjusted odds ratio [AOR], 1.9 for 1997-1999 vs. 1993-1996; 95% CI, 1.2-3.0; AOR, 2.3 for 2000-2002 vs. 1993-1996; 95% CI, 1.5-3.6), lack of formal education (AOR, 2.0; 95% CI, 1.4-2.9), having been widowed (AOR, 3.1; 95% CI, 1.6-6.1), current employment (AOR, 1.8; 95% CI, 1.2-2.6), and genital ulcer disease on examination (AOR, 1.8; 95% CI, 1.2-2.7). Women attending STI clinics in India who deny a history of CSW represent a small, hidden subgroup, likely put at risk for HIV because of high-risk behavior of their male partners, generally their husbands. Educational and awareness efforts that have targeted other subgroups in India (men and CSWs) should also focus on these hard-to-reach women. Risk reduction in this subgroup of Indian women would also be expected to reduce perinatal infections in India.

  6. Cluster Analysis of Clinical Data Identifies Fibromyalgia Subgroups

    Science.gov (United States)

    Docampo, Elisa; Collado, Antonio; Escaramís, Geòrgia; Carbonell, Jordi; Rivera, Javier; Vidal, Javier; Alegre, José

    2013-01-01

    Introduction Fibromyalgia (FM) is mainly characterized by widespread pain and multiple accompanying symptoms, which hinder FM assessment and management. In order to reduce FM heterogeneity we classified clinical data into simplified dimensions that were used to define FM subgroups. Material and Methods 48 variables were evaluated in 1,446 Spanish FM cases fulfilling 1990 ACR FM criteria. A partitioning analysis was performed to find groups of variables similar to each other. Similarities between variables were identified and the variables were grouped into dimensions. This was performed in a subset of 559 patients, and cross-validated in the remaining 887 patients. For each sample and dimension, a composite index was obtained based on the weights of the variables included in the dimension. Finally, a clustering procedure was applied to the indexes, resulting in FM subgroups. Results Variables clustered into three independent dimensions: “symptomatology”, “comorbidities” and “clinical scales”. Only the two first dimensions were considered for the construction of FM subgroups. Resulting scores classified FM samples into three subgroups: low symptomatology and comorbidities (Cluster 1), high symptomatology and comorbidities (Cluster 2), and high symptomatology but low comorbidities (Cluster 3), showing differences in measures of disease severity. Conclusions We have identified three subgroups of FM samples in a large cohort of FM by clustering clinical data. Our analysis stresses the importance of family and personal history of FM comorbidities. Also, the resulting patient clusters could indicate different forms of the disease, relevant to future research, and might have an impact on clinical assessment. PMID:24098674

  7. Differences in Psychosocial Predictors of Obesity Among LGBT Subgroups.

    Science.gov (United States)

    Warren, Jacob C; Smalley, K Bryant; Barefoot, K Nikki

    2016-08-01

    The purpose of the current study was to examine the overall presence of and differences in rates of overweight/obesity among a large, nationally diverse sample of lesbian, gay, bisexual, transgender (LGBT)-identified individuals (i.e., cisgender lesbians, cisgender gay men, cisgender bisexual women, cisgender bisexual men, transgender women, and transgender men) and to identify specific psychosocial predictors of obesity within each of the six LGBT subgroups. A total of 2702 LGBT-identified participants participated in the online study. Participants completed a series of demographic questions (including weight and height) and the Depression Anxiety Stress Scale 21. The percentage of participants who were overweight/obese did not differ significantly across LGBT subgroups, with 61.1% of the total sample being overweight/obese. However, the percentage of participants who self-reported body mass indexes in the obese range differed significantly across the six LGBT subgroups, with the highest prevalence in transgender men (46.0%). In addition, the predictors of obesity varied by subgroup, with age a significant predictor for cisgender lesbians, cisgender gay men, and cisgender bisexual women, relationship status for cisgender bisexual women, employment status for both cisgender gay men and cisgender bisexual women, education level for cisgender lesbians, and depression, anxiety, and stress for cisgender gay men. None of the examined psychosocial factors emerged as predictors of obesity for cisgender bisexual men, transgender women, or transgender men. These findings suggest that there are substantial variations in the presence and predictors of obesity across LGBT subgroups that support the need for culturally tailored healthy weight promotion efforts within the LGBT community.

  8. Clinical implications of medulloblastoma subgroups: incidence of CSF diversion surgery.

    Science.gov (United States)

    Schneider, Christian; Ramaswamy, Vijay; Kulkarni, Abhaya V; Rutka, James T; Remke, Marc; Tabori, Uri; Hawkins, Cynthia; Bouffet, Eric; Taylor, Michael D

    2015-03-01

    While medulloblastoma was initially thought to comprise a single homogeneous entity, it is now accepted that it in fact comprises 4 discrete subgroups, each with its own distinct demographics, clinical presentation, transcriptomics, genetics, and outcome. Hydrocephalus is a common complication of medulloblastoma and not infrequently requires CSF diversion. The authors report the incidence of CSF diversion surgery in each of the subgroups of medulloblastoma (Wnt, Shh, Group 3, and Group 4). The medical and imaging records for patients who underwent surgery for medulloblastoma at The Hospital for Sick Children were retrospectively reviewed. The primary outcome was the requirement for CSF diversion surgery either before or within 60 days of tumor resection. The modified Canadian Preoperative Prediction Rule for Hydrocephalus (mCPPRH) was compared among subgroups. Of 143 medulloblastoma patients, treated from 1991 to 2013, sufficient data were available for 130 patients (15 with Wnt, 30 with Shh, 30 with Group 3, and 55 with Group 4 medulloblastomas). Of these, 28 patients (22%) ultimately underwent CSF diversion surgery: 0% with Wnt, 29% with Shh, 29% with Group 3, and 43% with Group 4 tumors. Patients in the Wnt subgroup had a lower incidence of CSF diversion than all other patients combined (p = 0.04). Wnt patients had a lower mCPPRH score (lower risk of CSF diversion, p = 0.045), were older, had smaller ventricles at diagnosis, and had no leptomeningeal metastases. The overall rate of CSF diversion surgery for Shh, Group 3, and Group 4 medulloblastomas is around 30%, but no patients in the present series with a Wnt medulloblastoma required shunting. The low incidence of hydrocephalus in patients with Wnt medulloblastoma likely reflects both host factors (age) and disease factors (lack of metastases). The absence of hydrocephalus in patients with Wnt medulloblastomas likely contributes to their excellent rate of survival and may also contribute to a higher quality

  9. Hidden gauge structure of supersymmetric free differential algebras

    Energy Technology Data Exchange (ETDEWEB)

    Andrianopoli, Laura [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy); D’Auria, Riccardo [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); Ravera, Lucrezia [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy)

    2016-08-16

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q{sup ′} introduced in http://dx.doi.org/10.1016/0550-3213(82)90376-5 and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B{sup (2)} and B{sup (3)} in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of two nilpotent fermionic generators in the hidden algebra. We propose that our approach, where all the invariances of the FDA are expressed as Lie derivatives of the p-forms in the hidden supergroup manifold, could be an appropriate framework to discuss theories defined in enlarged versions of superspace recently considered in the literature, such us double field theory and its generalizations.

  10. The Second International Conference on Nutrition: Implications for Hidden Hunger.

    Science.gov (United States)

    Amoroso, Leslie

    2016-01-01

    The Second International Conference on Nutrition (ICN2) was jointly organized by the Food and Agriculture Organization of the United Nations (FAO) and the World Health Organization (WHO) and was held at the FAO Headquarters in Rome, Italy, from 19 to 21 November 2014. The ICN2 was a high-level intergovernmental meeting that focused global attention on addressing malnutrition in all its forms: undernutrition, including micronutrient deficiencies, overweight, and obesity. The ICN2 was held to specifically address the persistent and unacceptably high levels of malnutrition. Despite much progress in reducing hunger globally, 795 million people remain undernourished, over 2 billion people suffer from various micronutrient deficiencies, and an estimated 161 million children under 5 years of age are stunted, 99 million underweight, and 51 million wasted. Meanwhile, more than 600 million adults are obese. Global problems require global solutions. The ICN2 brought together national policy-makers from food, agriculture, health, education, social protection and other relevant sectors to address the complex problem of malnutrition through a multi-sectoral approach. Two outcome documents - the Rome Declaration on Nutrition and the Framework for Action - were endorsed by participating governments at the Conference, committing world leaders to establishing national policies aimed at eradicating malnutrition in all its forms and transforming food systems to make nutritious diets available to all. The Rome Declaration on Nutrition is a political statement of 10 commitments for more effective and coordinated action to improve nutrition, while the Framework for Action is a voluntary technical guide of 60 recommendations for the implementation of the political commitments. This chapter provides information on the ICN2 and its outcomes as well as follow-up activities. Emphasis is placed on the Rome Declaration on Nutrition and the Framework for Action, with special focus on hidden

  11. Multilayer Neural Networks with Extensively Many Hidden Units

    International Nuclear Information System (INIS)

    Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido

    2001-01-01

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones

  12. Update on hidden sectors with dark forces and dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-11-15

    Recently there has been much interest in hidden sectors, especially in the context of dark matter and ''dark forces'', since they are a common feature of beyond standard model scenarios like string theory and SUSY and additionally exhibit interesting phenomenological aspects. Various laboratory experiments place limits on the so-called hidden photon and continuously further probe and constrain the parameter space; an updated overview is presented here. Furthermore, for several hidden sector models with light dark matter we study the viability with respect to the relic abundance and direct detection experiments.

  13. Hidden photon dark matter search with large metallic mirror

    International Nuclear Information System (INIS)

    Doebrich, Babette; Lindner, Axel; Daumiller, Kai; Engel, Ralph; Roth, Markus; Kowalski, Marek

    2014-10-01

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  14. Naturally light hidden photons in LARGE volume string compactifications

    International Nuclear Information System (INIS)

    Goodsell, M.; Jaeckel, J.; Redondo, J.; Ringwald, A.

    2009-09-01

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  15. Hidden Area and Mechanical Nonlinearities in Freestanding Graphene

    Science.gov (United States)

    Nicholl, Ryan J. T.; Lavrik, Nickolay V.; Vlassiouk, Ivan; Srijanto, Bernadeta R.; Bolotin, Kirill I.

    2017-06-01

    We investigated the effect of out-of-plane crumpling on the mechanical response of graphene membranes. In our experiments, stress was applied to graphene membranes using pressurized gas while the strain state was monitored through two complementary techniques: interferometric profilometry and Raman spectroscopy. By comparing the data obtained through these two techniques, we determined the geometric hidden area which quantifies the crumpling strength. While the devices with hidden area ˜0 % obeyed linear mechanics with biaxial stiffness 428 ±10 N /m , specimens with hidden area in the range 0.5%-1.0% were found to obey an anomalous nonlinear Hooke's law with an exponent ˜0.1 .

  16. Context Tree Estimation in Variable Length Hidden Markov Models

    OpenAIRE

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exp...

  17. Local models and hidden nonlocality in Quantum Theory

    OpenAIRE

    Guerini, Leonardo

    2014-01-01

    This Master's thesis has two central subjects: the simulation of correlations generated by local measurements on entangled quantum states by local hidden-variables models and the revelation of hidden nonlocality. We present and detail the Werner's local model and the hidden nonlocality of some Werner states of dimension $d\\geq5$, the Gisin-Degorre's local model for a Werner state of dimension $d=2$ and the local model of Hirsch et al. for mixtures of the singlet state and noise, all of them f...

  18. Optical character recognition of handwritten Arabic using hidden Markov models

    Science.gov (United States)

    Aulama, Mohannad M.; Natsheh, Asem M.; Abandah, Gheith A.; Olama, Mohammed M.

    2011-04-01

    The problem of optical character recognition (OCR) of handwritten Arabic has not received a satisfactory solution yet. In this paper, an Arabic OCR algorithm is developed based on Hidden Markov Models (HMMs) combined with the Viterbi algorithm, which results in an improved and more robust recognition of characters at the sub-word level. Integrating the HMMs represents another step of the overall OCR trends being currently researched in the literature. The proposed approach exploits the structure of characters in the Arabic language in addition to their extracted features to achieve improved recognition rates. Useful statistical information of the Arabic language is initially extracted and then used to estimate the probabilistic parameters of the mathematical HMM. A new custom implementation of the HMM is developed in this study, where the transition matrix is built based on the collected large corpus, and the emission matrix is built based on the results obtained via the extracted character features. The recognition process is triggered using the Viterbi algorithm which employs the most probable sequence of sub-words. The model was implemented to recognize the sub-word unit of Arabic text raising the recognition rate from being linked to the worst recognition rate for any character to the overall structure of the Arabic language. Numerical results show that there is a potentially large recognition improvement by using the proposed algorithms.

  19. A Bayesian Approach for Structural Learning with Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Cen Li

    2002-01-01

    Full Text Available Hidden Markov Models(HMM have proved to be a successful modeling paradigm for dynamic and spatial processes in many domains, such as speech recognition, genomics, and general sequence alignment. Typically, in these applications, the model structures are predefined by domain experts. Therefore, the HMM learning problem focuses on the learning of the parameter values of the model to fit the given data sequences. However, when one considers other domains, such as, economics and physiology, model structure capturing the system dynamic behavior is not available. In order to successfully apply the HMM methodology in these domains, it is important that a mechanism is available for automatically deriving the model structure from the data. This paper presents a HMM learning procedure that simultaneously learns the model structure and the maximum likelihood parameter values of a HMM from data. The HMM model structures are derived based on the Bayesian model selection methodology. In addition, we introduce a new initialization procedure for HMM parameter value estimation based on the K-means clustering method. Experimental results with artificially generated data show the effectiveness of the approach.

  20. Mobile Application Identification based on Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Yang Xinyan

    2018-01-01

    Full Text Available With the increasing number of mobile applications, there has more challenging network management tasks to resolve. Users also face security issues of the mobile Internet application when enjoying the mobile network resources. Identifying applications that correspond to network traffic can help network operators effectively perform network management. The existing mobile application recognition technology presents new challenges in extensibility and applications with encryption protocols. For the existing mobile application recognition technology, there are two problems, they can not recognize the application which using the encryption protocol and their scalability is poor. In this paper, a mobile application identification method based on Hidden Markov Model(HMM is proposed to extract the defined statistical characteristics from different network flows generated when each application starting. According to the time information of different network flows to get the corresponding time series, and then for each application to be identified separately to establish the corresponding HMM model. Then, we use 10 common applications to test the method proposed in this paper. The test results show that the mobile application recognition method proposed in this paper has a high accuracy and good generalization ability.

  1. On the entropy of a hidden Markov process.

    Science.gov (United States)

    Jacquet, Philippe; Seroussi, Gadiel; Szpankowski, Wojciech

    2008-05-01

    We study the entropy rate of a hidden Markov process (HMP) defined by observing the output of a binary symmetric channel whose input is a first-order binary Markov process. Despite the simplicity of the models involved, the characterization of this entropy is a long standing open problem. By presenting the probability of a sequence under the model as a product of random matrices, one can see that the entropy rate sought is equal to a top Lyapunov exponent of the product. This offers an explanation for the elusiveness of explicit expressions for the HMP entropy rate, as Lyapunov exponents are notoriously difficult to compute. Consequently, we focus on asymptotic estimates, and apply the same product of random matrices to derive an explicit expression for a Taylor approximation of the entropy rate with respect to the parameter of the binary symmetric channel. The accuracy of the approximation is validated against empirical simulation results. We also extend our results to higher-order Markov processes and to Rényi entropies of any order.

  2. Representation of Hidden Curriculum in EFL Textbook (Gender Markers

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2014-01-01

    Full Text Available The article considers the mechanism ofrepresenting the hidden curriculum in the discourse of EFL textbooks, i.e. the transmission ofsociocultural norms and values of native speakers to foreign students. To do this the authors make a brieftheoretical review of this problem and demonstrate the results of the comparative discourse analysis of two popular textbooks, the one of the pre-globalization age and the present-day one. The authors provide evidence for their idea of the dual role, which English plays today being simultaneously a national language of different English-speaking societies and the global lingua franca. The conducted discourse analysis is based on the analysis of semiotic means, which are used to nominate concepts basic to any society and culture. In the article, the authors demonstrate their own plan of analysis by the example of the "gender" concept. The gender concept shows social and cultural conditionality of distinctions in behavior and the identity of men and women. The comparative analysis of gender markers in the discourse of EFL textbooks reveals a global vector of transformation and distribution ofsociocultural values. Authors state that cultural expansion through English teaching is an instrument of smart power. It is suggested using the mechanism of transmission ofsociocultural norms and values, which is analyzed in the research, to create Russian textbooks for foreign students.

  3. Probability Sampling Method for a Hidden Population Using Respondent-Driven Sampling: Simulation for Cancer Survivors.

    Science.gov (United States)

    Jung, Minsoo

    2015-01-01

    When there is no sampling frame within a certain group or the group is concerned that making its population public would bring social stigma, we say the population is hidden. It is difficult to approach this kind of population survey-methodologically because the response rate is low and its members are not quite honest with their responses when probability sampling is used. The only alternative known to address the problems caused by previous methods such as snowball sampling is respondent-driven sampling (RDS), which was developed by Heckathorn and his colleagues. RDS is based on a Markov chain, and uses the social network information of the respondent. This characteristic allows for probability sampling when we survey a hidden population. We verified through computer simulation whether RDS can be used on a hidden population of cancer survivors. According to the simulation results of this thesis, the chain-referral sampling of RDS tends to minimize as the sample gets bigger, and it becomes stabilized as the wave progresses. Therefore, it shows that the final sample information can be completely independent from the initial seeds if a certain level of sample size is secured even if the initial seeds were selected through convenient sampling. Thus, RDS can be considered as an alternative which can improve upon both key informant sampling and ethnographic surveys, and it needs to be utilized for various cases domestically as well.

  4. Alleviating hidden hunger. Approaches that work

    International Nuclear Information System (INIS)

    Kennedy, E.; Mannar, V.; Iyengar, V.

    2003-01-01

    The world has come a long way in understanding the nature, magnitude and range of solutions to micronutrient malnutrition - often called 'hidden hunger'. The most sustainable solutions - that is those that are likely to be maintained in the long term - almost surely will include food-based approaches including diet diversity, food fortification and biofortification. Food fortification and biofortification could be some of the most cost-effective of all public health interventions and thus within the economic reach of even the world's poorest. In order to implement them in a sustainable manner, a combination of technical, operational, economic, behavioural and political factors need to be addressed. In some ways the technological issues are the easiest. Because of attention to research, we now have a variety of ways for both single and multiple micronutrients to reach the target population. We also know what is needed in order to ensure delivery systems. The key factor for continued success in reducing micronutrient malnutrition through fortification is a political commitment at the national and international level and creating effective public-private partnerships at the national level. The payoff for eliminating hidden hunger through nutrient fortification is enormous and few other public health interventions offer such a promising health, nutrition and economic success story. Nuclear and isotopic techniques are valuable tools in helping to meet the multifaceted challenges posed by nutritional disorders affecting the entire human life span (embryonic to elderly). Among the numerous applications available, isotopic techniques are uniquely well suited for targeting and tracking progress in food and nutrition development programmes (See box: How Nutrients are Tracked). These include: use of the stable isotopes of iron (Fe) and zinc (Zn) as a kind of gold standard in studies of their bioavailability from foods; trace element bioavailability and pool sizes for

  5. Discrete neurocognitive subgroups in fully or partially remitted bipolar disorder

    DEFF Research Database (Denmark)

    Jensen, Johan Høy; Knorr, Ulla; Vinberg, Maj

    2016-01-01

    BACKGROUND: Neurocognitive impairment in remitted patients with bipolar disorder contributes to functional disabilities. However, the pattern and impact of these deficits are unclear. METHODS: We pooled data from 193 fully or partially remitted patients with bipolar disorder and 110 healthy...... controls. Hierarchical cluster analysis was conducted to determine whether there are discrete neurocognitive subgroups in bipolar disorder. The pattern of the cognitive deficits and the characteristics of patients in these neurocognitive subgroups were examined with analyses of covariance and least...... was cross-sectional which limits inferences regarding the causality of the findings. CONCLUSION: Globally and selectively impaired bipolar disorder patients displayed more functional disabilities than those who were cognitively intact. The present findings highlight a clinical need to systematically screen...

  6. Human rotavirus subgroups and severity of associated diarrhoea in Ghana.

    Science.gov (United States)

    Armah, George E.; Hori, Hiroki; Anyanful, Akwasi; Addo, Julius A.; Commey, Joseph O.; Kamiya, Hitoshi; Nkrumah, Francis K.

    1995-11-01

    In a 12 month study of children with acute diarrhoea seeking medical care in 2 hospitals in Accra, Ghana, 16.3% were found to be infected with human rotaviruses (HRV). Vomiting and diarrhoea were the main symptoms observed. HRV infection was frequently associated with severe diarrhoea. Vomiting was however less frequent in HRV associated diarrhoea than in non HRV diarrhoea. No significant association was observed between the severity of dehydration and HRV infection. Subgroup II HRV was the predominant subgroup identified with the dominant serotypes being HRV serotypes 1 and 4. Poly-acrylamide gel electrophoresis of HRV RNAs isolated from 40 positive stool samples revealed the existence of 7 distinct electrophoretic migration patterns in the study population.

  7. Combined group ECC protection and subgroup parity protection

    Science.gov (United States)

    Gara, Alan G.; Chen, Dong; Heidelberger, Philip; Ohmacht, Martin

    2013-06-18

    A method and system are disclosed for providing combined error code protection and subgroup parity protection for a given group of n bits. The method comprises the steps of identifying a number, m, of redundant bits for said error protection; and constructing a matrix P, wherein multiplying said given group of n bits with P produces m redundant error correction code (ECC) protection bits, and two columns of P provide parity protection for subgroups of said given group of n bits. In the preferred embodiment of the invention, the matrix P is constructed by generating permutations of m bit wide vectors with three or more, but an odd number of, elements with value one and the other elements with value zero; and assigning said vectors to rows of the matrix P.

  8. Prediction of Annual Rainfall Pattern Using Hidden Markov Model ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Hidden Markov model is very influential in stochastic world because of its ... the earth from the clouds. The usual ... Rainfall modelling and ... Markov Models have become popular tools ... environment sciences, University of Jos, plateau state,.

  9. New limits on hidden photons from past electron beam dumps

    International Nuclear Information System (INIS)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-01

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  10. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  11. Cosmological abundance of the QCD axion coupled to hidden photons

    Science.gov (United States)

    Kitajima, Naoya; Sekiguchi, Toyokazu; Takahashi, Fuminobu

    2018-06-01

    We study the cosmological evolution of the QCD axion coupled to hidden photons. For a moderately strong coupling, the motion of the axion field leads to an explosive production of hidden photons by tachyonic instability. We use lattice simulations to evaluate the cosmological abundance of the QCD axion. In doing so, we incorporate the backreaction of the produced hidden photons on the axion dynamics, which becomes significant in the non-linear regime. We find that the axion abundance is suppressed by at most O (102) for the decay constant fa =1016GeV, compared to the case without the coupling. For a sufficiently large coupling, the motion of the QCD axion becomes strongly damped, and as a result, the axion abundance is enhanced. Our results show that the cosmological upper bound on the axion decay constant can be relaxed by a few hundred for a certain range of the coupling to hidden photons.

  12. Dopamine reward prediction errors reflect hidden state inference across time

    Science.gov (United States)

    Starkweather, Clara Kwon; Babayan, Benedicte M.; Uchida, Naoshige; Gershman, Samuel J.

    2017-01-01

    Midbrain dopamine neurons signal reward prediction error (RPE), or actual minus expected reward. The temporal difference (TD) learning model has been a cornerstone in understanding how dopamine RPEs could drive associative learning. Classically, TD learning imparts value to features that serially track elapsed time relative to observable stimuli. In the real world, however, sensory stimuli provide ambiguous information about the hidden state of the environment, leading to the proposal that TD learning might instead compute a value signal based on an inferred distribution of hidden states (a ‘belief state’). In this work, we asked whether dopaminergic signaling supports a TD learning framework that operates over hidden states. We found that dopamine signaling exhibited a striking difference between two tasks that differed only with respect to whether reward was delivered deterministically. Our results favor an associative learning rule that combines cached values with hidden state inference. PMID:28263301

  13. Optimisation of Hidden Markov Model using Baum–Welch algorithm ...

    Indian Academy of Sciences (India)

    The present work is a part of development of Hidden Markov Model. (HMM) based ... the Himalaya. In this work, HMMs have been developed for forecasting of maximum and minimum ..... data collection teams of Snow and Avalanche Study.

  14. On the LHC sensitivity for non-thermalised hidden sectors

    Science.gov (United States)

    Kahlhoefer, Felix

    2018-04-01

    We show under rather general assumptions that hidden sectors that never reach thermal equilibrium in the early Universe are also inaccessible for the LHC. In other words, any particle that can be produced at the LHC must either have been in thermal equilibrium with the Standard Model at some point or must be produced via the decays of another hidden sector particle that has been in thermal equilibrium. To reach this conclusion, we parametrise the cross section connecting the Standard Model to the hidden sector in a very general way and use methods from linear programming to calculate the largest possible number of LHC events compatible with the requirement of non-thermalisation. We find that even the HL-LHC cannot possibly produce more than a few events with energy above 10 GeV involving states from a non-thermalised hidden sector.

  15. Risk from the frontlines of a hidden epidemic sexuality, masculinities ...

    African Journals Online (AJOL)

    Risk from the frontlines of a hidden epidemic sexuality, masculinities and social pressures ... It frames risk in the context of the dynamics governing sexuality, underlined ... MSM risk and practice, in these contexts, are consequently shaped by ...

  16. New limits on hidden photons from past electron beam dumps

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-15

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  17. Upper bounds for reversible circuits based on Young subgroups

    DEFF Research Database (Denmark)

    Abdessaied, Nabila; Soeken, Mathias; Thomsen, Michael Kirkedal

    2014-01-01

    We present tighter upper bounds on the number of Toffoli gates needed in reversible circuits. Both multiple controlled Toffoli gates and mixed polarity Toffoli gates have been considered for this purpose. The calculation of the bounds is based on a synthesis approach based on Young subgroups...... that results in circuits using a more generalized gate library. Starting from an upper bound for this library we derive new bounds which improve the existing bound by around 77%....

  18. Characteristic properties of large subgroups in primary abelian groups

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    1. Introduction. The main purpose of this article is to study the relations between the structures of primary abelian groups and their ..... Case 2. γ − 2 exists. Let Gγ −1 be a direct summand of Gγ . We remark, in connection with Case 1, that any pγ −1. -high subgroup of Gγ is isomorphic to Gγ −1. As far as Case 2 is concerned, ...

  19. Measuring the Speed of Aging across Population Subgroups

    Science.gov (United States)

    2014-01-01

    People in different subgroups age at different rates. Surveys containing biomarkers can be used to assess these subgroup differences. We illustrate this using hand-grip strength to produce an easily interpretable, physical-based measure that allows us to compare characteristic-based ages across educational subgroups in the United States. Hand-grip strength has been shown to be a good predictor of future mortality and morbidity, and therefore a useful indicator of population aging. Data from the Health and Retirement Survey (HRS) were used. Two education subgroups were distinguished, those with less than a high school diploma and those with more education. Regressions on hand-grip strength were run for each sex and race using age and education, their interactions and other covariates as independent variables. Ages of identical mean hand-grip strength across education groups were compared for people in the age range 60 to 80. The hand-grip strength of 65 year old white males with less education was the equivalent to that of 69.6 (68.2, 70.9) year old white men with more education, indicating that the more educated men had aged more slowly. This is a constant characteristic age, as defined in the Sanderson and Scherbov article “The characteristics approach to the measurement of population aging” published 2013 in Population and Development Review. Sixty-five year old white females with less education had the same average hand-grip strength as 69.4 (68.2, 70.7) year old white women with more education. African-American women at ages 60 and 65 with more education also aged more slowly than their less educated counterparts. African American men with more education aged at about the same rate as those with less education. This paper expands the toolkit of those interested in population aging by showing how survey data can be used to measure the differential extent of aging across subpopulations. PMID:24806337

  20. A note on TI-subgroups of finite groups

    Indian Academy of Sciences (India)

    A kernel and a complement of a quasi-Frobenius group G are the preimages of a kernel and a complement of the Frobenius group G/Z(G), respectively. Lemma 1.2 [1]. A group G is quasi-Frobenius if and only if G possesses a noncentral subgroup H such that H ∩ Hg ≤ Z(G) for all g ∈ G − H. In this case, H is a comple-.

  1. Irreducible almost simple subgroups of classical algebraic groups

    CERN Document Server

    Burness, Timothy C; Marion, Claude; Testerman, Donna M

    2015-01-01

    Let G be a simple classical algebraic group over an algebraically closed field K of characteristic p\\geq 0 with natural module W. Let H be a closed subgroup of G and let V be a nontrivial p-restricted irreducible tensor indecomposable rational KG-module such that the restriction of V to H is irreducible. In this paper the authors classify the triples (G,H,V) of this form, where V \

  2. A generalized Frattini subgroup of a finite group

    Directory of Open Access Journals (Sweden)

    Prabir Bhattacharya

    1989-01-01

    Full Text Available For a finite group G and an arbitrary prime p, let SP(G denote the intersection of all maximal subgroups M of G such that [G:M] is both composite and not divisible by p; if no such M exists we set SP(G = G. Some properties of G are considered involving SP(G. In particular, we obtain a characterization of G when each M in the definition of SP(G is nilpotent.

  3. Molecular Subgroup of Primary Prostate Cancer Presenting with Metastatic Biology.

    Science.gov (United States)

    Walker, Steven M; Knight, Laura A; McCavigan, Andrena M; Logan, Gemma E; Berge, Viktor; Sherif, Amir; Pandha, Hardev; Warren, Anne Y; Davidson, Catherine; Uprichard, Adam; Blayney, Jaine K; Price, Bethanie; Jellema, Gera L; Steele, Christopher J; Svindland, Aud; McDade, Simon S; Eden, Christopher G; Foster, Chris; Mills, Ian G; Neal, David E; Mason, Malcolm D; Kay, Elaine W; Waugh, David J; Harkin, D Paul; Watson, R William; Clarke, Noel W; Kennedy, Richard D

    2017-10-01

    Approximately 4-25% of patients with early prostate cancer develop disease recurrence following radical prostatectomy. To identify a molecular subgroup of prostate cancers with metastatic potential at presentation resulting in a high risk of recurrence following radical prostatectomy. Unsupervised hierarchical clustering was performed using gene expression data from 70 primary resections, 31 metastatic lymph nodes, and 25 normal prostate samples. Independent assay validation was performed using 322 radical prostatectomy samples from four sites with a mean follow-up of 50.3 months. Molecular subgroups were identified using unsupervised hierarchical clustering. A partial least squares approach was used to generate a gene expression assay. Relationships with outcome (time to biochemical and metastatic recurrence) were analysed using multivariable Cox regression and log-rank analysis. A molecular subgroup of primary prostate cancer with biology similar to metastatic disease was identified. A 70-transcript signature (metastatic assay) was developed and independently validated in the radical prostatectomy samples. Metastatic assay positive patients had increased risk of biochemical recurrence (multivariable hazard ratio [HR] 1.62 [1.13-2.33]; p=0.0092) and metastatic recurrence (multivariable HR=3.20 [1.76-5.80]; p=0.0001). A combined model with Cancer of the Prostate Risk Assessment post surgical (CAPRA-S) identified patients at an increased risk of biochemical and metastatic recurrence superior to either model alone (HR=2.67 [1.90-3.75]; pmolecular subgroup of primary prostate cancers with metastatic potential. The metastatic assay may improve the ability to detect patients at risk of metastatic recurrence following radical prostatectomy. The impact of adjuvant therapies should be assessed in this higher-risk population. Copyright © 2017 European Association of Urology. Published by Elsevier B.V. All rights reserved.

  4. Effect of duloxetine in patients with fibromyalgia: tiredness subgroups

    OpenAIRE

    Bradley, Laurence A; Bennett, Robert; Russell, Irwin J; Wohlreich, Madelaine M; Chappell, Amy S; Wang, Fujun; D'Souza, Deborah N; Moldofsky, Harvey

    2010-01-01

    Introduction This study tested the hypothesis that baseline ratings of fatigue/tiredness would be negatively associated with the efficacy of duloxetine on measures of pain and functional ability in patients with fibromyalgia. Methods A post hoc analysis of pooled data from 4 double-blind, placebo-controlled studies of duloxetine in fibromyalgia was performed. The fibromyalgia impact questionnaire (FIQ) tiredness item score (0 to 10 scale) was used to define tiredness subgroups. Patients were ...

  5. A Novel Method for Decoding Any High-Order Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Fei Ye

    2014-01-01

    Full Text Available This paper proposes a novel method for decoding any high-order hidden Markov model. First, the high-order hidden Markov model is transformed into an equivalent first-order hidden Markov model by Hadar’s transformation. Next, the optimal state sequence of the equivalent first-order hidden Markov model is recognized by the existing Viterbi algorithm of the first-order hidden Markov model. Finally, the optimal state sequence of the high-order hidden Markov model is inferred from the optimal state sequence of the equivalent first-order hidden Markov model. This method provides a unified algorithm framework for decoding hidden Markov models including the first-order hidden Markov model and any high-order hidden Markov model.

  6. Atorvastatin in stroke: a review of SPARCL and subgroup analysis

    Directory of Open Access Journals (Sweden)

    Branko N Huisa

    2010-03-01

    Full Text Available Branko N Huisa, Andrew B Stemer, Justin A ZivinDepartment of Neuroscience University of California, San Diego, CA, USAAbstract: Statin therapy in patients with cardiovascular disease is associated with reduced incidence of stroke. The Stroke Prevention by Aggressive Reduction of Cholesterol Levels (SPARCL trial showed daily treatment with 80 mg of atorvastatin in patients with a recent stroke or transient ischemic attack (TIA reduced the incidence of fatal or nonfatal stroke by 16%. Several post hoc analyses of different subgroups followed the SPARCL study. They have not revealed any significant differences when patients were sorted by age, sex, presence of carotid disease or type of stroke, with the exception of intracranial hemorrhage as the entry event. Lower low-density lipoprotein cholesterol levels in addition to possible neuroprotective mechanisms due to atorvastatin treatment correlate with improved risk reduction. Although not predefined subgroups and subject to an insufficient power, these post hoc studies have generated new clinical questions. However, clinicians should avoid denying therapy based on such subgroup analysis. At this point, the best evidence powerfully demonstrates stroke and TIA patients should be prescribed high dose statin therapy for secondary stroke prevention.Keywords: statins, intracranial hemorrhage, neuroprotection, outcome, prevention, carotid stenosis, transient ischemic attack

  7. A 6-gene signature identifies four molecular subgroups of neuroblastoma

    Science.gov (United States)

    2011-01-01

    Background There are currently three postulated genomic subtypes of the childhood tumour neuroblastoma (NB); Type 1, Type 2A, and Type 2B. The most aggressive forms of NB are characterized by amplification of the oncogene MYCN (MNA) and low expression of the favourable marker NTRK1. Recently, mutations or high expression of the familial predisposition gene Anaplastic Lymphoma Kinase (ALK) was associated to unfavourable biology of sporadic NB. Also, various other genes have been linked to NB pathogenesis. Results The present study explores subgroup discrimination by gene expression profiling using three published microarray studies on NB (47 samples). Four distinct clusters were identified by Principal Components Analysis (PCA) in two separate data sets, which could be verified by an unsupervised hierarchical clustering in a third independent data set (101 NB samples) using a set of 74 discriminative genes. The expression signature of six NB-associated genes ALK, BIRC5, CCND1, MYCN, NTRK1, and PHOX2B, significantly discriminated the four clusters (p INSS stage 4 and/or dead of disease, p < 0.05, Fisher's exact test). Conclusions Based on expression profiling we have identified four molecular subgroups of neuroblastoma, which can be distinguished by a 6-gene signature. The fourth subgroup has not been described elsewhere, and efforts are currently made to further investigate this group's specific characteristics. PMID:21492432

  8. A 6-gene signature identifies four molecular subgroups of neuroblastoma

    Directory of Open Access Journals (Sweden)

    Kogner Per

    2011-04-01

    Full Text Available Abstract Background There are currently three postulated genomic subtypes of the childhood tumour neuroblastoma (NB; Type 1, Type 2A, and Type 2B. The most aggressive forms of NB are characterized by amplification of the oncogene MYCN (MNA and low expression of the favourable marker NTRK1. Recently, mutations or high expression of the familial predisposition gene Anaplastic Lymphoma Kinase (ALK was associated to unfavourable biology of sporadic NB. Also, various other genes have been linked to NB pathogenesis. Results The present study explores subgroup discrimination by gene expression profiling using three published microarray studies on NB (47 samples. Four distinct clusters were identified by Principal Components Analysis (PCA in two separate data sets, which could be verified by an unsupervised hierarchical clustering in a third independent data set (101 NB samples using a set of 74 discriminative genes. The expression signature of six NB-associated genes ALK, BIRC5, CCND1, MYCN, NTRK1, and PHOX2B, significantly discriminated the four clusters (p ALK, BIRC5, and PHOX2B, and was significantly associated with higher tumour stage, poor outcome and poor survival compared to the Type 1-corresponding favourable group (INSS stage 4 and/or dead of disease, p Conclusions Based on expression profiling we have identified four molecular subgroups of neuroblastoma, which can be distinguished by a 6-gene signature. The fourth subgroup has not been described elsewhere, and efforts are currently made to further investigate this group's specific characteristics.

  9. Gambaran Populasi Golongan Darah Subgroup A (A1, A2 di PMI Kulon Progo

    Directory of Open Access Journals (Sweden)

    Hieronymus Rayi Prasetya

    2017-08-01

    Full Text Available Subgroup A1 and A2 are the most important in the blood group A. Subgroup A1 has the A antigen more than A2 subgroup, the A2 subgroup can cause misidentification of blood group due to poor A antigen and genetic variation possessed. Misidentification of the blood group will increase the risk of transfusion reactions. This research aims to describe the A1 and A2 subgroup population in Kulon Progo district. This study was conducted with a cross sectional sampling technique. The sample in this study were taken from donors of blood group A in Kulon Progo Red Cross. Identification of A1 and A2 subgroup is done by using lectin (Dolichos biflorus extract. The result of the examination of 53 samples showed that 96,2% was A1 subgroup and 3,8% was A2 subgroup. Key words : Subgroup A1, Subgroup A2, Population, Kulon Progo

  10. A two particle hidden sector and the oscillations with photons

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Pedro D. [Universidad de Antofagasta, Departamento de Fisica, Antofagasta (Chile); Arias, Paola; Maldonado, Carlos [Universidad de Santiago de Chile, Departmento de Fisica, Santiago (Chile)

    2018-01-15

    We present a detailed study of the oscillations and optical properties for vacuum, in a model for the dark sector that contains axion-like particles and hidden photons. We provide bounds for the couplings versus the mass, using current results from ALPS-I and PVLAS. We also discuss the challenges for the detection of models with more than one hidden particle in light shining trough wall-like experiments. (orig.)

  11. Rare Z boson decays to a hidden sector

    Science.gov (United States)

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-01

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  12. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  13. Hidden twelve-dimensional super Poincare symmetry in eleven dimensions

    International Nuclear Information System (INIS)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2004-01-01

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional super Poincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven-dimensional superparticle, taken off-shell, we discover a hidden twelve-dimensional super Poincare symmetry that governs the theory

  14. Hidden charged dark matter and chiral dark radiation

    Science.gov (United States)

    Ko, P.; Nagata, Natsumi; Tang, Yong

    2017-10-01

    In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.

  15. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  16. Hidden Structural Codes in Protein Intrinsic Disorder.

    Science.gov (United States)

    Borkosky, Silvia S; Camporeale, Gabriela; Chemes, Lucía B; Risso, Marikena; Noval, María Gabriela; Sánchez, Ignacio E; Alonso, Leonardo G; de Prat Gay, Gonzalo

    2017-10-17

    Intrinsic disorder is a major structural category in biology, accounting for more than 30% of coding regions across the domains of life, yet consists of conformational ensembles in equilibrium, a major challenge in protein chemistry. Anciently evolved papillomavirus genomes constitute an unparalleled case for sequence to structure-function correlation in cases in which there are no folded structures. E7, the major transforming oncoprotein of human papillomaviruses, is a paradigmatic example among the intrinsically disordered proteins. Analysis of a large number of sequences of the same viral protein allowed for the identification of a handful of residues with absolute conservation, scattered along the sequence of its N-terminal intrinsically disordered domain, which intriguingly are mostly leucine residues. Mutation of these led to a pronounced increase in both α-helix and β-sheet structural content, reflected by drastic effects on equilibrium propensities and oligomerization kinetics, and uncovers the existence of local structural elements that oppose canonical folding. These folding relays suggest the existence of yet undefined hidden structural codes behind intrinsic disorder in this model protein. Thus, evolution pinpoints conformational hot spots that could have not been identified by direct experimental methods for analyzing or perturbing the equilibrium of an intrinsically disordered protein ensemble.

  17. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  18. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  19. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  20. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M; Aarnio, P [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T; Tiilikainen, H [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1998-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  1. Stock Return Prediction with Hidden Order Mapping

    OpenAIRE

    Mamidi, Varsha

    2016-01-01

    Missing data problem is ubiquitous in many real life situations. Information Technology researchers have explored and tried to address this problem in different settings. In this thesis, we undertake research to address missing data problem associated with order book information in stock markets. This is an in-depth and large-scale study with systematic and comprehensive framework to address missing data problem in the finance literature.    Orders placed by traders and ...

  2. Mining geriatric assessment data for in-patient fall prediction models and high-risk subgroups.

    Science.gov (United States)

    Marschollek, Michael; Gövercin, Mehmet; Rust, Stefan; Gietzelt, Matthias; Schulze, Mareike; Wolf, Klaus-Hendrik; Steinhagen-Thiessen, Elisabeth

    2012-03-14

    Hospital in-patient falls constitute a prominent problem in terms of costs and consequences. Geriatric institutions are most often affected, and common screening tools cannot predict in-patient falls consistently. Our objectives are to derive comprehensible fall risk classification models from a large data set of geriatric in-patients' assessment data and to evaluate their predictive performance (aim#1), and to identify high-risk subgroups from the data (aim#2). A data set of n = 5,176 single in-patient episodes covering 1.5 years of admissions to a geriatric hospital were extracted from the hospital's data base and matched with fall incident reports (n = 493). A classification tree model was induced using the C4.5 algorithm as well as a logistic regression model, and their predictive performance was evaluated. Furthermore, high-risk subgroups were identified from extracted classification rules with a support of more than 100 instances. The classification tree model showed an overall classification accuracy of 66%, with a sensitivity of 55.4%, a specificity of 67.1%, positive and negative predictive values of 15% resp. 93.5%. Five high-risk groups were identified, defined by high age, low Barthel index, cognitive impairment, multi-medication and co-morbidity. Our results show that a little more than half of the fallers may be identified correctly by our model, but the positive predictive value is too low to be applicable. Non-fallers, on the other hand, may be sorted out with the model quite well. The high-risk subgroups and the risk factors identified (age, low ADL score, cognitive impairment, institutionalization, polypharmacy and co-morbidity) reflect domain knowledge and may be used to screen certain subgroups of patients with a high risk of falling. Classification models derived from a large data set using data mining methods can compete with current dedicated fall risk screening tools, yet lack diagnostic precision. High-risk subgroups may be identified

  3. Mining geriatric assessment data for in-patient fall prediction models and high-risk subgroups

    Directory of Open Access Journals (Sweden)

    Marschollek Michael

    2012-03-01

    Full Text Available Abstract Background Hospital in-patient falls constitute a prominent problem in terms of costs and consequences. Geriatric institutions are most often affected, and common screening tools cannot predict in-patient falls consistently. Our objectives are to derive comprehensible fall risk classification models from a large data set of geriatric in-patients' assessment data and to evaluate their predictive performance (aim#1, and to identify high-risk subgroups from the data (aim#2. Methods A data set of n = 5,176 single in-patient episodes covering 1.5 years of admissions to a geriatric hospital were extracted from the hospital's data base and matched with fall incident reports (n = 493. A classification tree model was induced using the C4.5 algorithm as well as a logistic regression model, and their predictive performance was evaluated. Furthermore, high-risk subgroups were identified from extracted classification rules with a support of more than 100 instances. Results The classification tree model showed an overall classification accuracy of 66%, with a sensitivity of 55.4%, a specificity of 67.1%, positive and negative predictive values of 15% resp. 93.5%. Five high-risk groups were identified, defined by high age, low Barthel index, cognitive impairment, multi-medication and co-morbidity. Conclusions Our results show that a little more than half of the fallers may be identified correctly by our model, but the positive predictive value is too low to be applicable. Non-fallers, on the other hand, may be sorted out with the model quite well. The high-risk subgroups and the risk factors identified (age, low ADL score, cognitive impairment, institutionalization, polypharmacy and co-morbidity reflect domain knowledge and may be used to screen certain subgroups of patients with a high risk of falling. Classification models derived from a large data set using data mining methods can compete with current dedicated fall risk screening tools, yet lack

  4. Hidden-Sector Dynamics and the Supersymmetric Seesaw

    CERN Document Server

    Campbell, Bruce A; Maybury, David W

    2008-01-01

    In light of recent analyses that have shown that nontrivial hidden-sector dynamics in models of supersymmetry breaking can lead to a significant impact on the predicted low-energy supersymmetric spectrum, we extend these studies to consider hidden-sector effects in extensions of the MSSM to include a seesaw model for neutrino masses. A dynamical hidden sector in an interval of mass scales below the seesaw scale would yield renormalization-group running involving both the anomalous dimension from the hidden sector and the seesaw-extended MSSM renormalization group equations (RGEs). These effects interfere in general, altering the generational mixing of the sleptons, and allowing for a substantial change to the expected level of charged-lepton flavour violation in seesaw-extended MSSM models. These results provide further support for recent theoretical observations that knowledge of the hidden sector is required in order to make concrete low-energy predictions, if the hidden sector is strongly coupled. In parti...

  5. A single hidden layer feedforward network with only one neuron in the hidden layer can approximate any univariate function

    OpenAIRE

    Guliyev , Namig; Ismailov , Vugar

    2016-01-01

    The possibility of approximating a continuous function on a compact subset of the real line by a feedforward single hidden layer neural network with a sigmoidal activation function has been studied in many papers. Such networks can approximate an arbitrary continuous function provided that an unlimited number of neurons in a hidden layer is permitted. In this paper, we consider constructive approximation on any finite interval of $\\mathbb{R}$ by neural networks with only one neuron in the hid...

  6. A comparison study of support vector machines and hidden Markov models in machinery condition monitoring

    International Nuclear Information System (INIS)

    Miao, Qiang; Huang, Hong Zhong; Fan, Xianfeng

    2007-01-01

    Condition classification is an important step in machinery fault detection, which is a problem of pattern recognition. Currently, there are a lot of techniques in this area and the purpose of this paper is to investigate two popular recognition techniques, namely hidden Markov model and support vector machine. At the beginning, we briefly introduced the procedure of feature extraction and the theoretical background of this paper. The comparison experiment was conducted for gearbox fault detection and the analysis results from this work showed that support vector machine has better classification performance in this area

  7. Subgroup Analysis of Trials Is Rarely Easy (SATIRE: a study protocol for a systematic review to characterize the analysis, reporting, and claim of subgroup effects in randomized trials

    Directory of Open Access Journals (Sweden)

    Malaga German

    2009-11-01

    Full Text Available Abstract Background Subgroup analyses in randomized trials examine whether effects of interventions differ between subgroups of study populations according to characteristics of patients or interventions. However, findings from subgroup analyses may be misleading, potentially resulting in suboptimal clinical and health decision making. Few studies have investigated the reporting and conduct of subgroup analyses and a number of important questions remain unanswered. The objectives of this study are: 1 to describe the reporting of subgroup analyses and claims of subgroup effects in randomized controlled trials, 2 to assess study characteristics associated with reporting of subgroup analyses and with claims of subgroup effects, and 3 to examine the analysis, and interpretation of subgroup effects for each study's primary outcome. Methods We will conduct a systematic review of 464 randomized controlled human trials published in 2007 in the 118 Core Clinical Journals defined by the National Library of Medicine. We will randomly select journal articles, stratified in a 1:1 ratio by higher impact versus lower impact journals. According to 2007 ISI total citations, we consider the New England Journal of Medicine, JAMA, Lancet, Annals of Internal Medicine, and BMJ as higher impact journals. Teams of two reviewers will independently screen full texts of reports for eligibility, and abstract data, using standardized, pilot-tested extraction forms. We will conduct univariable and multivariable logistic regression analyses to examine the association of pre-specified study characteristics with reporting of subgroup analyses and with claims of subgroup effects for the primary and any other outcomes. Discussion A clear understanding of subgroup analyses, as currently conducted and reported in published randomized controlled trials, will reveal both strengths and weaknesses of this practice. Our findings will contribute to a set of recommendations to optimize

  8. Hydrogeophysical investigations at Hidden Dam, Raymond, California

    Science.gov (United States)

    Minsley, Burke J.; Burton, Bethany L.; Ikard, Scott; Powers, Michael H.

    2011-01-01

    Self-potential and direct current resistivity surveys are carried out at the Hidden Dam site in Raymond, California to assess present-day seepage patterns and better understand the hydrogeologic mechanisms that likely influence seepage. Numerical modeling is utilized in conjunction with the geophysical measurements to predict variably-saturated flow through typical two-dimensional dam cross-sections as a function of reservoir elevation. Several different flow scenarios are investigated based on the known hydrogeology, as well as information about typical subsurface structures gained from the resistivity survey. The flow models are also used to simulate the bulk electrical resistivity in the subsurface under varying saturation conditions, as well as the self-potential response using petrophysical relationships and electrokinetic coupling equations.The self-potential survey consists of 512 measurements on the downstream area of the dam, and corroborates known seepage areas on the northwest side of the dam. Two direct-current resistivity profiles, each approximately 2,500 ft (762 m) long, indicate a broad sediment channel under the northwest side of the dam, which may be a significant seepage pathway through the foundation. A focusing of seepage in low-topography areas downstream of the dam is confirmed from the numerical flow simulations, which is also consistent with past observations. Little evidence of seepage is identified from the self-potential data on the southeast side of the dam, also consistent with historical records, though one possible area of focused seepage is identified near the outlet works. Integration of the geophysical surveys, numerical modeling, and observation well data provides a framework for better understanding seepage at the site through a combined hydrogeophysical approach.

  9. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  10. A 6-gene signature identifies four molecular subgroups of neuroblastoma

    LENUS (Irish Health Repository)

    Abel, Frida

    2011-04-14

    Abstract Background There are currently three postulated genomic subtypes of the childhood tumour neuroblastoma (NB); Type 1, Type 2A, and Type 2B. The most aggressive forms of NB are characterized by amplification of the oncogene MYCN (MNA) and low expression of the favourable marker NTRK1. Recently, mutations or high expression of the familial predisposition gene Anaplastic Lymphoma Kinase (ALK) was associated to unfavourable biology of sporadic NB. Also, various other genes have been linked to NB pathogenesis. Results The present study explores subgroup discrimination by gene expression profiling using three published microarray studies on NB (47 samples). Four distinct clusters were identified by Principal Components Analysis (PCA) in two separate data sets, which could be verified by an unsupervised hierarchical clustering in a third independent data set (101 NB samples) using a set of 74 discriminative genes. The expression signature of six NB-associated genes ALK, BIRC5, CCND1, MYCN, NTRK1, and PHOX2B, significantly discriminated the four clusters (p < 0.05, one-way ANOVA test). PCA clusters p1, p2, and p3 were found to correspond well to the postulated subtypes 1, 2A, and 2B, respectively. Remarkably, a fourth novel cluster was detected in all three independent data sets. This cluster comprised mainly 11q-deleted MNA-negative tumours with low expression of ALK, BIRC5, and PHOX2B, and was significantly associated with higher tumour stage, poor outcome and poor survival compared to the Type 1-corresponding favourable group (INSS stage 4 and\\/or dead of disease, p < 0.05, Fisher\\'s exact test). Conclusions Based on expression profiling we have identified four molecular subgroups of neuroblastoma, which can be distinguished by a 6-gene signature. The fourth subgroup has not been described elsewhere, and efforts are currently made to further investigate this group\\'s specific characteristics.

  11. Electroencephalographic characterization of subgroups of children with learning disorders.

    Directory of Open Access Journals (Sweden)

    Milene Roca-Stappung

    Full Text Available Electroencephalographic alterations have been reported in subjects with learning disorders, but there is no consensus on what characterizes their electroencephalogram findings. Our objective was to determine if there were subgroups within a group of scholars with not otherwise specified learning disorders and if they had specific electroencephalographic patterns. Eighty-five subjects (31 female, 8-11 years who scored low in at least two subscales -reading, writing and arithmetic- of the Infant Neuropsychological Evaluation were included. Electroencephalograms were recorded in 19 leads during rest with eyes closed; absolute power was obtained every 0.39 Hz. Three subgroups were formed according to children's performance: Group 1 (G1, higher scores than Group 2 in reading speed and reading and writing accuracy, Group 2 (G2, better performance than G1 in composition and Group 3 (G3, lower scores than Groups 1 and 2 in the three subscales. G3 had higher absolute power in frequencies in the delta and theta range at left frontotemporal sites than G1 and G2. G2 had higher absolute power within alpha frequencies than G3 and G1 at the left occipital site. G3 had higher absolute power in frequencies in the beta range than G1 in parietotemporal areas and than G2 in left frontopolar and temporal sites. G1 had higher absolute power within beta frequencies than G2 in the left frontopolar site. G3 had lower gamma absolute power values than the other groups in the left hemisphere, and gamma activity was higher in G1 than in G2 in frontopolar and temporal areas. This group of children with learning disorders is very heterogeneous. Three subgroups were found with different cognitive profiles, as well as a different electroencephalographic pattern. It is important to consider these differences when planning interventions for children with learning disorders.

  12. Increased taxon sampling reveals thousands of hidden orthologs in flatworms

    Science.gov (United States)

    2017-01-01

    Gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the gene complement of an organism consists of hidden orthologs, i.e., those with no apparent homology to sequenced animal lineages—mistakenly considered new genes—but actually representing rapidly evolving orthologs or undetected paralogs. Here, we describe Leapfrog, a simple automated BLAST pipeline that leverages increased taxon sampling to overcome long evolutionary distances and identify putative hidden orthologs in large transcriptomic databases by transitive homology. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3427 putative hidden orthologs, some unidentified by OrthoFinder and HaMStR, two common orthogroup inference algorithms. Unexpectedly, we do not observe a correlation between the number of putative hidden orthologs in a lineage and its “average” evolutionary rate. Hidden orthologs do not show unusual sequence composition biases that might account for systematic errors in sequence similarity searches. Instead, gene duplication with divergence of one paralog and weak positive selection appear to underlie hidden orthology in Platyhelminthes. By using Leapfrog, we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g., planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire in flatworms, qualifying the impact of gene losses and gains in gene complement evolution. PMID:28400424

  13. Polsar Land Cover Classification Based on Hidden Polarimetric Features in Rotation Domain and Svm Classifier

    Science.gov (United States)

    Tao, C.-S.; Chen, S.-W.; Li, Y.-Z.; Xiao, S.-P.

    2017-09-01

    Land cover classification is an important application for polarimetric synthetic aperture radar (PolSAR) data utilization. Rollinvariant polarimetric features such as H / Ani / text-decoration: overline">α / Span are commonly adopted in PolSAR land cover classification. However, target orientation diversity effect makes PolSAR images understanding and interpretation difficult. Only using the roll-invariant polarimetric features may introduce ambiguity in the interpretation of targets' scattering mechanisms and limit the followed classification accuracy. To address this problem, this work firstly focuses on hidden polarimetric feature mining in the rotation domain along the radar line of sight using the recently reported uniform polarimetric matrix rotation theory and the visualization and characterization tool of polarimetric coherence pattern. The former rotates the acquired polarimetric matrix along the radar line of sight and fully describes the rotation characteristics of each entry of the matrix. Sets of new polarimetric features are derived to describe the hidden scattering information of the target in the rotation domain. The latter extends the traditional polarimetric coherence at a given rotation angle to the rotation domain for complete interpretation. A visualization and characterization tool is established to derive new polarimetric features for hidden information exploration. Then, a classification scheme is developed combing both the selected new hidden polarimetric features in rotation domain and the commonly used roll-invariant polarimetric features with a support vector machine (SVM) classifier. Comparison experiments based on AIRSAR and multi-temporal UAVSAR data demonstrate that compared with the conventional classification scheme which only uses the roll-invariant polarimetric features, the proposed classification scheme achieves both higher classification accuracy and better robustness. For AIRSAR data, the overall classification

  14. POLSAR LAND COVER CLASSIFICATION BASED ON HIDDEN POLARIMETRIC FEATURES IN ROTATION DOMAIN AND SVM CLASSIFIER

    Directory of Open Access Journals (Sweden)

    C.-S. Tao

    2017-09-01

    Full Text Available Land cover classification is an important application for polarimetric synthetic aperture radar (PolSAR data utilization. Rollinvariant polarimetric features such as H / Ani / α / Span are commonly adopted in PolSAR land cover classification. However, target orientation diversity effect makes PolSAR images understanding and interpretation difficult. Only using the roll-invariant polarimetric features may introduce ambiguity in the interpretation of targets’ scattering mechanisms and limit the followed classification accuracy. To address this problem, this work firstly focuses on hidden polarimetric feature mining in the rotation domain along the radar line of sight using the recently reported uniform polarimetric matrix rotation theory and the visualization and characterization tool of polarimetric coherence pattern. The former rotates the acquired polarimetric matrix along the radar line of sight and fully describes the rotation characteristics of each entry of the matrix. Sets of new polarimetric features are derived to describe the hidden scattering information of the target in the rotation domain. The latter extends the traditional polarimetric coherence at a given rotation angle to the rotation domain for complete interpretation. A visualization and characterization tool is established to derive new polarimetric features for hidden information exploration. Then, a classification scheme is developed combing both the selected new hidden polarimetric features in rotation domain and the commonly used roll-invariant polarimetric features with a support vector machine (SVM classifier. Comparison experiments based on AIRSAR and multi-temporal UAVSAR data demonstrate that compared with the conventional classification scheme which only uses the roll-invariant polarimetric features, the proposed classification scheme achieves both higher classification accuracy and better robustness. For AIRSAR data, the overall classification accuracy

  15. Gender wage gap : Discrimination or Human Capital? A subgroup approach

    OpenAIRE

    Etoundi Atenga, Eric Martial; Chameni Nembua, Célestin; Meva Avoulou, Henri Joel

    2013-01-01

    The working population is becoming more and more feminized from 2000 to 2008 in Cameroon. Women receive on average a salary lower than that of the men and the sex remains a significant determiner of the professional position in Cameroon. From Oaxaca-Blinder(1973)decomposition, this work suggests studying gender wage gap composition in private and para public sectors by using subgroup approach. Results show that wage gap is estimated to 8.8% in favor of men. This gap is higher for employees ag...

  16. Infinite families of superintegrable systems separable in subgroup coordinates

    International Nuclear Information System (INIS)

    Lévesque, Daniel; Post, Sarah; Winternitz, Pavel

    2012-01-01

    A method is presented that makes it possible to embed a subgroup separable superintegrable system into an infinite family of systems that are integrable and exactly-solvable. It is shown that in two dimensional Euclidean or pseudo-Euclidean spaces the method also preserves superintegrability. Two infinite families of classical and quantum superintegrable systems are obtained in two-dimensional pseudo-Euclidean space whose classical trajectories and quantum eigenfunctions are investigated. In particular, the wave-functions are expressed in terms of Laguerre and generalized Bessel polynomials. (paper)

  17. Practical Algorithms for Subgroup Detection in Covert Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah; Wiil, Uffe Kock; Qureshi, Pir Abdul Rasool

    2010-01-01

    In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrated in an application by a prototype system. The system finds associations between terrorist and terrorist organisations...... and is capable of determining links between terrorism plots occurred in the past, their affiliation with terrorist camps, travel record, funds transfer, etc. The findings are represented by a network in the form of an Attributed Relational Graph (ARG). Paths from a node to any other node in the network indicate...

  18. Thiocarbomide coordination compounds of yttrium subgroup rare earth chlorides

    International Nuclear Information System (INIS)

    Sakharova, Yu.G.; Perov, V.N.; Loginov, V.I.

    1978-01-01

    Thiocarbamide coordination compounds of chlorides of elements of the yttrium subgroup 4MeCl 3 x5Cs(NH 2 ) 2 x2OH 2 O (where Me stands for Tb, Dy, Ho, Er, Tm, Yb, Lu, Y) were produced for the first time. The compounds obtained are stable in air, have definite melting points, are highly soluble in methyl and ethyl alcohols, and are unstable in water. They recrystallize from ethyl alcohol without changing their chemical composition. The identity of these compounds was confirmed by X-ray analysis

  19. Toward a Differential Diagnosis of Hidden Hearing Loss in Humans.

    Directory of Open Access Journals (Sweden)

    M Charles Liberman

    Full Text Available Recent work suggests that hair cells are not the most vulnerable elements in the inner ear; rather, it is the synapses between hair cells and cochlear nerve terminals that degenerate first in the aging or noise-exposed ear. This primary neural degeneration does not affect hearing thresholds, but likely contributes to problems understanding speech in difficult listening environments, and may be important in the generation of tinnitus and/or hyperacusis. To look for signs of cochlear synaptopathy in humans, we recruited college students and divided them into low-risk and high-risk groups based on self-report of noise exposure and use of hearing protection. Cochlear function was assessed by otoacoustic emissions and click-evoked electrocochleography; hearing was assessed by behavioral audiometry and word recognition with or without noise or time compression and reverberation. Both groups had normal thresholds at standard audiometric frequencies, however, the high-risk group showed significant threshold elevation at high frequencies (10-16 kHz, consistent with early stages of noise damage. Electrocochleography showed a significant difference in the ratio between the waveform peaks generated by hair cells (Summating Potential; SP vs. cochlear neurons (Action Potential; AP, i.e. the SP/AP ratio, consistent with selective neural loss. The high-risk group also showed significantly poorer performance on word recognition in noise or with time compression and reverberation, and reported heightened reactions to sound consistent with hyperacusis. These results suggest that the SP/AP ratio may be useful in the diagnosis of "hidden hearing loss" and that, as suggested by animal models, the noise-induced loss of cochlear nerve synapses leads to deficits in hearing abilities in difficult listening situations, despite the presence of normal thresholds at standard audiometric frequencies.

  20. The hidden carbon liability of Indonesian palm oil

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-05-15

    This report highlights the urgent need for global palm oil consumers and investors to support Unilever's call for an immediate moratorium on deforestation and peatland clearance in Indonesia. This report focuses on Unilever, which shares major institutional investors with other leading corporations including Nestle, Procter and Gamble and Kraft. Not only do these corporations share investors, they also share growing carbon liability within their raw material supply chains through the expansion in the palm oil sector in Indonesia. Unilever has recognised the global problems associated with palm oil expansion and the need for drastic reform to this sector. Unilever has taken a bold move in calling for an immediate moratorium on deforestation and peatland clearance. While Unilever's position is strengthened by its status as the largest palm oil consumer in the world, this report shows how, unless companies like Nestle, Procter and Gamble and Kraft support its call for a halt to deforestation, the palm oil industry will continue to present a massive carbon liability over the coming years. This report uses Unilever's palm oil supply chains as a case study to help quantify the carbon liability and collateral risks associated with the Indonesian palm oil sector. It shows how, by buying palm oil from suppliers who account for more than one-third of Indonesia's palm oil production, Unilever and its competitors are increasing their potential carbon liability and thus leaving investors exposed to potentially significant levels of hidden risk, compromising long-term financial and brand stability.

  1. K-theory for discrete subgroups of the Lorentz groups

    International Nuclear Information System (INIS)

    Schwalbe, D.A.

    1986-01-01

    In the thesis, a conjecture on the structure of the topological K theory groups associated to an action of a discrete group on a manifold is verified in the special case when the group is a closed discrete subgroup of a Lorentz group. The K theory is the topological K theory of the reduced crossed product C algebra arising from the action of a countable discrete group acting by diffeomorphisms on a smooth, Hausdorf, and second and countable manifold. The proof uses the geometric K theory of Baum and Connes. In this situation, they have developed a geometrically realized K theory which they conjecture to be isomorphic to the analytic K theory. Work of Kasparov is used to show the geometric K groups and the analytic K groups are isomorphic for actions of the Lorentz groups on a manifold. Work of Marc Rieffel on Morita equivalence of C/sup */ algebras, shows the analytic K theory for a closed discrete subgroup of a Lie group acting on a manifold is isomorphic to the K theory of the Lie group itself, acting on an induced manifold

  2. Symptom dimensions and subgroups in childhood-onset schizophrenia.

    Science.gov (United States)

    Craddock, Kirsten E S; Zhou, Xueping; Liu, Siyuan; Gochman, Peter; Dickinson, Dwight; Rapoport, Judith L

    2017-11-13

    This study investigated symptom dimensions and subgroups in the National Institute of Mental Health (NIMH) childhood-onset schizophrenia (COS) cohort and their similarities to adult-onset schizophrenia (AOS) literature. Scores from the Scales for the Assessment of Positive and Negative Symptoms (SAPS & SANS) from 125 COS patients were assessed for fit with previously established symptom dimensions from AOS literature using confirmatory factor analysis (CFA). K-means cluster analysis of each individual's scores on the best fitting set of dimensions was used to form patient clusters, which were then compared using demographic and clinical data. CFA showed the SAPS & SANS data was well suited to a 2-dimension solution, including positive and negative dimensions, out of five well established models. Cluster analysis identified three patient groups characterized by different dimension scores: (1) low scores on both dimensions, (2) high negative, low positive scores, and (3) high scores on both dimensions. These groups had different Full scale IQ, Children's Global Assessment Scale (CGAS) scores, ages of onset, and prevalence of some co-morbid behavior disorders (all psymptom-based subgroups within the NIMH COS cohort using an established AOS symptom structure. These findings confirm the heterogeneity of COS and were generally consistent with AOS literature. Published by Elsevier B.V.

  3. Improving Support for America's Hidden Heroes

    Science.gov (United States)

    Terri, Tanielian; Kathryn E., Bouskill; Rajeev, Ramchand; Esther M., Friedman; Thomas E., Trail; Angela, Clague

    2018-01-01

    Abstract The United States is home to more than 21 million veterans, many of whom deployed to support combat operations around the globe during their military service and sustained service-related conditions or disabilities. Supporting these wounded, ill, and injured warriors once home are millions of informal caregivers—individuals who provide unpaid support with activities that enable the service member or veteran to live in a noninstitutionalized setting. In this study, researchers describe elements of a research blueprint to inform future efforts to improve support for military and veteran caregivers. To construct this blueprint, researchers inventoried currently available research on caregiving for disabled adults and children and gathered stakeholder input by conducting a survey and facilitating an online panel. The study highlights the need for more studies that examine how military and veteran caregiver needs evolve over time, how programs are working, and how caregiving affects specific subgroups. The resulting blueprint should serve as a guide for the caregiver support community to use in prioritizing and facilitating future research. PMID:29416949

  4. Mrs. Miniver's Girls: Plucky Girls in "Hidden Figures," "The Zookeeper's Wife," "Their Finest," and "Colossal"

    Science.gov (United States)

    Beck, Bernard

    2017-01-01

    Four recent movies, "Hidden Figures," "The Zookeeper's Wife," "Their Finest," and "Colossal" exemplify a new cultural version of the movie heroine. This version combines feminism with commitment to solving an overwhelming problem. These heroines, thus, display the character virtues of Wonder Woman and Mrs.…

  5. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  6. Gauge mediation scenario with hidden sector renormalization in MSSM

    International Nuclear Information System (INIS)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-01-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5 minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  7. Gauge mediation scenario with hidden sector renormalization in MSSM

    Science.gov (United States)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-02-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5¯ minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  8. Multivariate longitudinal data analysis with mixed effects hidden Markov models.

    Science.gov (United States)

    Raffa, Jesse D; Dubin, Joel A

    2015-09-01

    Multiple longitudinal responses are often collected as a means to capture relevant features of the true outcome of interest, which is often hidden and not directly measurable. We outline an approach which models these multivariate longitudinal responses as generated from a hidden disease process. We propose a class of models which uses a hidden Markov model with separate but correlated random effects between multiple longitudinal responses. This approach was motivated by a smoking cessation clinical trial, where a bivariate longitudinal response involving both a continuous and a binomial response was collected for each participant to monitor smoking behavior. A Bayesian method using Markov chain Monte Carlo is used. Comparison of separate univariate response models to the bivariate response models was undertaken. Our methods are demonstrated on the smoking cessation clinical trial dataset, and properties of our approach are examined through extensive simulation studies. © 2015, The International Biometric Society.

  9. Discovering Hidden Controlling Parameters using Data Analytics and Dimensional Analysis

    Science.gov (United States)

    Del Rosario, Zachary; Lee, Minyong; Iaccarino, Gianluca

    2017-11-01

    Dimensional Analysis is a powerful tool, one which takes a priori information and produces important simplifications. However, if this a priori information - the list of relevant parameters - is missing a relevant quantity, then the conclusions from Dimensional Analysis will be incorrect. In this work, we present novel conclusions in Dimensional Analysis, which provide a means to detect this failure mode of missing or hidden parameters. These results are based on a restated form of the Buckingham Pi theorem that reveals a ridge function structure underlying all dimensionless physical laws. We leverage this structure by constructing a hypothesis test based on sufficient dimension reduction, allowing for an experimental data-driven detection of hidden parameters. Both theory and examples will be presented, using classical turbulent pipe flow as the working example. Keywords: experimental techniques, dimensional analysis, lurking variables, hidden parameters, buckingham pi, data analysis. First author supported by the NSF GRFP under Grant Number DGE-114747.

  10. Supersymmetry, p-brane duality, and hidden spacetime dimensions

    International Nuclear Information System (INIS)

    Bars, I.

    1996-01-01

    A global superalgebra with 32 supercharges and all possible central extensions is studied in order to extract some general properties of duality and hidden dimensions in a theory that treats p-branes democratically. The maximal number of dimensions is 12, with signature (10,2), containing one space and one time dimension that are hidden from the point of view of perturbative ten-dimensional string theory or its compactifications. When the theory is compactified on R d-1,1 circle-times T c+1,1 with d+c+2=12, there are isometry groups that relate to the hidden dimensions as well as to duality. Their combined intersecting classification schemes provide some properties of nonperturbative states and their couplings. copyright 1996 The American Physical Society

  11. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  12. The interest of gait markers in the identification of subgroups among fibromyalgia patients

    OpenAIRE

    Auvinet, Bernard; Chaleil, Denis; Cabane, Jean; Dumolard, Anne; Hatron, Pierre; Juvin, Robert; Lanteri-Minet, Michel; Mainguy, Yves; Negre-Pages, Laurence; Pillard, Fabien; Riviere, Daniel; Maugars, Yves-Michel

    2011-01-01

    Abstract Background Fibromyalgia (FM) is a heterogeneous syndrome and its classification into subgroups calls for broad-based discussion. FM subgrouping, which aims to adapt treatment according to different subgroups, relies in part, on psychological and cognitive dysfunctions. Since motor control of gait is closely related to cognitive function, we hypothesized that gait markers could be of interest in the identification of FM patients' subgroups. This controlled study aimed at characterizin...

  13. Subgrouping Poor Readers on the Basis of Individual Differences in Reading-Related Abilities

    OpenAIRE

    Catts, Hugh W.; Hogan, Tiffany; Fey, Marc E.

    2003-01-01

    The present study investigated the use of the Reading Component Model to subgroup poor readers. A large sample of poor readers was identified in second grade and subgrouped on the basis of relative strengths and weaknesses in word recognition and listening comprehension. Although homogeneous subgroups were not identified, poor readers could be classified into four subgroups that differed significantly in reading-related abilities. Further analyses showed that poor readers' strengths and weakn...

  14. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  15. Low-intensity interference effects and hidden-variable theories

    Energy Technology Data Exchange (ETDEWEB)

    Buonomano, V [Universidade Estadual de Campinas (Brazil). Inst. de Matematica

    1978-05-11

    The double-slit interference experiment and other similar experiments in the low-intensity limit (that is, one photon in the apparatus at a time) are examined in the spirit of Bell's work from the point of view of hidden-variable theories. It is found that there exists a class of hidden-variable theories which disagrees with quantum mechanics for a certain type of interference experiment. A manufactured conceptualization of this class, which is a particle view of interference, is described. An experiment, which appears to be feasible, is proposed to examine this disagreement.

  16. Application of Hidden Markov Models in Biomolecular Simulations.

    Science.gov (United States)

    Shukla, Saurabh; Shamsi, Zahra; Moffett, Alexander S; Selvam, Balaji; Shukla, Diwakar

    2017-01-01

    Hidden Markov models (HMMs) provide a framework to analyze large trajectories of biomolecular simulation datasets. HMMs decompose the conformational space of a biological molecule into finite number of states that interconvert among each other with certain rates. HMMs simplify long timescale trajectories for human comprehension, and allow comparison of simulations with experimental data. In this chapter, we provide an overview of building HMMs for analyzing bimolecular simulation datasets. We demonstrate the procedure for building a Hidden Markov model for Met-enkephalin peptide simulation dataset and compare the timescales of the process.

  17. Enhanced axion-photon coupling in GUT with hidden photon

    Science.gov (United States)

    Daido, Ryuji; Takahashi, Fuminobu; Yokozaki, Norimi

    2018-05-01

    We show that the axion coupling to photons can be enhanced in simple models with a single Peccei-Quinn field, if the gauge coupling unification is realized by a large kinetic mixing χ = O (0.1) between hypercharge and unbroken hidden U(1)H. The key observation is that the U(1)H gauge coupling should be rather strong to induce such large kinetic mixing, leading to enhanced contributions of hidden matter fields to the electromagnetic anomaly. We find that the axion-photon coupling is enhanced by about a factor of 10-100 with respect to the GUT-axion models with E / N = 8 / 3.

  18. Hidden Neural Networks: A Framework for HMM/NN Hybrids

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric; Krogh, Anders Stærmose

    1997-01-01

    This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN is nor...... HMMs on TIMIT continuous speech recognition benchmarks. On the task of recognizing five broad phoneme classes an accuracy of 84% is obtained compared to 76% for a standard HMM. Additionally, we report a preliminary result of 69% accuracy on the TIMIT 39 phoneme task...

  19. Search for hidden Higgs decay in ATLAS detector

    International Nuclear Information System (INIS)

    Gabrielli, A.

    2013-01-01

    In this paper, a brief overview of the search for the Higgs boson in Hidden Valley models is given. Hidden Valley models predict Higgs decays to neutral particles, which can be also long lived with decay paths comparable to the LHC detectors dimensions. Decay final states consist of collimated leptons (Lepton Jets). Results are presented of a search for Higgs decays to long lived particles in the ATLAS detector at the LHC, based on 1.92 fb −1 data collected during 2011 at a 7TeV center-of-mass energy.

  20. Detecting Faults By Use Of Hidden Markov Models

    Science.gov (United States)

    Smyth, Padhraic J.

    1995-01-01

    Frequency of false alarms reduced. Faults in complicated dynamic system (e.g., antenna-aiming system, telecommunication network, or human heart) detected automatically by method of automated, continuous monitoring. Obtains time-series data by sampling multiple sensor outputs at discrete intervals of t and processes data via algorithm determining whether system in normal or faulty state. Algorithm implements, among other things, hidden first-order temporal Markov model of states of system. Mathematical model of dynamics of system not needed. Present method is "prior" method mentioned in "Improved Hidden-Markov-Model Method of Detecting Faults" (NPO-18982).

  1. From the solar system fo hidden cosmic structures

    Energy Technology Data Exchange (ETDEWEB)

    Benes, K

    1987-01-01

    The development of experimental astrophysics showed that in the evolution of planets, natural processes of a common nature take place. They include, e.g., radiogenic heat, the production of magmas, volcanic activity, degassing, etc. The solar system is a cosmic formation in an advanced stage of development and it is a realistic assumption that in the Galaxy other hidden planetary systems in various stages of development exist. The views on the possibility of the origination of life in other systems differ; life, however, is seen as a hidden property of cosmic matter. (M.D.).

  2. Upgrading the safety toolkit: Initiatives of the accident analysis subgroup

    International Nuclear Information System (INIS)

    O'Kula, K.R.; Chung, D.Y.

    1999-01-01

    Since its inception, the Accident Analysis Subgroup (AAS) of the Energy Facility Contractors Group (EFCOG) has been a leading organization promoting development and application of appropriate methodologies for safety analysis of US Department of Energy (DOE) installations. The AAS, one of seven chartered by the EFCOG Safety Analysis Working Group, has performed an oversight function and provided direction to several technical groups. These efforts have been instrumental toward formal evaluation of computer models, improving the pedigree on high-use computer models, and development of the user-friendly Accident Analysis Guidebook (AAG). All of these improvements have improved the analytical toolkit for best complying with DOE orders and standards shaping safety analysis reports (SARs) and related documentation. Major support for these objectives has been through DOE/DP-45

  3. Report of the subgroup on experimental area upgrades

    International Nuclear Information System (INIS)

    Aronson, S.; Gollon, P.; Kantardjian, G.; Lanou, R.; Miller, D.; Pope, B.; Theriot, D.; Walker, W.

    1981-01-01

    This subgroup has been charged with the task of reconsidering these areas from the point of view of useability in the ISABELLE experimental program. As a result we have developed an ordered list of suggested improvements to each of the areas. The list is presented area-by-area, after some introductory remarks on the design considerations behind the present areas. The purpose of the list is to indicate the eventual scope of ISABELLE experimental areas, not to suggest that these upgrades should be put in place now. Indeed, although most of these additions will be needed regardless of which experiments are carried out, we think it prudent to wait for experiment approvals before the final design and installation of the suggested improvements

  4. Report on the α subgroup forward collider experiments

    International Nuclear Information System (INIS)

    Kwan, S.; Luk, K.B.

    1993-01-01

    The subgroup studied the potential of forward collider experiments for measuring the angle α using the B 0 →π + π - decay. In particular, they tried to answer the questions of what sensitivities the two different proposals (COBEX and forward BCD) could probe CP violation in the above decay mode in units of 10 7 seconds. A detailed comparison of the capabilities of the experiments would require extensive Monte Carlo estimates of the total number of reconstructed and tagged exclusive B meson decays as well as realistic estimates of the background. Both experiments have performed most of these calculations and their numbers have been used as the basis of discussion. Given the short time available in the workshop, the authors took the approach of examining the numbers presented by the proponents of the two experiments at the workshop and estimated what would be achievable

  5. Qualitative interaction trees: A tool to identify qualitative treatment-subgroup interactions

    NARCIS (Netherlands)

    Dusseldorp, E.; Mechelen, I. van

    2014-01-01

    When two alternative treatments (A and B) are available, some subgroup of patients may display a better outcome with treatment A than with B, whereas for another subgroup, the reverse may be true. If this is the case, a qualitative (i.e., disordinal) treatment-subgroup interaction is present. Such

  6. Latent class analysis derived subgroups of low back pain patients - do they have prognostic capacity?

    DEFF Research Database (Denmark)

    Mølgaard Nielsen, Anne; Hestbaek, Lise; Vach, Werner

    2017-01-01

    . Previously, we developed two novel suggestions for subgrouping patients with low back pain based on Latent Class Analysis of patient baseline characteristics (patient history and physical examination), which resulted in 7 subgroups when using a single-stage analysis, and 9 subgroups when using a two...

  7. QUINT : A tool to detect qualitative treatment-subgroup interactions in randomized controlled trials

    NARCIS (Netherlands)

    Doove, L.L.; Van Deun, K.; Dusseldorp, E.; van Mechelen, I.

    2016-01-01

    Objective: The detection of subgroups involved in qualitative treatment–subgroup interactions (i.e., for one subgroup of clients treatment A outperforms treatment B, whereas for another the reverse holds true) is crucial for personalized health. In typical Randomized Controlled Trials (RCTs), the

  8. Active Learning Increases Children's Physical Activity across Demographic Subgroups.

    Science.gov (United States)

    Bartholomew, John B; Jowers, Esbelle M; Roberts, Gregory; Fall, Anna-Mária; Errisuriz, Vanessa L; Vaughn, Sharon

    2018-01-01

    Given the need to find more opportunities for physical activity within the elementary school day, this study was designed to asses the impact of I-CAN!, active lessons on: 1) student physical activity (PA) outcomes via accelerometry; and 2) socioeconomic status (SES), race, sex, body mass index (BMI), or fitness as moderators of this impact. Participants were 2,493 fourth grade students (45.9% male, 45.8% white, 21.7% low SES) from 28 central Texas elementary schools randomly assigned to intervention (n=19) or control (n=9). Multilevel regression models evaluated the effect of I-CAN! on PA and effect sizes were calculated. The moderating effects of SES, race, sex, BMI, and fitness were examined in separate models. Students in treatment schools took significantly more steps than those in control schools (β = 125.267, SE = 41.327, p = .002, d = .44). I-CAN! had a significant effect on MVPA with treatment schools realizing 80% (β = 0.796, SE =0.251, p = .001; d = .38) more MVPA than the control schools. There were no significant school-level differences on sedentary behavior (β = -0.177, SE = 0.824, p = .83). SES, race, sex, BMI, and fitness level did not moderate the impact of active learning on step count and MVPA. Active learning increases PA within elementary students, and does so consistently across demographic sub-groups. This is important as these sub-groups represent harder to reach populations for PA interventions. While these lessons may not be enough to help children reach daily recommendations of PA, they can supplement other opportunities for PA. This speaks to the potential of schools to adopt policy change to require active learning.

  9. Hidden Pair of Supermassive Black Holes

    Science.gov (United States)

    Kohler, Susanna

    2015-08-01

    Could a pair of supermassive black holes (SMBHs) be lurking at the center of the galaxy Mrk 231? A recent study finds that this may be the case and the unique spectrum of this galaxy could be the key to discovering more hidden binary SMBH systems.Where Are the Binary Supermassive Black Holes?Its believed that most, if not all, galaxies have an SMBH at their centers. As two galaxies merge, the two SMBHs should evolve into a closely-bound binary system before they eventually merge. Given the abundance of galaxy mergers, we would expect to see the kinematic and visual signatures of these binary SMBHs among observed active galactic nuclei yet such evidence for sub-parsec binary SMBH systems remains scarce and ambiguous. This has led researchers to wonder: is there another way that we might detect these elusive systems?A collaboration led by Chang-Shuo Yan (National Astronomical Observatories, Chinese Academy of Sciences) thinks that there is. The group suggests that these systems might have distinct signatures in their optical-to-UV spectra, and they identify a system that might be just such a candidate: Mrk 231.A Binary CandidateProposed model of Mrk 231. Two supermassive black holes, each with their own mini-disk, orbit each other in the center of a circumbinary disk. The secondary black hole has cleared gap in the circumbinary disk as a result of its orbit around the primary black hole. [Yan et al. 2015]Mrk 231 is a galaxy with a disturbed morphology and tidal tails strong clues that it might be in the final stages of a galactic merger. In addition to these signs, Mrk 231 also has an unusual spectrum for a quasar: its continuum emission displays an unexpected drop in the near-UV band.Yan and her collaborators propose that the odd behavior of Mrk 231s spectrum can be explained if the center of the galaxy houses a pair of SMBHs each with its own mini accretion disk surrounded by a circumbinary accretion disk. As the secondary SMBH orbits the primary SMBH (with a

  10. Prevention of falls in nursing homes: subgroup analyses of a randomized fall prevention trial.

    Science.gov (United States)

    Rapp, Kilian; Lamb, Sarah E; Büchele, Gisela; Lall, Ranjit; Lindemann, Ulrich; Becker, Clemens

    2008-06-01

    To evaluate the effectiveness of a multifactorial fall prevention program in prespecified subgroups of nursing home residents. Secondary analysis of a cluster-randomized, controlled trial. Six nursing homes in Germany. Seven hundred twenty-five long-stay residents; median age 86; 80% female. Staff and resident education on fall prevention, advice on environmental adaptations, recommendation to wear hip protectors, and progressive balance and resistance training. Time to first fall and the number of falls. Falls were assessed during the 12-month intervention period. Univariate regression analyses were performed, including a confirmatory test of interaction. The intervention was more effective in people with cognitive impairment (hazard ratio (HR)=0.49, 95% confidence interval (CI)=0.35-0.69) than in those who were cognitively intact (HR=0.91, 95% CI=0.68-1.22), in people with a prior history of falls (HR=0.47, 95% CI=0.33-0.67) than in those with no prior fall history (HR=0.77, 95% CI=0.58-1.01), in people with urinary incontinence (HR=0.59, 95% CI=0.45-0.77) than in those with no urinary incontinence (HR=0.98, 95% CI=0.68-1.42), and in people with no mood problems (incidence rate ratio (IRR)=0.41, 95% CI=0.27-0.61) than in those with mood problems (IRR=0.74, 95% CI=0.51-1.09). The effectiveness of a multifactorial fall prevention program differed between subgroups of nursing home residents. Cognitive impairment, a history of falls, urinary incontinence, and depressed mood were important in determining response.

  11. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  12. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    International Nuclear Information System (INIS)

    Itoh, H.; Okada, N.; Yamashita, T.

    2007-01-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden. (author)

  13. Small temporal pole encephalocele: A hidden cause of "normal" MRI temporal lobe epilepsy.

    Science.gov (United States)

    Toledano, Rafael; Jiménez-Huete, Adolfo; Campo, Pablo; Poch, Claudia; García-Morales, Irene; Gómez Angulo, Juan Carlos; Coras, Roland; Blümcke, Ingmar; Álvarez-Linera, Juan; Gil-Nagel, Antonio

    2016-05-01

    Small temporal pole encephalocele (STPE) can be the pathologic substrate of epilepsy in a subgroup of patients with noninformative magnetic resonance imaging (MRI). Herein, we analyzed the clinical, neurophysiologic, and radiologic features of the epilepsy found in 22 patients with STPE, and the frequency of STPE in patients with refractory focal epilepsy (RFE). We performed an observational study of all patients with STPE identified at our epilepsy unit from January 2007 to December 2014. Cases were detected through a systematic search of our database of RFE patients evaluated for surgery, and a prospective collection of patients identified at the outpatient clinic. The RFE database was also employed to analyze the frequency of STPE among the different clinical subgroups. We identified 22 patients with STPE (11 women), including 12 (4.0%) of 303 patients from the RFE database, and 10 from the outpatient clinic. The median age was 51.5 years (range 29-75) and the median age at seizure onset was 38.5 years (range 15-73). Typically, 12 (80%) of 15 patients with left STPE reported seizures with impairment of language. Among the RFE cases, STPE were found in 9.6% of patients with temporal lobe epilepsy (TLE), and in 0.5% of those with extra-TLE (p = 0.0001). STPEs were more frequent in TLE patients with an initial MRI study reported as normal (23.3%) than in those with MRI-visible lesions (1.4%; p = 0.0002). Stereo-electroencephalography was performed in four patients, confirming the localization of the epileptogenic zone at the temporal pole with late participation of the hippocampus. Long-term seizure control was achieved in four of five operated patients. STPE can be a hidden cause of TLE in a subgroup of patients with an initial report of "normal" MRI. Early identification of this lesion may help to select patients for presurgical evaluation and tailored resection. Wiley Periodicals, Inc. © 2016 International League Against Epilepsy.

  14. On the hidden maxwell superalgebra underlying D = 4 supergravity

    Energy Technology Data Exchange (ETDEWEB)

    Penafiel, D.M. [Departamento de Fisica, Universidad de Concepcion (Chile); DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy); Ravera, L. [DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy)

    2017-09-15

    In this work, we expand the hidden AdS-Lorentz superalgebra underlying D = 4 supergravity, reaching a (hidden) Maxwell superalgebra. The latter can be viewed as an extension involving cosmological constant of the superalgebra underlying D = 4 supergravity in flat spacetime. We write the Maurer-Cartan equations in this context and we find some interesting extensions of the antisymmetric 3-form A{sup (3)} appearing in the Free Differential Algebra in Minkowski space. The structure of Free Differential Algebras is obtained by considering the zero curvature equations. We write the parametrization of A{sup (3)} in terms of 1-forms and we rend the topological features of its extensions manifest. We interestingly find out that the structure of these extensions, and consequently the structure of the corresponding boundary contribution dA{sup (3)}, strongly depends on the form of the extra fermionic generator appearing in the hidden Maxwell superalgebra. The model we develop in this work is defined in an enlarged superspace with respect to the ordinary one, and the extra bosonic and fermionic 1-forms required for the closure of the hidden Maxwell superalgebra must be considered as physical fields in this enlarged superspace. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  15. Generalized inequalities for quantum correlations with hidden variables

    International Nuclear Information System (INIS)

    Vinduska, M.

    1991-01-01

    Renowned inequalities for quantum correlations are generalized for the case when quantum system cannot be described with an absolute independent measure of the probability. Such a formulation appears to be suitable for the formulation of the hidden variables theory in terms of non-Euclidean geometry. 10 refs

  16. The incompatibility between local hidden variable theories and the ...

    Indian Academy of Sciences (India)

    I discuss in detail the result that the Bell's inequalities derived in the context of local hidden variable theories for discrete quantized observables can be satisfied only if a fundamental conservation law is violated on the average. This result shows that such theories are physically nonviable, and makes the demarcating criteria ...

  17. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  18. Hidden symmetries of the Principal Chiral Model unveiled

    International Nuclear Information System (INIS)

    Devchand, C.; Schiff, J.

    1996-12-01

    By relating the two-dimensional U(N) Principal Chiral Model to a Simple linear system we obtain a free-field parametrization of solutions. Obvious symmetry transformations on the free-field data give symmetries of the model. In this way all known 'hidden symmetries' and Baecklund transformations, as well as a host of new symmetries, arise. (author). 21 refs

  19. A hidden bias in a common calorimeter calibration scheme

    International Nuclear Information System (INIS)

    Lincoln, Don; Morrow, Greg; Kasper, Peter

    1994-01-01

    In this paper, a common calorimeter calibration scheme is explored and a hidden bias found. Since this bias mimics a non-linearity in response in the calorimeter, it must be understood and removed from the calibration before true non-linearities are investigated. The effect and its removal are explored and understood through straightforward calculus and algebra. ((orig.))

  20. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  1. Crisis Entrepreneurs and Hidden Crises : Illustrative Examples of Interactional

    NARCIS (Netherlands)

    Prof. Cees van Woerkum; dr. Annette Klarenbeek

    2012-01-01

    We examine the ways in which a hidden crisis can be exposed from a communication point of view. In which way can organisations create general awareness of a crisis and try to understand the dynamic nature of interactions? With the help of discourse analysis, we have examined the interactional

  2. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...... functions are also discussed....

  3. Duality and hidden symmetries in interacting particle systems

    NARCIS (Netherlands)

    Giardinà, C.; Kurchan, J.; Redig, F.H.J.; Vafayi, K.

    2009-01-01

    In the context of Markov processes, both in discrete and continuous setting, we show a general relation between duality functions and symmetries of the generator. If the generator can be written in the form of a Hamiltonian of a quantum spin system, then the "hidden" symmetries are easily derived.

  4. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving ...

  5. Is There Hidden Potential for Rural Population Growth in Sweden?

    Science.gov (United States)

    Niedomysl, Thomas; Amcoff, Jan

    2011-01-01

    Rural depopulation is a concern in many countries, and various policy initiatives have been taken to combat such trends. This article examines whether hidden potential for rural population growth can be found in Sweden. If such potential exists, it implies that the development prospects for many rural areas are not as unpromising as they may seem…

  6. Optimisation of Hidden Markov Model using Baum–Welch algorithm

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 126; Issue 1. Optimisation of Hidden Markov Model using Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya. J C Joshi Tankeshwar Kumar Sunita Srivastava Divya Sachdeva. Volume 126 Issue 1 February 2017 ...

  7. Hidden Markov Model for quantitative prediction of snowfall

    Indian Academy of Sciences (India)

    A Hidden Markov Model (HMM) has been developed for prediction of quantitative snowfall in Pir-Panjal and Great Himalayan mountain ranges of Indian Himalaya. The model predicts snowfall for two days in advance using daily recorded nine meteorological variables of past 20 winters from 1992–2012. There are six ...

  8. Light hidden-sector U(1)s in string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-15

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  9. Book Review: "Hidden Markov Models for Time Series: An ...

    African Journals Online (AJOL)

    Hidden Markov Models for Time Series: An Introduction using R. by Walter Zucchini and Iain L. MacDonald. Chapman & Hall (CRC Press), 2009. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/saaj.v10i1.61717 · AJOL African Journals Online.

  10. TeraHertz imaging of hidden paint layers on canvas

    NARCIS (Netherlands)

    Adam, A.J.L.; Planken, P.C.M.; Meloni, S.; Dik, J.

    2009-01-01

    We show terahertz reflection images of hidden paint layers in a painting on canvas and compare the results with X-ray Radiography and Infrared Reflectography. Our terahertz measurements show strong reflections from both the canvas/paint interface and from the raw umber/lead white interface,

  11. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  12. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  13. Hidden and generalized conformal symmetry of Kerr–Sen spacetimes

    International Nuclear Information System (INIS)

    Ghezelbash, A M; Siahaan, H M

    2013-01-01

    It is recently conjectured that generic non-extremal Kerr black hole could be holographically dual to a hidden conformal field theory (CFT) in two dimensions. Moreover, it is known that there are two CFT duals (pictures) to describe the charged rotating black holes which correspond to angular momentum J and electric charge Q of the black hole. Furthermore these two pictures can be incorporated by the CFT duals (general picture) that are generated by SL(2,Z) modular group. The general conformal structure can be revealed by looking at charged scalar wave equation in some appropriate values of frequency and charge. In this regard, we consider the wave equation of a charged massless scalar field in the background of Kerr–Sen black hole and show that in the ‘near region’, the wave equation can be reproduced by the Casimir operator of a local SL(2,R) L ×SL(2,R) R hidden conformal symmetry. We find the exact agreement between macroscopic and microscopic physical quantities like entropy and absorption cross section of scalars for Kerr–Sen black hole. We then find an extension of vector fields that in turn yields an extended local family of SL(2,R) L ×SL(2,R) R hidden conformal symmetry, parameterized by one parameter. For some special values of the parameter, we find a copy of SL(2,R) hidden conformal algebra for the charged Gibbons–Maeda–Garfinkle–Horowitz–Strominger black hole in the strong deflection limit. (paper)

  14. Light hidden-sector U(1)s in string compactifications

    International Nuclear Information System (INIS)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-01

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  15. Securing Localization With Hidden and Mobile Base Stations

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Srivastava, Mani; Cagalj, Mario

    2006-01-01

    localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure nodecentric...

  16. Optimal Number of States in Hidden Markov Models and its ...

    African Journals Online (AJOL)

    In this paper, Hidden Markov Model is applied to model human movements as to facilitate an automatic detection of the same. A number of activities were simulated with the help of two persons. The four movements considered are walking, sitting down-getting up, fall while walking and fall while standing. The data is ...

  17. Book review: Troubling possibility, hidden fires and secret drawers ...

    African Journals Online (AJOL)

    Book review: Troubling possibility, hidden fires and secret drawers: Tiyambe Zeleza's smouldering charcoal. H.F. Ross. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL.

  18. Charm and Hidden Charm Scalar Resonances in Nuclear Matter

    NARCIS (Netherlands)

    Tolos, Laura; Molina, Raquel; Gamermann, Daniel; Oset, Eulogio

    2009-01-01

    We study the properties of the scalar charm resonances D(s0)(2317) and D(0)(2400), and the theoretical hidden charm state X(3700) in nuclear matter. We find that for the D(s0)(2317) and X(3700) resonances, with negligible and small width at zero density, respectively, the width becomes about 100 MeV

  19. Hidden Markov model for improved ultrasound-based presence detection

    NARCIS (Netherlands)

    Jaramillo Garcia, P.A.; Linnartz, J.P.M.G.

    2015-01-01

    Adaptive lighting systems typically use a presence detector to save energy by switching off lights in unoccupied rooms. However, it is highly annoying when lights are erroneously turned off while a user is present (false negative, FN). This paper focuses on the estimation of presence, using a Hidden

  20. Job Clubs: Getting into the Hidden Labor Market.

    Science.gov (United States)

    Kimeldorf, Martin; Tornow, Janice A.

    1984-01-01

    A job club approach for secondary disabled youth focuses on mastering job seeking skills by behaviorally sequenced steps learned in situational experiences within a self-help group process framework. Students learn to penetrate the hidden job market, to use social networking via the telephone, and to participate successfully in job interviews. (CL)

  1. Unpacking the Hidden Efficacies of Learning in Productive Failure

    Science.gov (United States)

    Hung, David; Chen, Victor; Lim, Seo Hong

    2009-01-01

    This paper describes a framework for learning where learners undergo experimentations with the phenomena at hand according to progressive and staged goals. Bowling is used as a case study in this paper. The premise for experimentations is that learners can experience hidden efficacies, including the formation of "bad habits." A distinction is made…

  2. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  3. Anatomic and Physiologic Heterogeneity of Subgroup-A Auditory Sensory Neurons in Fruit Flies.

    Science.gov (United States)

    Ishikawa, Yuki; Okamoto, Natsuki; Nakamura, Mizuki; Kim, Hyunsoo; Kamikouchi, Azusa

    2017-01-01

    The antennal ear of the fruit fly detects acoustic signals in intraspecific communication, such as the courtship song and agonistic sounds. Among the five subgroups of mechanosensory neurons in the fly ear, subgroup-A neurons respond maximally to vibrations over a wide frequency range between 100 and 1,200 Hz. The functional organization of the neural circuit comprised of subgroup-A neurons, however, remains largely unknown. In the present study, we used 11 GAL4 strains that selectively label subgroup-A neurons and explored the diversity of subgroup-A neurons by combining single-cell anatomic analysis and Ca 2+ imaging. Our findings indicate that the subgroup-A neurons that project into various combinations of subareas in the brain are more anatomically diverse than previously described. Subgroup-A neurons were also physiologically diverse, and some types were tuned to a narrow frequency range, suggesting that the response of subgroup-A neurons to sounds of a wide frequency range is due to the existence of several types of subgroup-A neurons. Further, we found that an auditory behavioral response to the courtship song of flies was attenuated when most subgroup-A neurons were silenced. Together, these findings characterize the heterogeneous functional organization of subgroup-A neurons, which might facilitate species-specific acoustic signal detection.

  4. Baryon states with hidden charm in the extended local hidden gauge approach

    International Nuclear Information System (INIS)

    Uchino, T.; Oset, E.; Liang, Wei-Hong

    2016-01-01

    The s-wave interaction of anti DΛ c , anti DΣ c , anti D * Λ c , anti D * Σ c and anti DΣ c * , anti D * Σ c * , is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ c - anti D * Σ c with J = 1/2, and two of anti DΣ c * - anti D * Σ c * with J = 3/2. Moreover, we find a anti D * Σ c resonance which couples to the anti DΛ c channel and one spin degenerated bound state of anti D * Σ c * with J = 1/2,5/2. (orig.)

  5. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  6. Subgroup analyses in randomised controlled trials: cohort study on trial protocols and journal publications.

    Science.gov (United States)

    Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2014-07-16

    To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.

  7. The Physiological Bases of Hidden Noise-Induced Hearing Loss: Protocol for a Functional Neuroimaging Study.

    Science.gov (United States)

    Dewey, Rebecca Susan; Hall, Deborah A; Guest, Hannah; Prendergast, Garreth; Plack, Christopher J; Francis, Susan T

    2018-03-09

    Rodent studies indicate that noise exposure can cause permanent damage to synapses between inner hair cells and high-threshold auditory nerve fibers, without permanently altering threshold sensitivity. These demonstrations of what is commonly known as hidden hearing loss have been confirmed in several rodent species, but the implications for human hearing are unclear. Our Medical Research Council-funded program aims to address this unanswered question, by investigating functional consequences of the damage to the human peripheral and central auditory nervous system that results from cumulative lifetime noise exposure. Behavioral and neuroimaging techniques are being used in a series of parallel studies aimed at detecting hidden hearing loss in humans. The planned neuroimaging study aims to (1) identify central auditory biomarkers associated with hidden hearing loss; (2) investigate whether there are any additive contributions from tinnitus or diminished sound tolerance, which are often comorbid with hearing problems; and (3) explore the relation between subcortical functional magnetic resonance imaging (fMRI) measures and the auditory brainstem response (ABR). Individuals aged 25 to 40 years with pure tone hearing thresholds ≤20 dB hearing level over the range 500 Hz to 8 kHz and no contraindications for MRI or signs of ear disease will be recruited into the study. Lifetime noise exposure will be estimated using an in-depth structured interview. Auditory responses throughout the central auditory system will be recorded using ABR and fMRI. Analyses will focus predominantly on correlations between lifetime noise exposure and auditory response characteristics. This paper reports the study protocol. The funding was awarded in July 2013. Enrollment for the study described in this protocol commenced in February 2017 and was completed in December 2017. Results are expected in 2018. This challenging and comprehensive study will have the potential to impact diagnostic

  8. Subgroup approximation in Monte Carlo neutron transport calculation in resonance region; Primena podgrupe aproksimacije u Monte Carlo proracunima transporta neutrona u rezonantnoj oblasti energije

    Energy Technology Data Exchange (ETDEWEB)

    Belicev, P [Vojnotehnicki Inst., Belgrade (Yugoslavia)

    1988-07-01

    An outline of the problems encountered in the multigroup calculations of the neutron transport in the resonance region is given. The difference between subgroup and multigroup approximation is described briefly. The features of the Monte Carlo code SUBGR are presented. The results of the calculations of the neutron transmission and albedo for infinite iron slabs are given. (author)

  9. A Hidden Markov Model for Urban-Scale Traffic Estimation Using Floating Car Data.

    Science.gov (United States)

    Wang, Xiaomeng; Peng, Ling; Chi, Tianhe; Li, Mengzhu; Yao, Xiaojing; Shao, Jing

    2015-01-01

    Urban-scale traffic monitoring plays a vital role in reducing traffic congestion. Owing to its low cost and wide coverage, floating car data (FCD) serves as a novel approach to collecting traffic data. However, sparse probe data represents the vast majority of the data available on arterial roads in most urban environments. In order to overcome the problem of data sparseness, this paper proposes a hidden Markov model (HMM)-based traffic estimation model, in which the traffic condition on a road segment is considered as a hidden state that can be estimated according to the conditions of road segments having similar traffic characteristics. An algorithm based on clustering and pattern mining rather than on adjacency relationships is proposed to find clusters with road segments having similar traffic characteristics. A multi-clustering strategy is adopted to achieve a trade-off between clustering accuracy and coverage. Finally, the proposed model is designed and implemented on the basis of a real-time algorithm. Results of experiments based on real FCD confirm the applicability, accuracy, and efficiency of the model. In addition, the results indicate that the model is practicable for traffic estimation on urban arterials and works well even when more than 70% of the probe data are missing.

  10. Cyclic subgroups in class groups of real quadratic fields

    International Nuclear Information System (INIS)

    Washington, L.C.; Zhang Xianke.

    1994-01-01

    While examining the class numbers of the real quadratic field Q(√n 2 + 3n + 9), we observed that the class number is often a multiple of 3. There is a simple explanation for this, namely -27 = (2n + 3) 2 - 4(n 2 + 3n + 9), so the cubes of the prime ideals above 3 are principal. If the prime ideals themselves are non-principal then 3 must divide the class number. In the present paper, we study this idea from a couple different directions. In the first section we present a criterion that allows us to show that the ideal class group of a real quadratic field has a cyclic subgroup of a given order n. We then give several families of fields to which this criterion applies, hence in which the ideal class groups contain elements of order n. In the second section, we discuss the situation where there is only a potential element of order p (=an odd prime) in the class group, such as the situation described above. We present a modification of the Cohen-Lenstra heuristics for the probability that in this situation the class number is actually a multiple of p. We also extend this idea to predict how often the potential element of order p is actually non-trivial. Both of these predictions agree fairly well with the numerical data. (author). 14 refs, 2 tabs

  11. Topography and Volcanology of the Huangtsuishan Volcano Subgroup, Northern Taiwan

    Directory of Open Access Journals (Sweden)

    Yu-Ming Lai

    2010-01-01

    Full Text Available Combining the shaded relief topography model and the slope map from the Digital Terrain Model (DTM images, toporaphical map, field occurrences and petrography, the volcanic sequences of the Huangtsuishan Volcano Subgroup (HVS can be constructed. Two types of volcanic centers can be identified in this area. One is the Tachienhou volcanic dome, which may be located in the center of an older caldera. The other is the Huangtsui composite volcano, which is composed of interbedding lava flows and pyroclastic deposits with a volcanic crater named the Huangtsui pond at the summit. Eight lava plateaus radiated from Mts. Huangtsui and Tachienhou to the north and the east can be distinguished based on the DTM images. The volcanic deposits are comprised of four lithofacies, the lava flows, pyroclastic breccias, tuffs and lahars on the base of field occurrences. At least thirteen layers of lava flow, named the H1 to H13 can be recognized in the HVS and can be reconstructed and categorized into four stages. An old and large volcano erupted lava flows to form the products of stages one and two, then collapsed to form a caldera with a dome for the third stage. The latest stage of lava flow was poured out from the Huangtsui volcano, which formed a crater at the summit.

  12. OMERACT-based fibromyalgia symptom subgroups: an exploratory cluster analysis.

    Science.gov (United States)

    Vincent, Ann; Hoskin, Tanya L; Whipple, Mary O; Clauw, Daniel J; Barton, Debra L; Benzo, Roberto P; Williams, David A

    2014-10-16

    The aim of this study was to identify subsets of patients with fibromyalgia with similar symptom profiles using the Outcome Measures in Rheumatology (OMERACT) core symptom domains. Female patients with a diagnosis of fibromyalgia and currently meeting fibromyalgia research survey criteria completed the Brief Pain Inventory, the 30-item Profile of Mood States, the Medical Outcomes Sleep Scale, the Multidimensional Fatigue Inventory, the Multiple Ability Self-Report Questionnaire, the Fibromyalgia Impact Questionnaire-Revised (FIQ-R) and the Short Form-36 between 1 June 2011 and 31 October 2011. Hierarchical agglomerative clustering was used to identify subgroups of patients with similar symptom profiles. To validate the results from this sample, hierarchical agglomerative clustering was repeated in an external sample of female patients with fibromyalgia with similar inclusion criteria. A total of 581 females with a mean age of 55.1 (range, 20.1 to 90.2) years were included. A four-cluster solution best fit the data, and each clustering variable differed significantly (P FIQ-R total scores (P = 0.0004)). In our study, we incorporated core OMERACT symptom domains, which allowed for clustering based on a comprehensive symptom profile. Although our exploratory cluster solution needs confirmation in a longitudinal study, this approach could provide a rationale to support the study of individualized clinical evaluation and intervention.

  13. An inverse source problem of the Poisson equation with Cauchy data

    Directory of Open Access Journals (Sweden)

    Ji-Chuan Liu

    2017-05-01

    Full Text Available In this article, we study an inverse source problem of the Poisson equation with Cauchy data. We want to find iterative algorithms to detect the hidden source within a body from measurements on the boundary. Our goal is to reconstruct the location, the size and the shape of the hidden source. This problem is ill-posed, regularization techniques should be employed to obtain the regularized solution. Numerical examples show that our proposed algorithms are valid and effective.

  14. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping....../education isn’t a negotiable path for them. The theoretical approach of this paper draws on inspiration from Paul Willis (Learning to labour, 1979) and Donald Broady (Den dolda läroplanen, 1981). The goal is to revitalize and develop the work of Willis and Broady in the context of the current retention and drop...

  15. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2015-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping....../education isn’t a negotiable path for them. The theoretical approach of this paper draws on inspiration from Paul Willis (Learning to labour, 1979) and Donald Broady (Den dolda läroplanen, 1981). The goal is to revitalize and develop the work of Willis and Broady in the context of the current retention and drop...

  16. Hidden photons in beam dump experiments and in connection with dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-12-15

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  17. Hidden photons in beam dump experiments and in connection with dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah

    2012-12-01

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  18. Hidden biases in Australian energy policy

    International Nuclear Information System (INIS)

    Schlaepfer, August

    2009-01-01

    The challenges in developing technology for the capture and storage of CO 2 from coal, oil and gas power generation, as well as those associated with the storage of nuclear waste, are widely regarded as solvable. According to proponents of clean coal, oil and gas technologies, as well as the proponents of nuclear technology, it is only a matter of time and resources to find a solution to their waste problems. Similarly, the Australian Government argues that our main efforts need to be concentrated on clean coal technologies, as well as considering the nuclear option. However, when it comes to the challenges associated with renewable energy technologies, like intermittency of wind generated grid power, storage of electricity from renewable energy and so on, there seems to be an attitude amongst Australian energy planners that these challenges represent insurmountable technical and financial problems, and will, at least in the short to medium term, prevent them from becoming a viable alternative to coal, oil, gas and uranium based energy technologies. (author)

  19. An impossibility theorem for parameter independent hidden variable theories

    Science.gov (United States)

    Leegwater, Gijs

    2016-05-01

    Recently, Roger Colbeck and Renato Renner (C&R) have claimed that '[n]o extension of quantum theory can have improved predictive power' (Colbeck & Renner, 2011, 2012b). If correct, this is a spectacular impossibility theorem for hidden variable theories, which is more general than the theorems of Bell (1964) and Leggett (2003). Also, C&R have used their claim in attempt to prove that a system's quantum-mechanical wave function is in a one-to-one correspondence with its 'ontic' state (Colbeck & Renner, 2012a). C&R's claim essentially means that in any hidden variable theory that is compatible with quantum-mechanical predictions, probabilities of measurement outcomes are independent of these hidden variables. This makes such variables otiose. On closer inspection, however, the generality and validity of the claim can be contested. First, it is based on an assumption called 'Freedom of Choice'. As the name suggests, this assumption involves the independence of an experimenter's choice of measurement settings. But in the way C&R define this assumption, a no-signalling condition is surreptitiously presupposed, making the assumption less innocent than it sounds. When using this definition, any hidden variable theory violating parameter independence, such as Bohmian Mechanics, is immediately shown to be incompatible with quantum-mechanical predictions. Also, the argument of C&R is hard to follow and their mathematical derivation contains several gaps, some of which cannot be closed in the way they suggest. We shall show that these gaps can be filled. The issue with the 'Freedom of Choice' assumption can be circumvented by explicitly assuming parameter independence. This makes the result less general, but better founded. We then obtain an impossibility theorem for hidden variable theories satisfying parameter independence only. As stated above, such hidden variable theories are impossible in the sense that any supplemental variables have no bearing on outcome probabilities

  20. Subgroup report on hard x-ray microprobes

    International Nuclear Information System (INIS)

    Ice, G.E.; Barbee, T.; Bionta, R.; Howells, M.; Thompson, A.C.; Yun, W.

    1994-01-01

    The increasing availability of synchrotron x-ray sources has stimulated the development of advanced hard x-ray (E≥5 keV) microprobes. New x-ray optics have been demonstrated which show promise for achieving intense submicron hard x-ray probes. These probes will be used for extraordinary elemental detection by x-ray fluorescence/absorption and for microdiffraction to identify phase and strain. The inherent elemental and crystallographic sensitivity of an x-ray microprobe and its inherently nondestructive and penetrating nature makes the development of an advanced hard x-ray microprobe an important national goal. In this workshop state-of-the-art hard x-ray microprobe optics were described and future directions were discussed. Gene Ice, Oak Ridge National Laboratory (ORNL), presented an overview of the current status of hard x-ray microprobe optics and described the use of crystal spectrometers to improve minimum detectable limits in fluorescent microprobe experiments. Al Thompson, Lawrence Berkeley Laboratory (LBL), described work at the Center for X-ray Optics to develop a hard x-ray microprobe based on Kirkpatrick-Baez (KB) optics. Al Thompson also showed the results of some experimental measurements with their KB optics. Malcolm Howells presented a method for bending elliptical mirrors and Troy Barbee commented on the use of graded d spacings to achieve highest efficiency in KB multilayer microfocusing. Richard Bionta, Lawrence Livermore National Laboratory (LLNL), described the development of the first hard x-ray zone plates and future promise of so called open-quotes jelly rollclose quotes or sputter slice zone plates. Wenbing Yun, Argonne National Laboratory (ANL), described characterization of jelly roll and lithographically produced zone plates and described the application of zone plates to focus extremely narrow bandwidths by nuclear resonance. This report summarizes the presentations of the workshop subgroup on hard x-ray microprobes

  1. Chromosome sizes of phytoplasmas composing major phylogenetic groups and subgroups.

    Science.gov (United States)

    Marcone, C; Neimark, H; Ragozzino, A; Lauer, U; Seemüller, E

    1999-09-01

    ABSTRACT Chromosome sizes of 71 phytoplasmas belonging to 12 major phylogenetic groups including several of the aster yellows subgroups were estimated from electrophoretic mobilities of full-length chromosomes in pulsed-field gels. Considerable variation in genome size, from 660 to 1,130 kilobases (kb), was observed among aster yellows phytoplasmas. Chromosome size heterogeneity was also observed in the stolbur phytoplasma group (range 860 to 1,350 kb); in this group, isolate STOLF contains the largest chromosome found in a phytoplasma to date. A wide range of chromosome sizes, from 670 to 1,075 kb, was also identified in the X-disease group. The other phytoplasmas examined, which included members of the apple proliferation, Italian alfalfa witches' broom, faba bean phyllody, pigeon pea witches' broom, sugarcane white leaf, Bermuda grass white leaf, ash yellows, clover proliferation, and elm yellows groups, all have chromosomes smaller than 1 megabase, and the size ranges within each of these groups is narrower than in the aster yellows, stolbur, and X-disease groups. The smallest chromosome, approximately 530 kb, was found in two Bermuda grass white leaf phytoplasma isolates. This not only is the smallest mollicute chromosome found to date, but also is the smallest chromosome known for any cell. More than one large DNA band was observed in several phytoplasma preparations. Possible explanations for the occurrence of more than one band may be infection of the host plant by different phytoplasmas, the presence of more than one chromosome in the same organism, or the presence of large extrachromosomal DNA elements.

  2. Identification of subgroups of patients with low back pain using Latent Class Analysis

    DEFF Research Database (Denmark)

    Nielsen, Anne Mølgaard

    questionnaire and the clinicians’ findings on a standardised examination of the low back. By using pattern recognition, subgroups of patients were identified within which their responses and scores are similar, and therefore the patients are more alike within the subgroups than across the subgroups. Latent......, the optimal application of the LCA method in this context is unknown and therefore, two methodological considerations were addressed during the process. Firstly, when using existing questionnaire data, whether using each single item or the summary scores would provide better subgroup information. Secondly...... the questionnaires was preferred, due to the more nuanced description available within the resulting subgroups. Therefore, the single‐item strategy was used in the subsequent single‐stage and two‐stage LCA, which identified seven and nine patient subgroups, respectively, with similar face validity and adequate...

  3. Subgroup-specific intrinsic disorder profiles of arabidopsis NAC transcription factors

    DEFF Research Database (Denmark)

    Stender, Emil G.; O'Shea, Charlotte; Skriver, Karen

    2015-01-01

    disordered but contain short, functionally important regions with structure propensities known as molecular recognition features. Here, we analyze for NAC subgroup-specific ID patterns. Some subgroups, such as the VND subgroup implicated in secondary cell wall biosynthesis, and the NAP/SHYG subgroup have...... highly conserved ID profiles. For the stress-associated ATAF1 subgroup and the CUC/ORE1 subgroup involved in development, only sub clades have similar ID patterns. For similar ID profiles, conserved molecular recognition features and sequence motifs represent likely functional determinants of e.......g. transcriptional activation and interactions. Based on our analysis, we suggest that ID profiling of regulatory proteins in general can be used to guide identification of interaction partners of network proteins....

  4. Different demographic, genetic, and longitudinal traits in language versus memory Alzheimer's subgroups.

    Science.gov (United States)

    Mez, Jesse; Cosentino, Stephanie; Brickman, Adam M; Huey, Edward D; Mayeux, Richard

    2013-01-01

    The study's objective was to compare demographics, APOE genotypes, and rate of rise over time in functional impairment in neuropsychologically defined language, typical, and memory subgroups of clinical Alzheimer's disease (AD). 1,368 participants from the National Alzheimer's Coordinating Center database with a diagnosis of probable AD (CDR 0.5-1.0) were included. A language subgroup (n = 229) was defined as having language performance >1 SD worse than memory performance. A memory subgroup (n = 213) was defined as having memory performance >1 SD worse than language performance. A typical subgroup (n = 926) was defined as having a difference in language and memory performance of memory subgroup, the language subgroup was 3.7 years older and more frequently self-identified as African American (OR = 3.69). Under a dominant genetic model, the language subgroup had smaller odds of carrying at least one APOEε4 allele relative to the memory subgroup. While this difference was present for all ages, it was more striking at a younger age (OR = 0.19 for youngest tertile; OR = 0.52 for oldest tertile). Compared with the memory subgroup, the language subgroup rose 35% faster on the Functional Assessment Questionnaire and 44% faster on CDR sum of boxes over time. Among a subset of participants who underwent autopsy (n = 98), the language, memory, and typical subgroups were equally likely to have an AD pathologic diagnosis, suggesting that variation in non-AD pathologies across subtypes did not lead to the observed differences. The study demonstrates that a language subgroup of AD has different demographics, genetic profile, and disease course in addition to cognitive phenotype.

  5. Gravitinos and hidden supersymmetry at the LHC

    Energy Technology Data Exchange (ETDEWEB)

    Bobrovskyi, Sergei

    2012-08-15

    We investigate phenomenological consequences of locally supersymmetric extensions of the Standard Model consistent with primordial nucleosynthesis, leptogenesis and dark matter constraints. An unequivocal prediction of local supersymmetry is the existence of the gravitino, the spin-3/2 superpartner of the graviton. Due to its extremely weak couplings, decays involving the gravitino in the initial or the final state may cause problems in the early universe. One class of models solving the gravitino problem makes the gravitino either the heaviest or the lightest supersymmetric particle (LSP), while predicting a higgsino-like neutralino as the LSP or the next-to-lightest superparticle (NLSP), respectively. In both cases the LHC phenomenology is determined by the higgsino states. The mass degeneracy between the charged and neutral states, together with very heavy colored states, prevent an early discovery at the LHC, especially if one demands a lightest Higgs mass compatible with the recent LHC signal excess. Another class of models, in which the gravitino is also a dark matter candidate, introduces a small violation of R-parity to render the cosmology consistent. In this case, the phenomenology at the LHC is determined by the R-parity violating decays of the NLSP which can be a bino-like or a higgsino-like neutralino or a stau. Using a novel approach to describing bilinear R-parity violation, we compute decay rates of the gravitino and the possible NLSP. Due to a connection between the gravitino and neutralino decay widths, we can predict the neutralino NLSP decay length at the LHC directly from the recent Fermi-LAT results for decaying dark matter searches. The decays of the NLSP in the detectors distort the missing transverse energy (MET) signature, which complicates the searches relying on it, while creating a new secondary vertex signature. We conclude that for gluino and squark masses accessible at the LHC, searches based on secondary vertices can probe values of

  6. Gravitinos and hidden supersymmetry at the LHC

    International Nuclear Information System (INIS)

    Bobrovskyi, Sergei

    2012-08-01

    We investigate phenomenological consequences of locally supersymmetric extensions of the Standard Model consistent with primordial nucleosynthesis, leptogenesis and dark matter constraints. An unequivocal prediction of local supersymmetry is the existence of the gravitino, the spin-3/2 superpartner of the graviton. Due to its extremely weak couplings, decays involving the gravitino in the initial or the final state may cause problems in the early universe. One class of models solving the gravitino problem makes the gravitino either the heaviest or the lightest supersymmetric particle (LSP), while predicting a higgsino-like neutralino as the LSP or the next-to-lightest superparticle (NLSP), respectively. In both cases the LHC phenomenology is determined by the higgsino states. The mass degeneracy between the charged and neutral states, together with very heavy colored states, prevent an early discovery at the LHC, especially if one demands a lightest Higgs mass compatible with the recent LHC signal excess. Another class of models, in which the gravitino is also a dark matter candidate, introduces a small violation of R-parity to render the cosmology consistent. In this case, the phenomenology at the LHC is determined by the R-parity violating decays of the NLSP which can be a bino-like or a higgsino-like neutralino or a stau. Using a novel approach to describing bilinear R-parity violation, we compute decay rates of the gravitino and the possible NLSP. Due to a connection between the gravitino and neutralino decay widths, we can predict the neutralino NLSP decay length at the LHC directly from the recent Fermi-LAT results for decaying dark matter searches. The decays of the NLSP in the detectors distort the missing transverse energy (MET) signature, which complicates the searches relying on it, while creating a new secondary vertex signature. We conclude that for gluino and squark masses accessible at the LHC, searches based on secondary vertices can probe values of

  7. Heavy superpartners with less tuning from hidden sector renormalisation

    International Nuclear Information System (INIS)

    Hardy, Edward

    2014-01-01

    In supersymmetric extensions of the Standard Model, superpartner masses consistent with collider bounds typically introduce significant tuning of the electroweak scale. We show that hidden sector renormalisation can greatly reduce such a tuning if the supersymmetry breaking, or mediating, sector runs through a region of strong coupling not far from the weak scale. In the simplest models, only the tuning due to the gaugino masses is improved, and a weak scale gluino mass in the region of 5 TeV may be obtained with an associated tuning of only one part in ten. In models with more complex couplings between the visible and hidden sectors, the tuning with respect to sfermions can also be reduced. We give an example of a model, with low scale gauge mediation and superpartner masses allowed by current LHC bounds, that has an overall tuning of one part in twenty

  8. Hidden order and disorder effects in URu2Si2

    Science.gov (United States)

    Bernal, O. O.; Moroz, M. E.; Ishida, K.; Murakawa, H.; Reyes, A. P.; Kuhns, P. L.; MacLaughlin, D. E.; Mydosh, J. A.; Gortenmulder, T. J.

    2006-05-01

    NMR experiments at ambient pressure in URu 2Si 2 demonstrate a linewidth enhancement effect below the hidden order transition temperature T0. We present single-crystal 29Si NMR parameters for various temperatures and for an applied magnetic field perpendicular to the crystal c-axis. By comparing oriented-powder and single-crystal data, we observe that the size of the linewidth enhancement below T0 correlates with the size of the high- T broadening. We measure a 29Si up-field line shift below T0 which indicates the presence of an internal-field average for the entire crystal. This shift also correlates with the high-temperature width. The 101Ru NQR frequency as a function of temperature was also measured. No strong effect on the NQR frequency is observed at T0. Both NMR and NQR measurements suggest a connection between linewidth/disorder effects and the transition to hidden order.

  9. Hidden Valley Higgs Decays in the ATLAS detector

    CERN Document Server

    Ciapetti, G

    2009-01-01

    A number of extensions of the Standard Model result in particles that are neutral, weakly-coupled and have macroscopic decay lengths that can be comparable with LHC detector dimensions. These particles represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS apparatus. For the purpose of exploring the challenges to the trigger posed by long-lived particles, the Hidden Valley scenario serves as an excellent setting. In this note we present the results of a first study of ATLAS detector performance for some Hidden Valley processes with long-lived, neutral states that decay throughout the detector volume to multi heavy-flavor jets, mainly b-bbar.

  10. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  11. Hidden magnetism in periodically modulated one dimensional dipolar fermions

    Science.gov (United States)

    Fazzini, S.; Montorsi, A.; Roncaglia, M.; Barbiero, L.

    2017-12-01

    The experimental realization of time-dependent ultracold lattice systems has paved the way towards the implementation of new Hubbard-like Hamiltonians. We show that in a one-dimensional two-components lattice dipolar Fermi gas the competition between long range repulsion and correlated hopping induced by periodically modulated on-site interaction allows for the formation of hidden magnetic phases, with degenerate protected edge modes. The magnetism, characterized solely by string-like nonlocal order parameters, manifests in the charge and/or in the spin degrees of freedom. Such behavior is enlighten by employing Luttinger liquid theory and numerical methods. The range of parameters for which hidden magnetism is present can be reached by means of the currently available experimental setups and probes.

  12. What are the Hidden Quantum Processes Behind Newton's Laws?

    OpenAIRE

    Ostoma, Tom; Trushyk, Mike

    1999-01-01

    We investigate the hidden quantum processes that are responsible for Newton's laws of motion and Newton's universal law of gravity. We apply Electro-Magnetic Quantum Gravity or EMQG to investigate Newtonian classical physics. EQMG is a quantum gravity theory that is manifestly compatible with Cellular Automata (CA) theory, a new paradigm for physical reality. EMQG is also based on a theory of inertia proposed by R. Haisch, A. Rueda, and H. Puthoff, which we modified and called Quantum Inertia...

  13. Uncovering Hidden Mathematics of the Multiplication Table Using Spreadsheets

    Directory of Open Access Journals (Sweden)

    Sergei Abramovich

    2007-05-01

    Full Text Available This paper reveals a number of learning activities emerging from a spreadsheetgenerated multiplication table. These activities are made possible by using such features of the software as conditional formatting, circular referencing, calculation through iteration, scroll bars, and graphing. The paper is a reflection on a mathematics content course designed for prospective elementary teachers using the hidden mathematics curriculum framework. It is written in support of standards for teaching and recommendations for teachers in North America.

  14. Sterile neutrino, hidden dark matter and their cosmological signatures

    International Nuclear Information System (INIS)

    Das, Subinoy

    2012-01-01

    Though thermal dark matter has been the central idea behind the dark matter candidates, it is highly possible that dark matter of the universe is non-thermal in origin or it might be in thermal contact with some hidden or dark sector but not with standard model. Here we explore the cosmological bounds as well as the signatures on two types of non-thermal dark matter candidates. First we discuss a hidden dark matter with almost no interaction (or very feeble) with standard model particles so that it is not in thermal contact with visible sector but we assume it is thermalized with in a hidden sector due to some interaction. While encompassing the standard cold WIMP scenario, we do not require the freeze-out process to be non-relativistic. Rather, freeze-out may also occur when dark matter particles are semi-relativistic or relativistic. Especially we focus on the warm dark matter scenario in this set up and find the constraints on the warm dark matter mass, cross-section and hidden to visible sector temperature ratio which accounts for the observed dark-matter density, satisfies the Tremaine-Gunn bound on dark-matter phase space density and has a free-streaming length consistent with cosmological constraints on the matter power spectrum. Our method can also be applied to keV sterile neutrino dark matter which is not thermalized with standard model but is thermalized with in a dark sector. The second part of this proceeding focuses on an exotic dark matter candidate which arises from the existence of eV mass sterile neutrino through a late phase transition. Due to existence of a strong scalar force the light sterile states get trapped into stable degenerate micro nuggets. We find that its signature in matter power spectra is close to a warm dark matter candidate.

  15. Pendidikan Anti Korupsi melalui Hidden Curriculum dan Pendidikan Moral

    Directory of Open Access Journals (Sweden)

    Dewi Salistina

    2015-11-01

    Full Text Available This article is intended to elaborate strategies in incorporating anti corruption awareness through hidden curriculum and morality education. It is of necessity to increase such kind of awareness among students so that they can avoid any action related to corruption. In this case, some practices such as good behavior, discipline, and good relationship among students-teachers are fostered in the daily activities at school. The effect is the increase of students’ honesty, responsibility, and solidarity across level of education.

  16. Hidden Markov models: the best models for forager movements?

    Science.gov (United States)

    Joo, Rocio; Bertrand, Sophie; Tam, Jorge; Fablet, Ronan

    2013-01-01

    One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs). We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs). They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour), while their behavioural modes (fishing, searching and cruising) were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines) for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%), significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  17. Einstein-Bohr controversy and theory of hidden variables

    Czech Academy of Sciences Publication Activity Database

    Lokajíček, Miloš V.

    2010-01-01

    Roč. 8, č. 4 (2010), s. 638-645 ISSN 1303-5150 R&D Projects: GA MŠk LA08015 Institutional research plan: CEZ:AV0Z10100502 Keywords : Schroedinger equation * EPR paradox * hidden variables Subject RIV: BF - Elementary Particles and High Energy Physics Impact factor: 0.697, year: 2010 http://arxiv.org/abs/1004.3005

  18. MOBILE APP FOR HIDDEN DATA ANALYTICS OF ONLINE MARKETPLACE SYSTEMS

    OpenAIRE

    Aqle, Aboubakr

    2016-01-01

    In this project, an extensive analysis and evaluation of the existing e-marketplaces is performed. The aim of this analysis is to improve the experience of end-users through an Android application that is capable of summarizing multiple heterogeneous hidden data sources and unify received responses to one single, structured and homogenous source. The proposed Android application is based on the multi-level conceptual analysis and modeling strategy. In which, the data is analyzed in a way ...

  19. Hidden Markov models: the best models for forager movements?

    Directory of Open Access Journals (Sweden)

    Rocio Joo

    Full Text Available One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs. We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs. They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour, while their behavioural modes (fishing, searching and cruising were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%, significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  20. Hidden mission of the psyche in abuse and addiction.

    Science.gov (United States)

    Gostecnik, Christian; Repic, Tanja; Cvetek, Mateja; Cvetek, Robert

    2010-09-01

    Traumatic experiences can become the central mental content in our psychic structure and can deeply mark all our later perceptions and experiences of our surroundings. We can claim something similar also for addictions of all kinds. In this article, we will demonstrate that recurring traumatic experiences and abuse as well as addiction represent a hidden mission of psyche for resolution and a great cry of longing for salvation.

  1. A preon model with hidden electric and magnetic type charges

    International Nuclear Information System (INIS)

    Pati, J.C.; Strathdee, J.

    1980-11-01

    The U(1) x U(1) binding forces in an earlier preonic composite model of quarks and leptons are interpreted as arising from hidden electric and magnetic type charges. The preons may possess intrinsic spin zero; the half-integer spins of the composites being contributed by the force field. The quark-lepton gauge symmetry is interpreted as an effective low-energy symmetry arising at the composite level. Some remarks are made regarding the possible composite nature of the graviton. (author)

  2. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model

    Science.gov (United States)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao

    2014-11-01

    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  3. Human health and nutrition: How isotopes are helping to overcome ''hidden hunger''

    International Nuclear Information System (INIS)

    Parr, R.M.; Fjeld, C.R.

    1994-01-01

    In a number of ways, the work of the IAEA is contributing to efforts directed at overcoming hidden hunger and other nutrition problems. The rationale for the IAEA's involvement is twofold. First, adequate nutrition is an essential component of any strategy for improving health, and the IAEA's Statute specifically identifies ''enlarging the contribution of atomic energy to peace, health and prosperity'' as the major objective of programmes. Second, isotope techniques have a wide variety of applications -some of them unique - for targeted research in human nutrition, for assessing nutritional status, and for monitoring the effectiveness of nutritional intervention programmes. This article provides a brief overview of these techniques and their main applications in areas of human nutrition

  4. Weak-scale hidden sector and energy transport in fireball models of gamma-ray bursts

    International Nuclear Information System (INIS)

    Demir, Durmus A.; Mosquera Cuesta, Herman J.

    2000-12-01

    The annihilation of pairs of very weakly interacting particles in the neighborhood of gamma-ray sources is introduced here as a plausible mechanism to overcome the baryon load problem. This way we can explain how these very high energy gamma-ray bursts can be powered at the onset of very energetic events like supernovae (collapsars) explosions or coalescences of binary neutron stars. Our approach uses the weak-scale hidden sector models in which the Higgs sector of the standard model is extended to include a gauge singlet that only interacts with the Higgs particle. These particles would be produced either during the implosion of the red supergiant star core or at the aftermath of a neutron star binary merger. The whole energetics and timescales of the relativistic blast wave, the fireball, are reproduced. (author)

  5. Passive acoustic leak detection for sodium cooled fast reactors using hidden Markov models

    Energy Technology Data Exchange (ETDEWEB)

    Riber Marklund, A. [CEA, Cadarache, DEN/DTN/STCP/LIET, Batiment 202, 13108 St Paul-lez-Durance, (France); Kishore, S. [Fast Reactor Technology Group of IGCAR, (India); Prakash, V. [Vibrations Diagnostics Division, Fast Reactor Technology Group of IGCAR, (India); Rajan, K.K. [Fast Reactor Technology Group and Engineering Services Group of IGCAR, (India)

    2015-07-01

    Acoustic leak detection for steam generators of sodium fast reactors have been an active research topic since the early 1970's and several methods have been tested over the years. Inspired by its success in the field of automatic speech recognition, we here apply hidden Markov models (HMM) in combination with Gaussian mixture models (GMM) to the problem. To achieve this, we propose a new feature calculation scheme, based on the temporal evolution of the power spectral density (PSD) of the signal. Using acoustic signals recorded during steam/water injection experiments done at the Indira Gandhi Centre for Atomic Research (IGCAR), the proposed method is tested. We perform parametric studies on the HMM+GMM model size and demonstrate that the proposed method a) performs well without a priori knowledge of injection noise, b) can incorporate several noise models and c) has an output distribution that simplifies false alarm rate control. (authors)

  6. In Brief: Hidden environment and health costs of energy

    Science.gov (United States)

    Showstack, Randy

    2009-10-01

    The hidden costs of energy production and use in the United States amounted to an estimated $120 billion in 2005, according to a 19 October report by the U.S. National Research Council. The report, “Hidden Costs of Energy: Unpriced Consequences of Energy Production and Use,” examines hidden costs, including the cost of air pollution damage to human health, which are not reflected in market prices of energy sources, electricity, or gasoline. The report found that in 2005, the total annual external damages from sulfur dioxide, nitrogen oxides, and particulate matter created by coal-burning power plants that produced 95% of the nation's coal-generated electricity were about $62 billion, with nonclimate damages averaging about 3.2 cents for every kilowatt-hour of energy produced. It is estimated that by 2030, nonclimate damages will fall to 1.7 cents per kilowatt-hour. The 2030 figure assumes that new policies already slated for implementation are put in place.

  7. Quasiparticle scattering image in hidden order phases and chiral superconductors

    Energy Technology Data Exchange (ETDEWEB)

    Thalmeier, Peter [Max Planck Institute for Chemical Physics of Solids, 01187 Dresden (Germany); Akbari, Alireza, E-mail: alireza@apctp.org [Asia Pacific Center for Theoretical Physics, Pohang, Gyeongbuk 790-784 (Korea, Republic of); Department of Physics, and Max Planck POSTECH Center for Complex Phase Materials, POSTECH, Pohang 790-784 (Korea, Republic of)

    2016-02-15

    The technique of Bogoliubov quasiparticle interference (QPI) has been successfully used to investigate the symmetry of unconventional superconducting gaps, also in heavy fermion compounds. It was demonstrated that QPI can distinguish between the d-wave singlet candidates in CeCoIn{sub 5}. In URu{sub 2}Si{sub 2} presumably a chiral d-wave singlet superconducting (SC) state exists inside a multipolar hidden order (HO) phase. We show that hidden order leaves an imprint on the symmetry of QPI pattern that may be used to determine the essential question whether HO in URu{sub 2}Si{sub 2} breaks the in-plane rotational symmetry or not. We also demonstrate that the chiral d-wave SC gap leads to a crossover to a quasi-2D QPI spectrum below T{sub c} which sharpens the HO features. Furthermore we investigate the QPI image of chiral p-wave multigap superconductor Sr{sub 2}RuO{sub 4}. - Highlights: • The chiral multigap structure of Sr{sub 2}RuO{sub 4} leads to rotation of QPI spectrum with bias voltage. • 5f band reconstruction in hidden order phase of URu{sub 2}Si{sub 2} is obtained from two orbital model. • The chiral superconductivity in URu{sub 2}Si{sub 2} leads to quasi-2D quasiparticle interference (QPI).

  8. Searching for confining hidden valleys at LHCb, ATLAS, and CMS

    Science.gov (United States)

    Pierce, Aaron; Shakya, Bibhushan; Tsai, Yuhsin; Zhao, Yue

    2018-05-01

    We explore strategies for probing hidden valley scenarios exhibiting confinement. Such scenarios lead to a moderate multiplicity of light hidden hadrons for generic showering and hadronization similar to QCD. Their decays are typically soft and displaced, making them challenging to probe with traditional LHC searches. We show that the low trigger requirements and excellent track and vertex reconstruction at LHCb provide a favorable environment to search for such signals. We propose novel search strategies in both muonic and hadronic channels. We also study existing ATLAS and CMS searches and compare them with our proposals at LHCb. We find that the reach at LHCb is generically better in the parameter space we consider here, even with optimistic background estimations for ATLAS and CMS searches. We discuss potential modifications at ATLAS and CMS that might make these experiments competitive with the LHCb reach. Our proposed searches can be applied to general hidden valley models as well as exotic Higgs boson decays, such as in twin Higgs models.

  9. The hidden traps in decision making.

    Science.gov (United States)

    Hammond, J S; Keeney, R L; Raiffa, H

    1998-01-01

    Bad decisions can often be traced back to the way the decisions were made--the alternatives were not clearly defined, the right information was not collected, the costs and benefits were not accurately weighted. But sometimes the fault lies not in the decision-making process but rather in the mind of the decision maker. The way the human brain works can sabotage the choices we make. John Hammond, Ralph Keeney, and Howard Raiffa examine eight psychological traps that are particularly likely to affect the way we make business decisions: The anchoring trap leads us to give disproportionate weight to the first information we receive. The statusquo trap biases us toward maintaining the current situation--even when better alternatives exist. The sunk-cost trap inclines us to perpetuate the mistakes of the past. The confirming-evidence trap leads us to seek out information supporting an existing predilection and to discount opposing information. The framing trap occurs when we misstate a problem, undermining the entire decision-making process. The overconfidence trap makes us overestimate the accuracy of our forecasts. The prudence trap leads us to be overcautious when we make estimates about uncertain events. And the recallability trap leads us to give undue weight to recent, dramatic events. The best way to avoid all the traps is awareness--forewarned is forearmed. But executives can also take other simple steps to protect themselves and their organizations from the various kinds of mental lapses. The authors show how to take action to ensure that important business decisions are sound and reliable.

  10. Common Group Problems: A Field Study.

    Science.gov (United States)

    Weinberg, Sanford B.; And Others

    1981-01-01

    A field study of a naturally functioning group (N=125) was conducted to identify common group problems. Trained observers attended group meetings and described the problems encountered. Difficulties of cohesion, leadership, sub-group formation, and personality conflict were identified. (RC)

  11. Etiological Subgroups of Small-for-Gestational-Age: Differential Neurodevelopmental Outcomes

    Science.gov (United States)

    Li, Xiuhong; Eiden, Rina D.; Epstein, Leonard H.; Shenassa, Edmond D.; Xie, Chuanbo; Wen, Xiaozhong

    2016-01-01

    Objectives It remains unclear why substantial variations in neurodevelopmental outcomes exist within small-for-gestational-age (SGA) children. We prospectively compared 5-y neurodevelopmental outcomes across SGA etiological subgroups. Methods Children born SGA (N = 1050) from U.S. Early Childhood Longitudinal Study-Birth Cohort (2001–2007) was divided into etiological subgroups by each of 7 well-established prenatal risk factors. We fit linear regression models to compare 5-y reading, math, gross motor and fine motor scores across SGA subgroups, adjusting for socio-demographic confounders. Results Compared to singleton SGA subgroup, multiple-birth SGA subgroup had lower mean reading (adjusted mean difference, -4.08 [95% confidence interval, -6.10, -2.06]) and math (-2.22 [-3.61, -0.84]) scores. These disadvantages in reading and math existed only among multiple-birth SGA subgroup without ovulation stimulation (reading, -4.50 [-6.64, -2.36]; math, -2.91 [-4.37, -1.44]), but not among those with ovulation stimulation (reading, -2.33 [-6.24, 1.57]; math 0.63 [-1.86, 3.12]). Compared to singleton SGA subgroup without maternal smoking and inadequate gestational weight gain, singleton SGA subgroup with co-occurrence of maternal smoking and inadequate gestational weight gain (GWG) had lower mean reading (-4.81 [-8.50, -1.12]) and math (-2.95 [-5.51, -0.38]) scores. These differences were not mediated by Apgar score. Conclusions Multiple-birth SGA subgroups (vs. singleton SGA) or singleton SGA subgroup with co-occurrence of smoking and inadequate GWG (vs. singleton SGA subgroup without maternal smoking and inadequate gestational weight gain) have poorer cognitive development up to 5 y. PMID:27501456

  12. Etiological Subgroups of Small-for-Gestational-Age: Differential Neurodevelopmental Outcomes.

    Directory of Open Access Journals (Sweden)

    Xiuhong Li

    Full Text Available It remains unclear why substantial variations in neurodevelopmental outcomes exist within small-for-gestational-age (SGA children. We prospectively compared 5-y neurodevelopmental outcomes across SGA etiological subgroups.Children born SGA (N = 1050 from U.S. Early Childhood Longitudinal Study-Birth Cohort (2001-2007 was divided into etiological subgroups by each of 7 well-established prenatal risk factors. We fit linear regression models to compare 5-y reading, math, gross motor and fine motor scores across SGA subgroups, adjusting for socio-demographic confounders.Compared to singleton SGA subgroup, multiple-birth SGA subgroup had lower mean reading (adjusted mean difference, -4.08 [95% confidence interval, -6.10, -2.06] and math (-2.22 [-3.61, -0.84] scores. These disadvantages in reading and math existed only among multiple-birth SGA subgroup without ovulation stimulation (reading, -4.50 [-6.64, -2.36]; math, -2.91 [-4.37, -1.44], but not among those with ovulation stimulation (reading, -2.33 [-6.24, 1.57]; math 0.63 [-1.86, 3.12]. Compared to singleton SGA subgroup without maternal smoking and inadequate gestational weight gain, singleton SGA subgroup with co-occurrence of maternal smoking and inadequate gestational weight gain (GWG had lower mean reading (-4.81 [-8.50, -1.12] and math (-2.95 [-5.51, -0.38] scores. These differences were not mediated by Apgar score.Multiple-birth SGA subgroups (vs. singleton SGA or singleton SGA subgroup with co-occurrence of smoking and inadequate GWG (vs. singleton SGA subgroup without maternal smoking and inadequate gestational weight gain have poorer cognitive development up to 5 y.

  13. Reverse engineering a social agent-based hidden markov model--visage.

    Science.gov (United States)

    Chen, Hung-Ching Justin; Goldberg, Mark; Magdon-Ismail, Malik; Wallace, William A

    2008-12-01

    We present a machine learning approach to discover the agent dynamics that drives the evolution of the social groups in a community. We set up the problem by introducing an agent-based hidden Markov model for the agent dynamics: an agent's actions are determined by micro-laws. Nonetheless, We learn the agent dynamics from the observed communications without knowing state transitions. Our approach is to identify the appropriate micro-laws corresponding to an identification of the appropriate parameters in the model. The model identification problem is then formulated as a mixed optimization problem. To solve the problem, we develop a multistage learning process for determining the group structure, the group evolution, and the micro-laws of a community based on the observed set of communications among actors, without knowing the semantic contents. Finally, to test the quality of our approximations and the feasibility of the approach, we present the results of extensive experiments on synthetic data as well as the results on real communities, such as Enron email and Movie newsgroups. Insight into agent dynamics helps us understand the driving forces behind social evolution.

  14. A Coupled Hidden Conditional Random Field Model for Simultaneous Face Clustering and Naming in Videos

    KAUST Repository

    Zhang, Yifan

    2016-08-18

    For face naming in TV series or movies, a typical way is using subtitles/script alignment to get the time stamps of the names, and tagging them to the faces. We study the problem of face naming in videos when subtitles are not available. To this end, we divide the problem into two tasks: face clustering which groups the faces depicting a certain person into a cluster, and name assignment which associates a name to each face. Each task is formulated as a structured prediction problem and modeled by a hidden conditional random field (HCRF) model. We argue that the two tasks are correlated problems whose outputs can provide prior knowledge of the target prediction for each other. The two HCRFs are coupled in a unified graphical model called coupled HCRF where the joint dependence of the cluster labels and face name association is naturally embedded in the correlation between the two HCRFs. We provide an effective algorithm to optimize the two HCRFs iteratively and the performance of the two tasks on real-world data set can be both improved.

  15. Identifying Changes in Youth's Subgroup Membership over Time Based on Their Targeted Communication about Substance Use with Parents and Friends

    Science.gov (United States)

    Kam, Jennifer A.

    2011-01-01

    Using latent class/transition analyses, this study: (a) identified subgroups of youth based on their targeted communication about substance use with parents and friends, (b) examined subgroup differences in substance use, and (c) considered changes in subgroup membership over four years. Among 5,874 youth, five subgroups emerged, with parents-only…

  16. Antisocial Behavior and Victimization Over 2-Year Follow-Up in Subgroups of Childhood Arrestees.

    Science.gov (United States)

    van Domburgh, Lieke; Geluk, Charlotte; Jansen, Lucres; Vermeiren, Robert; Doreleijers, Theo

    2016-10-01

    Not only are childhood onset offenders at high risk of becoming serious persistent offenders, they are also at high risk of becoming victimized themselves. Furthermore, studies in the general population suggest that a combined perpetrator-victim group can be distinguished from a perpetrator-only and a victim-only group on individual and family risk factors. The current study investigated the co-occurrence of offending and victimization among first-time arrestees and the 2-year predictive value of previously found clusters of dynamic risk factors of offending. Childhood first-time arrestees ( N = 308; M age = 10.3, SD = 1.45) were clustered into three groups based on dynamic risk factors of offending in the individual, peer, school, and family domains: a pervasive high, an externalizing intermediate, and a low problem group. Police records and self-report data on re-offending and victimization of these children were collected over a 2-year follow-up period. Compared with the low problem group, the prevalence of re-offending was higher in both the externalizing intermediate group and the pervasive high group. The pervasive high group was most likely to display co-occurring future antisocial behavior and victimization. These findings emphasize that attention should be paid to victimization in addition to future antisocial behavior, especially if additional internalizing and family problems are present. Furthermore, the differences in re-offending and victimization between subgroups of childhood onset offenders stress the need for specific interventions tailored to the risk profile of a child.

  17. Hidden foreign trade and corruption on customers

    Directory of Open Access Journals (Sweden)

    Богдан Миколайович Головкін

    2017-12-01

    Full Text Available According to the Association of Chartered Certified Accountants (ACCA, the volume of the "shadow" economy in Ukraine is 1.1 trillion hryvnias or 45.1 % of the gross domestic product. Estimates of the Federation of Employers of Ukraine show that only 50 % of payments to the state budget comes from the clearance of goods, while the rest comprise a corruption component of 40 billion UAH for a year. Much of the large companies move non-declared goods across the state border and do not pay taxes. However, at the official level in Ukraine, it is still not accepted to talk about the servicing of the shadow foreign trade by the customs administration and the collection of corrupt rents from illegal trade in the state. Understanding the essence of the problem gives grounds to assert that the corruption risks in the work of customs are laid down in imperfect customs legislation, high tariff rates of duties and taxes, discrete powers of customs inspectors, the regime of customs procedures in the customs control zone, low level of their automation and physical contact of declarants from customs officers. In the customs case, the main type of corruption is bribery and abuse of influence related to the assistance of illegal and criminal activity in the foreign economic sphere. Subjects of foreign economic activity reduce costs and receive revenues through customs fraud or smuggling. Without corruption, this activity is impossible. On the illegal movement of goods and vehicles, smuggling and counterfeiting through the customs border, a criminal corruption business was created for all bodies and services that carry out various types of state control and law enforcement activities in the customs sphere. The most profitable are corruption schemes related to the illegal import / export of three groups of highly liquid products: tobacco products, counterfeit IT products, petroleum products, cars with foreign registration. For an independent study, illegal

  18. La drogadicción y su lugar en los procesos pedagógicos ¿Un problema oculto o evidente? A drogadição e seu lugar nos processos pedagógicos um problema oculto ou evidente? Drug-addiction and its role in pedagogical processes, a hidden or an evident problem?

    Directory of Open Access Journals (Sweden)

    Josefina Quintero Corzo

    2011-07-01

    õmbia com grupos com média de 45 estudantes matriculados nos graus 5º a 9º. Os diários contêm relatos, interpretações e reflexões de casos observados dentro das classes e contextos escolares. A informação foi tomada de 2006 a 2007. Resultados. A dicotomia entre o currículo e a realidade que vivem os estudantes é evidente. Os praticantes consideram que os conhecimentos recebidos não os capacitam para intervir problemas de drogadição e de saúde em seus estudantes, mas sim conseguem retomar estes fatores como determinantes nos processos pedagógicos e contribuir informação útil para trabalhar em equipes inter-disciplinarias com outros profissionais. Conclusão. Ainda que desde a teoria, explica-se a relação direta entre currículo, cultura escolar e processos formativos, os novos educadores não contam com as ferramentas suficientes e oportunas para solucionar os problemas de saúde física, mental e emocional que afetam os processos de formação integral de meninos, jovens e adolescentes, entre eles, a drogadição.Objective. To describe the way in which teachers who are being trained perceive and act towards drug-addiction in children, young people and teenagers. Methodology. Narrative process supported in the comprehensive qualitative paradigm of case studies. Five journals from teachers who were being trained, men and woman, who started their internship in official schools of the department of Caldas (Colombia in groups with an average of 45 students, enrolled from 5th to 9th grade, were used as tools. Journals had stories, interpretations and thoughts about observed cases in the classes and scholar situations. Information was collected between 2006 and 2007. Results. The dichotomy between the curriculum and the reality experienced by the students is evident. Trainees consider that the knowledge they receive is not enough to train them on how to intervene drug-addiction and health problems in the students, but they recognize these factors as

  19. Exacerbation heterogeneity in COPD: subgroup analyses from the FLAME study

    Directory of Open Access Journals (Sweden)

    Vogelmeier CF

    2018-04-01

    Full Text Available Claus F Vogelmeier,1 Kenneth R Chapman,2 Marc Miravitlles,3 Nicolas Roche,4 Jørgen Vestbo,5 Chau Thach,6 Donald Banerji,6 Robert Fogel,6 Francesco Patalano,7 Petter Olsson,8 Konstantinos Kostikas,7 Jadwiga A Wedzicha9 1Member of the German Center for Lung Research (DZL, Department of Medicine, Pulmonary and Critical Care Medicine, University Medical Center Giessen and Marburg, Philipps-Universität Marburg, Marburg, Germany; 2Asthma and Airway Centre, University Health Network and University of Toronto, Toronto, ON, Canada; 3Pneumology Department, Hospital Universitari Vall d’Hebron, CIBER de Enfermedades Respiratorias (CIBERES, Barcelona, Spain; 4Service de Pneumologie AP-HP, Cochin Hospital, University Paris Descartes (EA2511, Paris, France; 5Institute of Infection, Immunity and Respiratory Medicine, The University of Manchester and Manchester University NHS Foundation Trust, Manchester, UK; 6Novartis Pharmaceuticals Corporation, East Hanover, NJ, USA; 7Novartis Pharma AG, Basel, Switzerland; 8Novartis Sverige AB, Täby, Sweden; 9National Heart and Lung Institute, Imperial College London, London, UK Background: The FLAME study compared once-daily indacaterol/glycopyrronium (IND/GLY 110/50 µg with twice-daily salmeterol/fluticasone (SFC 50/500 µg in symptomatic patients with moderate to very severe COPD and a history of exacerbations in the previous year. Methods: This prespecified and post hoc subgroup analysis evaluated treatment efficacy on 1 moderate/severe exacerbations according to prior exacerbation history and treatment, and 2 types of exacerbations according to health care resource utilization (HCRU during 1-year follow-up. Results: IND/GLY reduced the rate of moderate/severe exacerbations versus SFC in patients with a history of 1 exacerbation (rate ratio [RR]: 0.83, 95% CI: 0.75–0.93, ≥2 exacerbations (RR: 0.85, 95% CI: 0.70–1.03 and ≥2 exacerbations or ≥1 hospitalization in the previous year (RR: 0.86, 95% CI: 0.74

  20. Are estimates of meaningful decline in mobility performance consistent among clinically important subgroups? (Health ABC Study).

    NARCIS (Netherlands)

    Perera, S.; Studenski, S.; Newman, A.; Simonsick, E.; Harris, T.; Schwartz, A.; Visser, M.

    2014-01-01

    Background: Meaningful change criteria help determine if function has improved or declined, but their magnitudes may vary across clinically relevant subgroups. We estimate meaningful decline in four common measures of physical performance in subgroups of older adults based on initial performance,