WorldWideScience

Sample records for hidden transformation chaining

  1. Distinguishing Hidden Markov Chains

    OpenAIRE

    Kiefer, Stefan; Sistla, A. Prasad

    2015-01-01

    Hidden Markov Chains (HMCs) are commonly used mathematical models of probabilistic systems. They are employed in various fields such as speech recognition, signal processing, and biological sequence analysis. We consider the problem of distinguishing two given HMCs based on an observation sequence that one of the HMCs generates. More precisely, given two HMCs and an observation sequence, a distinguishing algorithm is expected to identify the HMC that generates the observation sequence. Two HM...

  2. APPLICATION OF HIDDEN MARKOV CHAINS IN QUALITY CONTROL

    Directory of Open Access Journals (Sweden)

    Hanife DEMIRALP

    2013-01-01

    Full Text Available The ever growing technological innovations and sophistication in industrial processes require adequate checks on quality. Thus, there is an increasing demand for simple and efficient quality control methods. In this regard the control charts stand out in simplicity and efficiency. In this paper, we propose a method of controlling quality based on the theory of hidden Markov chains. Based on samples drawn at different times from the production process, the method obtains the state of the process probabilistically. The main advantage of the method is that it requires no assumption on the normality of the process output.

  3. Regular Riemann-Hilbert transforms, Baecklund transformations and hidden symmetry algebra for some linearization systems

    International Nuclear Information System (INIS)

    Chau Ling-Lie; Ge Mo-Lin; Teh, Rosy.

    1984-09-01

    The Baecklund Transformations and the hidden symmetry algebra for Self-Dual Yang-Mills Equations, Landau-Lifshitz equations and the Extended Super Yang-Mills fields (N>2) are discussed on the base of the Regular Riemann-Hilbert Transform and the linearization equations. (author)

  4. Recursive smoothers for hidden discrete-time Markov chains

    Directory of Open Access Journals (Sweden)

    Lakhdar Aggoun

    2005-01-01

    Full Text Available We consider a discrete-time Markov chain observed through another Markov chain. The proposed model extends models discussed by Elliott et al. (1995. We propose improved recursive formulae to update smoothed estimates of processes related to the model. These recursive estimates are used to update the parameter of the model via the expectation maximization (EM algorithm.

  5. Transformational leadership: a cascading chain reaction.

    Science.gov (United States)

    Murphy, Lorraine

    2005-03-01

    Historical influences still permeate contemporary nursing practise. These are mirrored in organizational philosophies, transactional and autocratic leadership styles and disempowered staff. Whilst there is disparity amongst the theorists' definitions of leadership, there is consensus pertaining to the attributes necessary to realize effective leadership. Transformational leadership is heralded as new criterion for nurse managers, and can be achieved through training, education and professional development in key leadership competencies. To achieve a chain reaction, charismatic transformational leaders espouse intellectual stimulation and individual consideration to empower staff and enhance patient care. Nurse managers that develop and foster transformational leadership can surmount oppressive traditions and confidently navigate a complex and rapidly changing health care environment.

  6. Strong Law of Large Numbers for Hidden Markov Chains Indexed by an Infinite Tree with Uniformly Bounded Degrees

    Directory of Open Access Journals (Sweden)

    Huilin Huang

    2014-01-01

    Full Text Available We study strong limit theorems for hidden Markov chains fields indexed by an infinite tree with uniformly bounded degrees. We mainly establish the strong law of large numbers for hidden Markov chains fields indexed by an infinite tree with uniformly bounded degrees and give the strong limit law of the conditional sample entropy rate.

  7. Structural transformations of carbon chains inside nanotubes

    International Nuclear Information System (INIS)

    Warner, Jamie H.; Ruemmeli, Mark H.; Bachmatiuk, Alicja; Buechner, Bernd

    2010-01-01

    In situ aberration-corrected high-resolution transmission electron microscopy is used to examine the structural transformations of carbon chains that occur in the interior region of carbon nanotubes. We find electron-beam irradiation leads to the formation of two-dimensional carbon structures that are freely mobile inside the nanotube. The inner diameter of the nanotube influences the structural transformations of the carbon chains. As the diameter of the nanotube increases, electron-beam irradiation leads to curling of the chains and eventually the formation of closed looped structures. The closed looped structures evolve into spherical fullerenelike structures that exhibit translational motion inside the nanotubes and also coalesce to form larger nanotube structures. These results demonstrate the use of carbon nanotubes as test tubes for growing small carbon nanotubes within the interior by using only electron-beam irradiation at 80 kV.

  8. Transforming vaccines supply chains in Nigeria.

    Science.gov (United States)

    Sarley, David; Mahmud, Mustafa; Idris, Jide; Osunkiyesi, Modele; Dibosa-Osadolor, Onome; Okebukola, Peter; Wiwa, Owens

    2017-04-19

    Nigeria is the most populous country in Africa and in 2012 was suffering some of the lowest vaccination rates in the World. A combination of factors had resulted in a dysfunctional immunization cold chain and supply chain. Recognizing that the number of unimmunized children contributed to high levels of under-5-mortality, and that health MDGs would not be attained, Minister of State for Health Mohammed Pate launched a vaccines transformation project in 2013. In partnership with BMGF, GAVI, UNICEF, WHO, other donors and implementing partners the transformation journey has so far taken three years and achieved impressive results. It has though faced challenges along the way and with the financial burden of GAVI graduation facing Nigeria, the economic downturn and the decentralized funding of health services, the results are far from sustained. This paper documents the work undertaken at the Federal level and then highlights specific work undertaken in partnership with Lagos State Government. It identifies the importance of taking an end to end approach and looking at the root causes of weak system performance. The strategy combined simple innovations in how data was captured, recorded and used to drive decision making. It included a comprehensive and systematic approach to cold chain procurement, installation and maintenance with a shift to a culture of active cold chain maintenance that is performing with higher levels of uptime. It also included supply chain redesign at both the Federal and State level. Finally, it involved an institutional transformation at the National Primary Health Care Development Agency (NPHCDA) to establish a data driven Department of Logistics and Health Commodities (DLHC) to manage the many challenges in immunizing 7.5 million children annually. While results have been impressive, there have been many challenges and lessons learned on the way. As Nigeria gets ready for its graduation from GAVI, a robust agile performing cold chain and

  9. An Approach of Diagnosis Based On The Hidden Markov Chains Model

    Directory of Open Access Journals (Sweden)

    Karim Bouamrane

    2008-07-01

    Full Text Available Diagnosis is a key element in industrial system maintenance process performance. A diagnosis tool is proposed allowing the maintenance operators capitalizing on the knowledge of their trade and subdividing it for better performance improvement and intervention effectiveness within the maintenance process service. The Tool is based on the Markov Chain Model and more precisely the Hidden Markov Chains (HMC which has the system failures determination advantage, taking into account the causal relations, stochastic context modeling of their dynamics and providing a relevant diagnosis help by their ability of dubious information use. Since the FMEA method is a well adapted artificial intelligence field, the modeling with Markov Chains is carried out with its assistance. Recently, a dynamic programming recursive algorithm, called 'Viterbi Algorithm', is being used in the Hidden Markov Chains field. This algorithm provides as input to the HMC a set of system observed effects and generates at exit the various causes having caused the loss from one or several system functions.

  10. Under-reported data analysis with INAR-hidden Markov chains.

    Science.gov (United States)

    Fernández-Fontelo, Amanda; Cabaña, Alejandra; Puig, Pedro; Moriña, David

    2016-11-20

    In this work, we deal with correlated under-reported data through INAR(1)-hidden Markov chain models. These models are very flexible and can be identified through its autocorrelation function, which has a very simple form. A naïve method of parameter estimation is proposed, jointly with the maximum likelihood method based on a revised version of the forward algorithm. The most-probable unobserved time series is reconstructed by means of the Viterbi algorithm. Several examples of application in the field of public health are discussed illustrating the utility of the models. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  11. Strategy and Culture: Hidden Secrets and Soft Skills in Supply Chain Best Practices from Africa

    Directory of Open Access Journals (Sweden)

    Esther Kibuka-Sebitosi

    2015-06-01

    Full Text Available The paper identifies strategy and cultural hidden secrets and soft skills pertaining to supply chain management in African contexts that are pertinent to supply chain and operations management. Africa is increasingly becoming attractive for not only multi-nationals but supply chain businesses that either want to diversify or expand their foot print. The market is complex, turbulent and highly competitive (Porter, 1986 and requires significant knowledge and understanding of the local context but also culture (Johnson, 1987; 1992; 2000, diversity and institutional dynamics (Ogbonna et al., 2002. Due to the complex nature of the emerging markets, the paper draws from multiple-disciplines (Sociology, Business, Management and theoretical approaches namely: culture and strategy; Ubuntu, stakeholder theory and systems thinking, to elicit best practices. Utilizing qualitative methods comprising case study, interviews, focus group discussions and extensive document analysis, the study covers a variety of management practices ranging from strategy, culture to hyper market management. This paper highlights lessons from successful supermarket chains in Africa particularly the hidden secrets and soft skills that are often ignored in mainstream operations and supply chain management or strategy research. Findings underscore the lessons of understanding strategy and culture implementation through practicing cultural values, treating the customer as a queen/king, knowing political skills, being a learning organisation and implementing continuous improvement. It contributes to management theory for academics, researchers & managers through strategy and culture, proposing inclusion of the cultural diversity into strategy implementation as a critical force affecting the behaviour of people inside the organization. Managers should take into account the cultural context and use it to promote organizational business excellence. These lessons for business excellence

  12. The general chain transform and self-reciprocal functions

    Directory of Open Access Journals (Sweden)

    Cyril Nasim

    1985-01-01

    Full Text Available A theory of a generalized form of the chain transforms of order n is developed, and various properties of these are established including the Parseval relation. Most known cases of the standard theory are derived as special cases. Also a theory of self-reciprocal functions is given, based on these general chain transforms; and relations among various classes of self-reciprocal functions are established.

  13. Fuzzy hidden Markov chains segmentation for volume determination and quantitation in PET

    Energy Technology Data Exchange (ETDEWEB)

    Hatt, M [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Lamare, F [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609, (France); Boussion, N [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Turzo, A [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Collet, C [Ecole Nationale Superieure de Physique de Strasbourg (ENSPS), ULP, Strasbourg, F-67000 (France); Salzenstein, F [Institut d' Electronique du Solide et des Systemes (InESS), ULP, Strasbourg, F-67000 (France); Roux, C [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Jarritt, P [Medical Physics Agency, Royal Victoria Hospital, Belfast (United Kingdom); Carson, K [Medical Physics Agency, Royal Victoria Hospital, Belfast (United Kingdom); Rest, C Cheze-Le [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Visvikis, D [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France)

    2007-07-21

    Accurate volume of interest (VOI) estimation in PET is crucial in different oncology applications such as response to therapy evaluation and radiotherapy treatment planning. The objective of our study was to evaluate the performance of the proposed algorithm for automatic lesion volume delineation; namely the fuzzy hidden Markov chains (FHMC), with that of current state of the art in clinical practice threshold based techniques. As the classical hidden Markov chain (HMC) algorithm, FHMC takes into account noise, voxel intensity and spatial correlation, in order to classify a voxel as background or functional VOI. However the novelty of the fuzzy model consists of the inclusion of an estimation of imprecision, which should subsequently lead to a better modelling of the 'fuzzy' nature of the object of interest boundaries in emission tomography data. The performance of the algorithms has been assessed on both simulated and acquired datasets of the IEC phantom, covering a large range of spherical lesion sizes (from 10 to 37 mm), contrast ratios (4:1 and 8:1) and image noise levels. Both lesion activity recovery and VOI determination tasks were assessed in reconstructed images using two different voxel sizes (8 mm{sup 3} and 64 mm{sup 3}). In order to account for both the functional volume location and its size, the concept of % classification errors was introduced in the evaluation of volume segmentation using the simulated datasets. Results reveal that FHMC performs substantially better than the threshold based methodology for functional volume determination or activity concentration recovery considering a contrast ratio of 4:1 and lesion sizes of <28 mm. Furthermore differences between classification and volume estimation errors evaluated were smaller for the segmented volumes provided by the FHMC algorithm. Finally, the performance of the automatic algorithms was less susceptible to image noise levels in comparison to the threshold based techniques. The

  14. Hidden corrosion detection in aircraft aluminum structures using laser ultrasonics and wavelet transform signal analysis.

    Science.gov (United States)

    Silva, M Z; Gouyon, R; Lepoutre, F

    2003-06-01

    Preliminary results of hidden corrosion detection in aircraft aluminum structures using a noncontact laser based ultrasonic technique are presented. A short laser pulse focused to a line spot is used as a broadband source of ultrasonic guided waves in an aluminum 2024 sample cut from an aircraft structure and prepared with artificially corroded circular areas on its back surface. The out of plane surface displacements produced by the propagating ultrasonic waves were detected with a heterodyne Mach-Zehnder interferometer. Time-frequency analysis of the signals using a continuous wavelet transform allowed the identification of the generated Lamb modes by comparison with the calculated dispersion curves. The presence of back surface corrosion was detected by noting the loss of the S(1) mode near its cutoff frequency. This method is applicable to fast scanning inspection techniques and it is particularly suited for early corrosion detection.

  15. Unifying framework for multimodal brain MRI segmentation based on Hidden Markov Chains.

    Science.gov (United States)

    Bricq, S; Collet, Ch; Armspach, J P

    2008-12-01

    In the frame of 3D medical imaging, accurate segmentation of multimodal brain MR images is of interest for many brain disorders. However, due to several factors such as noise, imaging artifacts, intrinsic tissue variation and partial volume effects, tissue classification remains a challenging task. In this paper, we present a unifying framework for unsupervised segmentation of multimodal brain MR images including partial volume effect, bias field correction, and information given by a probabilistic atlas. Here-proposed method takes into account neighborhood information using a Hidden Markov Chain (HMC) model. Due to the limited resolution of imaging devices, voxels may be composed of a mixture of different tissue types, this partial volume effect is included to achieve an accurate segmentation of brain tissues. Instead of assigning each voxel to a single tissue class (i.e., hard classification), we compute the relative amount of each pure tissue class in each voxel (mixture estimation). Further, a bias field estimation step is added to the proposed algorithm to correct intensity inhomogeneities. Furthermore, atlas priors were incorporated using probabilistic brain atlas containing prior expectations about the spatial localization of different tissue classes. This atlas is considered as a complementary sensor and the proposed method is extended to multimodal brain MRI without any user-tunable parameter (unsupervised algorithm). To validate this new unifying framework, we present experimental results on both synthetic and real brain images, for which the ground truth is available. Comparison with other often used techniques demonstrates the accuracy and the robustness of this new Markovian segmentation scheme.

  16. A hidden variable in shear transformation zone volume versus Poisson's ratio relation in metallic glasses

    Science.gov (United States)

    Kim, S. Y.; Oh, H. S.; Park, E. S.

    2017-10-01

    Herein, we elucidate a hidden variable in a shear transformation zone (STZ) volume (Ω) versus Poisson's ratio (ν) relation and clarify the correlation between STZ characteristics and the plasticity of metallic glasses (MGs). On the basis of cooperative shear model and atomic stress theories, we carefully formulate Ω as a function of molar volume (Vm) and ν. The twofold trend in Ω and ν is attributed to a relatively large variation of Vm as compared to that of ν as well as an inverse relation between Vm and ν. Indeed, the derived equation reveals that the number of atoms in an STZ instead of Ω is a microstructural characteristic which has a close relationship with plasticity since it reflects the preference of atomistic behaviors between cooperative shearing and the generation of volume strain fluctuation under stress. The results would deepen our understanding of the correlation between microscopic behaviors (STZ activation) and macroscopic properties (plasticity) in MGs and enable a quantitative approach in associating various STZ-related macroscopic behaviors with intrinsic properties of MGs.

  17. Nurture Hidden Talents: Transform School Culture into One That Values Teacher Expertise

    Science.gov (United States)

    Zimmerman, Diane P.

    2014-01-01

    This article looks into the school culture where teacher expertise is often hidden and underused. While the media-rich culture places a high value on talent, the irony is that talent is underrated in most schools, and educators often remain silent about their hidden talents. Many school cultures are not conducive to dialogue that supports displays…

  18. Bosonization, dual transformation and non-local hidden symmetry in two dimensions

    International Nuclear Information System (INIS)

    Hata, Hiroyuki

    1985-01-01

    The non-local hidden symmetry is investigated in the bosonized non-abelian Thirring model and the dual representation of the chiral model. In these representations the first non-local symmetry is spontaneously broken in naive pertubation theory. (orig.)

  19. The Technology Introduction of Chain Boiler Energy Conservation Transformation

    Science.gov (United States)

    Li, Henan; Liu, Xiwen; Yuan, Hong; Lin, Jiadai; Zhang, Yu

    2017-12-01

    Introduced the present status of chain boiler efficiency is low, the system analysis of the chain boiler optimization and upgrading of technology, for the whole progress of chain boiler to provide some ideas and reference.

  20. Foreign investment, organizational innovation and transformation in food supply chains : evidence from the Ethiopian barley sector

    NARCIS (Netherlands)

    Tefera, Delelegne Abera

    2017-01-01

    Driven by rapid urbanization, economic growth, and changes in consumption patterns, food chains in emerging and developing economies are experiencing a fundamental transformation process. This transformation is usually characterized by increased vertical coordination, growth of modern

  1. Generating a New Higher-Dimensional Coupled Integrable Dispersionless System: Algebraic Structures, Bäcklund Transformation and Hidden Structural Symmetries

    International Nuclear Information System (INIS)

    Abbagari, Souleymanou; Bouetou, Thomas B.; Kofane, Timoleon C.

    2013-01-01

    The prolongation structure methodologies of Wahlquist—Estabrook [H.D. Wahlquist and F.B. Estabrook, J. Math. Phys. 16 (1975) 1] for nonlinear differential equations are applied to a more general set of coupled integrable dispersionless system. Based on the obtained prolongation structure, a Lie-Algebra valued connection of a closed ideal of exterior differential forms related to the above system is constructed. A Lie-Algebra representation of some hidden structural symmetries of the previous system, its Bäcklund transformation using the Riccati form of the linear eigenvalue problem and their general corresponding Lax-representation are derived. In the wake of the previous results, we extend the above prolongation scheme to higher-dimensional systems from which a new (2 + 1)-dimensional coupled integrable dispersionless system is unveiled along with its inverse scattering formulation, which applications are straightforward in nonlinear optics where additional propagating dimension deserves some attention. (general)

  2. Geometrical explanation of the fractional complex transform and derivative chain rule for fractional calculus

    International Nuclear Information System (INIS)

    He, Ji-Huan; Elagan, S.K.; Li, Z.B.

    2012-01-01

    The fractional complex transform is suggested to convert a fractional differential equation with Jumarie's modification of Riemann–Liouville derivative into its classical differential partner. Understanding the fractional complex transform and the chain rule for fractional calculus are elucidated geometrically. -- Highlights: ► The chain rule for fractional calculus is invalid, a counter example is given. ► The fractional complex transform is explained geometrically. ► Fractional equations can be converted into differential equations.

  3. Subdivision of the MDR superfamily of medium-chain dehydrogenases/reductases through iterative hidden Markov model refinement

    Directory of Open Access Journals (Sweden)

    Persson Bengt

    2010-10-01

    Full Text Available Abstract Background The Medium-chain Dehydrogenases/Reductases (MDR form a protein superfamily whose size and complexity defeats traditional means of subclassification; it currently has over 15000 members in the databases, the pairwise sequence identity is typically around 25%, there are members from all kingdoms of life, the chain-lengths vary as does the oligomericity, and the members are partaking in a multitude of biological processes. There are profile hidden Markov models (HMMs available for detecting MDR superfamily members, but none for determining which MDR family each protein belongs to. The current torrential influx of new sequence data enables elucidation of more and more protein families, and at an increasingly fine granularity. However, gathering good quality training data usually requires manual attention by experts and has therefore been the rate limiting step for expanding the number of available models. Results We have developed an automated algorithm for HMM refinement that produces stable and reliable models for protein families. This algorithm uses relationships found in data to generate confident seed sets. Using this algorithm we have produced HMMs for 86 distinct MDR families and 34 of their subfamilies which can be used in automated annotation of new sequences. We find that MDR forms with 2 Zn2+ ions in general are dehydrogenases, while MDR forms with no Zn2+ in general are reductases. Furthermore, in Bacteria MDRs without Zn2+ are more frequent than those with Zn2+, while the opposite is true for eukaryotic MDRs, indicating that Zn2+ has been recruited into the MDR superfamily after the initial life kingdom separations. We have also developed a web site http://mdr-enzymes.org that provides textual and numeric search against various characterised MDR family properties, as well as sequence scan functions for reliable classification of novel MDR sequences. Conclusions Our method of refinement can be readily applied to

  4. Bearing Diagnostics of Hydro Power Plants Using Wavelet Packet Transform and a Hidden Markov Model with Orbit Curves

    Directory of Open Access Journals (Sweden)

    Gabriel Pino

    2018-01-01

    Full Text Available The contribution of a medium-sized hydro power plant to the power grid can be either at base load or at peak load. When the latter is the most common operation mode, it increases the start and stop frequency, intensifying the hydro turbine components’ degradation, such as the guide bearings. This happens due to more frequent operation in transient states, which means being outside the service point of the machines’ nominal condition, consisting of speed, flow, and gross head. Such transient state operation increases the runner bearings’ mechanical vibration. The readings are acquired during the runner start-ups and filtered by a DC component mean value and a wavelet packet transform. The filtered series are used to estimate the relationship between the maximum orbit curve displacement and the accumulated operating hours. The estimated equation associated with the ISO 7919-5 vibration standards establishes the sojourn times of the degradation states, sufficient to obtain the transition probability distribution. Thereafter, a triangular probability function is used to determine the observation probability distribution in each state. Both matrices are inputs required by a hidden Markov model aiming to simulate the equipment deterioration process, given a sequence of maximum orbit curve displacements.

  5. Computing continuous-time Markov chains as transformers of unbounded observables

    DEFF Research Database (Denmark)

    Danos, Vincent; Heindel, Tobias; Garnier, Ilias

    2017-01-01

    The paper studies continuous-time Markov chains (CTMCs) as transformers of real-valued functions on their state space, considered as generalised predicates and called observables. Markov chains are assumed to take values in a countable state space S; observables f: S → ℝ may be unbounded...

  6. EVALUATION OF THE FREQUENCY OF DIAGNOSTICS OF COMPONENTS AND ASSEMBLIES FOR TRANSPORT AND TECHNOLOGICAL MACHINES ON THE BASIS OF HIDDEN MARKOV CHAINS

    Directory of Open Access Journals (Sweden)

    Andrey Borisovich Nikolaev

    2017-05-01

    Full Text Available In this article a statistical analysis of supply volumes of spare parts, components and accessories was carried out, with some persistent patterns and laws of distribution of failures of major components revealed. There are suggested evaluation models of components and assemblies reliability for the formation of order management procedures of spare parts, components and accessories for the maintenance and repair of transport and technological machines. For the purpose of identification of components operational condition there is proposed a model of hidden Markov chain which allows to classify the condition by indirect evidence, based on the collected statistics.

  7. 3D Printing: Downstream Production Transforming the Supply Chain

    Science.gov (United States)

    2017-01-01

    and its suppliers. The Evolution of Additive Manufacturing The commercialization of AM dates to the mid-1980s, with the first patents submitted...total supply chain cost approach. Patent and Strategic Considerations To understand the strategic competitive balance in AM technol- ogy...development and adoption, we assessed AM patent activity in the private sector and defense communities in selected countries. Return from service Incoming

  8. Semi-Markov Chains and Hidden Semi-Markov Models toward Applications Their Use in Reliability and DNA Analysis

    CERN Document Server

    Barbu, Vlad

    2008-01-01

    Semi-Markov processes are much more general and better adapted to applications than the Markov ones because sojourn times in any state can be arbitrarily distributed, as opposed to the geometrically distributed sojourn time in the Markov case. This book concerns with the estimation of discrete-time semi-Markov and hidden semi-Markov processes

  9. Spectral transformation chains and some new biorthogonal rational functions

    International Nuclear Information System (INIS)

    Spiridonov, V.

    2000-01-01

    A discrete-time chain, associated with the generalized eigenvalue problem for two Jacobi matrices, is derived. Various discrete and continuous symmetries of this integrable equation are revealed. A class of its rational, elementary and elliptic function solutions, appearing from a similarity reduction, are constructed. The latter lead to large families of biorthogonal rational functions based upon the very-well-posed balanced hypergeometric series of three types: the standard hypergeometric series 9 F 8 , basic series 10 φ 9 and its elliptic analogue 10 E 9 . For an important subclass of the elliptic biorthogonal rational functions the weight function and normalization constants are determined explicitly. (orig.)

  10. Delirium superimposed on dementia: defining disease states and course from longitudinal measurements of a multivariate index using latent class analysis and hidden Markov chains.

    Science.gov (United States)

    Ciampi, Antonio; Dyachenko, Alina; Cole, Martin; McCusker, Jane

    2011-12-01

    The study of mental disorders in the elderly presents substantial challenges due to population heterogeneity, coexistence of different mental disorders, and diagnostic uncertainty. While reliable tools have been developed to collect relevant data, new approaches to study design and analysis are needed. We focus on a new analytic approach. Our framework is based on latent class analysis and hidden Markov chains. From repeated measurements of a multivariate disease index, we extract the notion of underlying state of a patient at a time point. The course of the disorder is then a sequence of transitions among states. States and transitions are not observable; however, the probability of being in a state at a time point, and the transition probabilities from one state to another over time can be estimated. Data from 444 patients with and without diagnosis of delirium and dementia were available from a previous study. The Delirium Index was measured at diagnosis, and at 2 and 6 months from diagnosis. Four latent classes were identified: fairly healthy, moderately ill, clearly sick, and very sick. Dementia and delirium could not be separated on the basis of these data alone. Indeed, as the probability of delirium increased, so did the probability of decline of mental functions. Eight most probable courses were identified, including good and poor stable courses, and courses exhibiting various patterns of improvement. Latent class analysis and hidden Markov chains offer a promising tool for studying mental disorders in the elderly. Its use may show its full potential as new data become available.

  11. Hidden talents: mapping innovations and knowledge management competencies in the sunflower value chain in Lira District, Uganda

    NARCIS (Netherlands)

    Oremo, M.

    2008-01-01

    A study was undertaken on the sunflower value chain in Lira district of Uganda. The objective of the study was twofold: First to catalogue innovations that have been developed or introduced in the value chain over a 10 year trajectory (1998-2007). The second objective was to map the knowledge

  12. Hidden Liquidity

    OpenAIRE

    Cebiroglu, Gökhan; Horst, Ulrich

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, hi...

  13. A model for abnormal activity recognition and alert generation system for elderly care by hidden conditional random fields using R-transform and generalized discriminant analysis features.

    Science.gov (United States)

    Khan, Zafar Ali; Sohn, Won

    2012-10-01

    The growing population of elderly people living alone increases the need for automatic healthcare monitoring systems for elderly care. Automatic vision sensor-based systems are increasingly used for human activity recognition (HAR) in recent years. This study presents an improved model, tested using actors, of a sensor-based HAR system to recognize daily life activities of elderly people at home and generate an alert in case of abnormal HAR. Datasets consisting of six abnormal activities (falling backward, falling forward, falling rightward, falling leftward, chest pain, and fainting) and four normal activities (walking, rushing, sitting down, and standing up) are generated from different view angles (90°, -90°, 45°, -45°). Feature extraction and dimensions reduction are performed by R-transform followed by generalized discriminant analysis (GDA) methods. R-transform extracts symmetric, scale, and translation-invariant features from the sequences of activities. GDA increases the discrimination between different classes of highly similar activities. Silhouette sequences are quantified by the Linde-Buzo-Gray algorithm and recognized by hidden conditional random fields. Experimental results provide an average recognition rate of 94.2% for abnormal activities and 92.7% for normal activities. The recognition rate for the highly similar activities from different view angles shows the flexibility and efficacy of the proposed abnormal HAR and alert generation system for elderly care.

  14. Time-resolved FTIR [Fourier transform infrared] emission studies of laser photofragmentation and chain reactions

    International Nuclear Information System (INIS)

    Leone, S.R.

    1990-01-01

    Recent progress is described resulting from the past three years of DOE support for studies of combustion-related photofragmentation dynamics, energy transfer, and reaction processes using a time-resolved Fourier transform infrared (FTIR) emission technique. The FTIR is coupled to a high repetition rate excimer laser which produces radicals by photolysis to obtain novel, high resolution measurements on vibrational and rotational state dynamics. The results are important for the study of numerous radical species relevant to combustion processes. The method has been applied to the detailed study of photofragmentation dynamics in systems such as acetylene, which produces C 2 H; chlorofluoroethylene to study the HF product channel; vinyl chloride and dichloroethylene, which produce HCl; acetone, which produces CO and CH 3 ; and ammonia, which produces NH 2 . In addition, we have recently demonstrated use of the FTIR technique for preliminary studies of energy transfer events under near single collision conditions, radical-radical reactions, and laser-initiated chain reaction processes

  15. A Complete Video Coding Chain Based on Multi-Dimensional Discrete Cosine Transform

    Directory of Open Access Journals (Sweden)

    T. Fryza

    2010-09-01

    Full Text Available The paper deals with a video compression method based on the multi-dimensional discrete cosine transform. In the text, the encoder and decoder architectures including the definitions of all mathematical operations like the forward and inverse 3-D DCT, quantization and thresholding are presented. According to the particular number of currently processed pictures, the new quantization tables and entropy code dictionaries are proposed in the paper. The practical properties of the 3-D DCT coding chain compared with the modern video compression methods (such as H.264 and WebM and the computing complexity are presented as well. It will be proved the best compress properties could be achieved by complex H.264 codec. On the other hand the computing complexity - especially on the encoding side - is lower for the 3-D DCT method.

  16. Inverse Modeling Using Markov Chain Monte Carlo Aided by Adaptive Stochastic Collocation Method with Transformation

    Science.gov (United States)

    Zhang, D.; Liao, Q.

    2016-12-01

    The Bayesian inference provides a convenient framework to solve statistical inverse problems. In this method, the parameters to be identified are treated as random variables. The prior knowledge, the system nonlinearity, and the measurement errors can be directly incorporated in the posterior probability density function (PDF) of the parameters. The Markov chain Monte Carlo (MCMC) method is a powerful tool to generate samples from the posterior PDF. However, since the MCMC usually requires thousands or even millions of forward simulations, it can be a computationally intensive endeavor, particularly when faced with large-scale flow and transport models. To address this issue, we construct a surrogate system for the model responses in the form of polynomials by the stochastic collocation method. In addition, we employ interpolation based on the nested sparse grids and takes into account the different importance of the parameters, under the condition of high random dimensions in the stochastic space. Furthermore, in case of low regularity such as discontinuous or unsmooth relation between the input parameters and the output responses, we introduce an additional transform process to improve the accuracy of the surrogate model. Once we build the surrogate system, we may evaluate the likelihood with very little computational cost. We analyzed the convergence rate of the forward solution and the surrogate posterior by Kullback-Leibler divergence, which quantifies the difference between probability distributions. The fast convergence of the forward solution implies fast convergence of the surrogate posterior to the true posterior. We also tested the proposed algorithm on water-flooding two-phase flow reservoir examples. The posterior PDF calculated from a very long chain with direct forward simulation is assumed to be accurate. The posterior PDF calculated using the surrogate model is in reasonable agreement with the reference, revealing a great improvement in terms of

  17. Revising the formal, retrieving the hidden: Undergraduate curricular reform in medicine and the scientific, institutional, & social transformation of the clinical training environment

    Science.gov (United States)

    Jagosh, Justin J.

    2009-12-01

    In 2004, members of the McGill University Faculty of Medicine began implementing a new curriculum for undergraduate medical education entitled, Physicianship: The Physician as Professional and Healer. The initiative underscores the idea that physician training entails cultivating not only scientific knowledge and technical skill, but a mindset guided by intrinsic principles of doctoring. Although the McGill case exemplifies a wide-spread paradigm shift in medical teaching, there is a dearth of analysis concerning the degree of congruency between the objectives of formal undergraduate curricular revision and the so-called 'hidden curriculum' of the hospital training environment. With Physicianship as a point of departure, this dissertation maps evolutionary patterns in clinical medicine and, using qualitative methods, analyzes the perspectives of twenty physician-educators on curricular reform and the transforming clinical training environment. Physicians interviewed were generally supportive of the new curricular initiative. Concerns were raised, however, that many recent changes within the teaching hospital environment interfere with students' cultivation of professional and healer attributes. These changes were organized into three main themes: scientific, institutional, and social. Physicians expressed concern that what is often considered beneficial for patients is often detrimental for medical training. For example, increased use of diagnostic technologies has improved patient care but reduces opportunities for trainees' clinical skill development. Concern was raised that the concept of selfless service has been undermined through recent shift-work regulations and a culture gap between older and younger generation physicians. Alternatively, some perceived new policies of the clinical environment to be more conducive to physicians' self-care and quality of life. Younger trainees were often described as more competent in managing medical information, more open

  18. Renormalization group for centrosymmetric gauge transformations of the dynamic motion for a Markov-ordered polymer chain

    International Nuclear Information System (INIS)

    Mikhailov, I.D.; Zhuravskii, L.V.

    1987-01-01

    A method is proposed for calculating the vibrational-state density averaged over all configurations for a polymer chain with Markov disorder. The method is based on using a group of centrally symmetric gauge transformations that reduce the dynamic matrix for along polymer chain to renormalized dynamic matrices for short fragments. The short-range order is incorporated exactly in the averaging procedure, while the long-range order is incorporated in the self-consistent field approximation. Results are given for a simple skeletal model for a polymer containing tacticity deviations of Markov type

  19. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main......PRIMARY OBJECTIVE: The purpose of this study was to listen to and learn from children showing high levels of post-traumatic stress symptoms after parental acquired brain injury (ABI), in order to achieve an in-depth understanding of the difficulties the children face in their everyday lives...... finding indicates that the children experienced numerous losses, many of which were often suppressed or neglected by the children to protect the ill parents. CONCLUSIONS: The findings indicated that the children seemed to make a special effort to hide their feelings of loss and grief in order to protect...

  20. Evaluation of Bayesian estimation of a hidden continuous-time Markov chain model with application to threshold violation in water-quality indicators

    Science.gov (United States)

    Deviney, Frank A.; Rice, Karen; Brown, Donald E.

    2012-01-01

    Natural resource managers require information concerning  the frequency, duration, and long-term probability of occurrence of water-quality indicator (WQI) violations of defined thresholds. The timing of these threshold crossings often is hidden from the observer, who is restricted to relatively infrequent observations. Here, a model for the hidden process is linked with a model for the observations, and the parameters describing duration, return period, and long-term probability of occurrence are estimated using Bayesian methods. A simulation experiment is performed to evaluate the approach under scenarios based on the equivalent of a total monitoring period of 5-30 years and an observation frequency of 1-50 observations per year. Given constant threshold crossing rate, accuracy and precision of parameter estimates increased with longer total monitoring period and more-frequent observations. Given fixed monitoring period and observation frequency, accuracy and precision of parameter estimates increased with longer times between threshold crossings. For most cases where the long-term probability of being in violation is greater than 0.10, it was determined that at least 600 observations are needed to achieve precise estimates.  An application of the approach is presented using 22 years of quasi-weekly observations of acid-neutralizing capacity from Deep Run, a stream in Shenandoah National Park, Virginia. The time series also was sub-sampled to simulate monthly and semi-monthly sampling protocols. Estimates of the long-term probability of violation were unbiased despite sampling frequency; however, the expected duration and return period were over-estimated using the sub-sampled time series with respect to the full quasi-weekly time series.

  1. Digital Transformation of Lean Production: Systematic Approach for the Determination of Digitally Pervasive Value Chains

    OpenAIRE

    Peter Burggräf; Matthias Dannapfel; Hanno Voet; Patrick-Benjamin Bök; Jérôme Uelpenich; Julian Hoppe

    2017-01-01

    The increasing digitalization of value chains can help companies to handle rising complexity in their processes and thereby reduce the steadily increasing planning and control effort in order to raise performance limits. Due to technological advances, companies face the challenge of smart value chains for the purpose of improvements in productivity, handling the increasing time and cost pressure and the need of individualized production. Therefore, companies need to ensure quick and flexible ...

  2. A platform for exploration into chaining of web services for clinical data transformation and reasoning

    Science.gov (United States)

    Maldonado, José Alberto; Marcos, Mar; Fernández-Breis, Jesualdo Tomás; Parcero, Estíbaliz; Boscá, Diego; Legaz-García, María del Carmen; Martínez-Salvador, Begoña; Robles, Montserrat

    2016-01-01

    The heterogeneity of clinical data is a key problem in the sharing and reuse of Electronic Health Record (EHR) data. We approach this problem through the combined use of EHR standards and semantic web technologies, concretely by means of clinical data transformation applications that convert EHR data in proprietary format, first into clinical information models based on archetypes, and then into RDF/OWL extracts which can be used for automated reasoning. In this paper we describe a proof-of-concept platform to facilitate the (re)configuration of such clinical data transformation applications. The platform is built upon a number of web services dealing with transformations at different levels (such as normalization or abstraction), and relies on a collection of reusable mappings designed to solve specific transformation steps in a particular clinical domain. The platform has been used in the development of two different data transformation applications in the area of colorectal cancer. PMID:28269882

  3. A platform for exploration into chaining of web services for clinical data transformation and reasoning.

    Science.gov (United States)

    Maldonado, José Alberto; Marcos, Mar; Fernández-Breis, Jesualdo Tomás; Parcero, Estíbaliz; Boscá, Diego; Legaz-García, María Del Carmen; Martínez-Salvador, Begoña; Robles, Montserrat

    2016-01-01

    The heterogeneity of clinical data is a key problem in the sharing and reuse of Electronic Health Record (EHR) data. We approach this problem through the combined use of EHR standards and semantic web technologies, concretely by means of clinical data transformation applications that convert EHR data in proprietary format, first into clinical information models based on archetypes, and then into RDF/OWL extracts which can be used for automated reasoning. In this paper we describe a proof-of-concept platform to facilitate the (re)configuration of such clinical data transformation applications. The platform is built upon a number of web services dealing with transformations at different levels (such as normalization or abstraction), and relies on a collection of reusable mappings designed to solve specific transformation steps in a particular clinical domain. The platform has been used in the development of two different data transformation applications in the area of colorectal cancer.

  4. Zipf exponent of trajectory distribution in the hidden Markov model

    Science.gov (United States)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  5. Zipf exponent of trajectory distribution in the hidden Markov model

    International Nuclear Information System (INIS)

    Bochkarev, V V; Lerner, E Yu

    2014-01-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different

  6. A Novel Method for Decoding Any High-Order Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Fei Ye

    2014-01-01

    Full Text Available This paper proposes a novel method for decoding any high-order hidden Markov model. First, the high-order hidden Markov model is transformed into an equivalent first-order hidden Markov model by Hadar’s transformation. Next, the optimal state sequence of the equivalent first-order hidden Markov model is recognized by the existing Viterbi algorithm of the first-order hidden Markov model. Finally, the optimal state sequence of the high-order hidden Markov model is inferred from the optimal state sequence of the equivalent first-order hidden Markov model. This method provides a unified algorithm framework for decoding hidden Markov models including the first-order hidden Markov model and any high-order hidden Markov model.

  7. Petro Rents, Political Institutions, and Hidden Wealth

    DEFF Research Database (Denmark)

    Andersen, Jørgen Juel; Johannesen, Niels; Lassen, David Dreyer

    2017-01-01

    Do political institutions limit rent seeking by politicians? We study the transformation of petroleum rents, almost universally under direct government control, into hidden wealth using unique data on bank deposits in offshore financial centers that specialize in secrecy and asset protection. Our...... rulers is diverted to secret accounts. We find very limited evidence that shocks to other types of income not directly controlled by governments affect hidden wealth....

  8. Transforming governance or reinforcing hierarchies and competition: examining the public and hidden transcripts of the Global Fund and HIV in India.

    Science.gov (United States)

    Kapilashrami, Anuj; McPake, Barbara

    2013-09-01

    Global health initiatives (GHIs) have gained prominence as innovative and effective policy mechanisms to tackle global health priorities. More recent literature reveals governance-related challenges and their unintended health system effects. Much less attention is received by the relationship between these mechanisms, the ideas that underpin them and the country-level practices they generate. The Global Fund has leveraged significant funding and taken a lead in harmonizing disparate efforts to control HIV/AIDS. Its growing influence in recipient countries makes it a useful case to examine this relationship and evaluate the extent to which the dominant public discourse on Global Fund departs from the hidden resistances and conflicts in its operation. Drawing on insights from ethnographic fieldwork and 70 interviews with multiple stakeholders, this article aims to better understand and reveal the public and the hidden transcript of the Global Fund and its activities in India. We argue that while its public transcript abdicates its role in country-level operations, a critical ethnographic examination of the organization and governance of the Fund in India reveals a contrasting scenario. Its organizing principles prompt diverse actors with conflicting agendas to come together in response to the availability of funds. Multiple and discrete projects emerge, each leveraging control and resources and acting as conduits of power. We examine how management of HIV is punctuated with conflicts of power and interests in a competitive environment set off by the Fund protocol and discuss its system-wide effects. The findings also underscore the need for similar ethnographic research on the financing and policy-making architecture of GHIs.

  9. Sociology of Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Alireza Moradi

    2017-06-01

    Full Text Available This paper reviews the concept of hidden curriculum in the sociological theories and wants to explain sociological aspects of formation of hidden curriculum. The main question concentrates on the theoretical approaches in which hidden curriculum is explained sociologically.For this purpose it was applied qualitative research methodology. The relevant data include various sociological concepts and theories of hidden curriculum collected by the documentary method. The study showed a set of rules, procedures, relationships and social structure of education have decisive role in the formation of hidden curriculum. A hidden curriculum reinforces by existed inequalities among learners (based on their social classes or statues. There is, in fact, a balance between the learner's "knowledge receptions" with their "inequality proportion".The hidden curriculum studies from different major sociological theories such as Functionalism, Marxism and critical theory, Symbolic internationalism and Feminism. According to the functionalist perspective a hidden curriculum has a social function because it transmits social values. Marxists and critical thinkers correlate between hidden curriculum and the totality of social structure. They depicts that curriculum prepares learners for the exploitation in the work markets. Symbolic internationalism rejects absolute hegemony of hidden curriculum on education and looks to the socialization as a result of interaction between learner and instructor. Feminism theory also considers hidden curriculum as a vehicle which legitimates gender stereotypes.

  10. Transforming cold chain performance and management in lower-income countries.

    Science.gov (United States)

    Brison, Mike; LeTallec, Yann

    2017-04-19

    In many countries, one of the common factors limiting full and equitable access to effective immunization is the existence of gaps in cold chain and logistics (CCL) systems. This article focuses on the critical contribution that better management of CCL performance can make in addressing these barriers, as well as some essential practices needed to achieve and sustain these gains. These include (i) an emphasis on continuous improvement in CCL performance indicators, (ii) strong coordination and accountability across multiple stakeholders, and (iii) making the most of limited financial resources. This article is informed by the Clinton Health Access Initiative's (CHAI's) experience working with National Immunization Programs (NIPs) and immunization partners to improve the effectiveness and efficiency of CCL systems (including CCE deployment and maintenance, temperature monitoring and control, stock management and distribution) across ten Gavi-supported "focus" countries. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  11. Transformation

    DEFF Research Database (Denmark)

    Bock, Lars Nicolai

    2011-01-01

    Artiklen diskuterer ordet "transformation" med udgangspunkt i dels hvorledes ordet bruges i arkitektfaglig terminologi og dels med fokus på ordets potentielle indhold og egnethed i samme teminologi.......Artiklen diskuterer ordet "transformation" med udgangspunkt i dels hvorledes ordet bruges i arkitektfaglig terminologi og dels med fokus på ordets potentielle indhold og egnethed i samme teminologi....

  12. TRANSFORMATION

    Energy Technology Data Exchange (ETDEWEB)

    LACKS,S.A.

    2003-10-09

    Transformation, which alters the genetic makeup of an individual, is a concept that intrigues the human imagination. In Streptococcus pneumoniae such transformation was first demonstrated. Perhaps our fascination with genetics derived from our ancestors observing their own progeny, with its retention and assortment of parental traits, but such interest must have been accelerated after the dawn of agriculture. It was in pea plants that Gregor Mendel in the late 1800s examined inherited traits and found them to be determined by physical elements, or genes, passed from parents to progeny. In our day, the material basis of these genetic determinants was revealed to be DNA by the lowly bacteria, in particular, the pneumococcus. For this species, transformation by free DNA is a sexual process that enables cells to sport new combinations of genes and traits. Genetic transformation of the type found in S. pneumoniae occurs naturally in many species of bacteria (70), but, initially only a few other transformable species were found, namely, Haemophilus influenzae, Neisseria meningitides, Neisseria gonorrheae, and Bacillus subtilis (96). Natural transformation, which requires a set of genes evolved for the purpose, contrasts with artificial transformation, which is accomplished by shocking cells either electrically, as in electroporation, or by ionic and temperature shifts. Although such artificial treatments can introduce very small amounts of DNA into virtually any type of cell, the amounts introduced by natural transformation are a million-fold greater, and S. pneumoniae can take up as much as 10% of its cellular DNA content (40).

  13. The origin of the hidden supersymmetry

    International Nuclear Information System (INIS)

    Jakubsky, Vit; Nieto, Luis-Miguel; Plyushchay, Mikhail S.

    2010-01-01

    The hidden supersymmetry and related tri-supersymmetric structure of the free particle system, the Dirac delta potential problem and the Aharonov-Bohm effect (planar, bound state, and tubule models) are explained by a special nonlocal unitary transformation, which for the usual N=2 supercharges has a nature of Foldy-Wouthuysen transformation. We show that in general case, the bosonized supersymmetry of nonlocal, parity even systems emerges in the same construction, and explain the origin of the unusual N=2 supersymmetry of electron in three-dimensional parity even magnetic field. The observation extends to include the hidden superconformal symmetry.

  14. Exploring Lactobacillus reuteri DSM20016 as a biocatalyst for transformation of longer chain 1,2-diols: Limits with microcompartment.

    Science.gov (United States)

    Chen, Lu; Hatti-Kaul, Rajni

    2017-01-01

    Lactobacillus reuteri metabolises glycerol efficiently to form 3-hydroxypropionic acid (3-HP) and 1,3-propanediol (1,3PDO) by the same mechanism as that for 1,2-propanediol (1,2PDO) conversion to propionic acid and propanol via its propanediol utilization (pdu) pathway. Pdu enzymes are encoded by the pdu-operon, which also contain genes encoding the shell proteins of the microcompartment housing the metabolic pathway. In this work the selectivity and kinetics of the reactions catalysed by L. reuteri DSM20016 Pdu enzymes glycerol dehydratase (GDH), 1,3-propanediol oxidoreductase (PduQ) and coenzyme-A acylating propionaldehyde dehydrogenase (PduP), produced recombinantly, was investigated against corresponding substrates of different chain lengths. Glycerol dehydratase exhibited activity against C2-C4 polyols, with the highest activity against glycerol and 1,2-propanediol (1,2-PDO). A double mutant of the pduC gene of GDH (PduC-S302A/Q337A) was constructed that displayed lowered activity against glycerol and 1,2PDO but extended the substrate range upto C6-diol. The best substrate for both PduQ and PduP was 3-hydroxypropanal (3HPA), although PduP exhibited nearly 10-fold higher specific activity. The enzymes also showed some activity against C3-C10 aliphatic aldehydes, with PduP having higher relative activity. Subsequently, transformation of polyols using whole cells of L. reuteri containing the wild type- and mutated GDH, respectively, confirmed the reduced activity of the mutant against glycerol and 1,2PDO, but its activity against longer substrates was negligible. In contrast, recombinant Escherichia coli BL21(DE3) cells harboring the GDH variant converted diols with up to C6 carbon chain length to their respective aldehydes, suggesting that the protein shell of the microcompartment in L. reuteri posed a barrier to the passage of longer chain substrate.

  15. Transforming the Lives of Mountain Women Through the Himalayan Nettle Value Chain: A Case Study From Darchula, Far West Nepal

    Directory of Open Access Journals (Sweden)

    Lipy Adhikari

    2018-02-01

    Full Text Available Naugad is a remote rural municipality in the mountains of far west Nepal with poor accessibility and limited economic opportunities, especially for women and marginalized communities. Promotion of the natural resource-based value chain for allo (the Himalayan nettle, Girardinia diversifolia was identified as an innovative livelihood strategy by the local community. Value chain development started in 2014. The project was designed to focus on women and include participation by the private sector. This paper analyzes the impact of the project, especially on women's lives, using primary and secondary data. A community-owned enterprise was established with private-sector support from the South Asian Association of Regional Cooperation's Business Association of Home Based Workers (SABAH Nepal. The enterprise now has 82 members (69 of them women, with 150 households benefiting directly and indirectly. SABAH Nepal provided training in sustainable harvesting and processing techniques and promotes the products in high-end international markets. A buyback guarantee scheme provides security to local artisans. The quality and range of allo products have increased markedly, as has the share in benefits for local people. Skills training and visits to trade fairs have helped women build their capacity and take a leading role in the value chain process. The community-owned enterprise members have earned up to NPR 4000 per month from sewing, more than the local rate for day labor and sufficient to cover general household expenses. More than 25 women entrepreneurs have started microbusinesses related to allo. Allo has become an important economic asset, transforming the lives of mountain women in this village area. The approach has potential for scaling up across the subtropical to temperate areas of the Himalayan region in Bhutan, China, India, Myanmar, and Nepal.

  16. TRANSFORMER

    Science.gov (United States)

    Baker, W.R.

    1959-08-25

    Transformers of a type adapted for use with extreme high power vacuum tubes where current requirements may be of the order of 2,000 to 200,000 amperes are described. The transformer casing has the form of a re-entrant section being extended through an opening in one end of the cylinder to form a coaxial terminal arrangement. A toroidal multi-turn primary winding is disposed within the casing in coaxial relationship therein. In a second embodiment, means are provided for forming the casing as a multi-turn secondary. The transformer is characterized by minimized resistance heating, minimized external magnetic flux, and an economical construction.

  17. The spin-1/2 XXZ Heisenberg chain, the quantum algebra Uq[sl(2)], and duality transformations for minimal models

    International Nuclear Information System (INIS)

    Grimm, Uwe; Schuetz, Gunter

    1992-09-01

    The finite-size spectra of the spin-1/2 XXZ Heisenberg chain with toroidal boundary conditions and an even number of sites provide a projection mechanism yielding the spectra of models with central charge c q [sl(2)] quantum algebra transformations. (author)

  18. POVMs and hidden variables

    International Nuclear Information System (INIS)

    Stairs, Allen

    2007-01-01

    Recent results by Paul Busch and Adan Cabello claim to show that by appealing to POVMs, non-contextual hidden variables can be ruled out in two dimensions. While the results of Busch and Cabello are mathematically correct, interpretive problems render them problematic as no hidden variable proofs

  19. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  20. Hidden gauge symmetry

    International Nuclear Information System (INIS)

    O'Raifeartaigh, L.

    1979-01-01

    This review describes the principles of hidden gauge symmetry and of its application to the fundamental interactions. The emphasis is on the structure of the theory rather than on the technical details and, in order to emphasise the structure, gauge symmetry and hidden symmetry are first treated as independent phenomena before being combined into a single (hidden gauge symmetric) theory. The main application of the theory is to the weak and electromagnetic interactions of the elementary particles, and although models are used for comparison with experiment and for illustration, emphasis is placed on those features of the application which are model-independent. (author)

  1. Transformation of the electric power supply chain in competitive markets; Transformacoes da cadeia de suprimentos de energia eletrica em mercados competitivos

    Energy Technology Data Exchange (ETDEWEB)

    Barbosa, Paulo Sergio Franco [Universidade Estadual de Campinas, SP (Brazil). Faculdade de Engenharia Civil]. E-mail: franco@fec.unicamp.br; Leal, Lydiane Abdon [Universidade Estadual de Campinas, SP (Brazil). Faculdade de Engenharia Mecanica. Dept. de Energia]. E-mail: lyable@bol.com.br

    2002-07-01

    This work presents an analysis of the transformation occurred in the electric power supply chain arising out from the privatization of the electric power sector in Brazil. The analysis includes change aspects concerning to the flux of electric power, information, financial and risk fluxes following the productive and commercialization chain. The work also analyses the british experience for identification of efficiency losses and gains in the management of some pos privatization processes, highlighting companies which experienced evolution in the corporative strategies, obtained from the large period of commercial operation not submitted to non regulated environment.

  2. The hidden universe

    International Nuclear Information System (INIS)

    Disney, M.

    1985-01-01

    Astronomer Disney has followed a somewhat different tack than that of most popular books on cosmology by concentrating on the notion of hidden (as in not directly observable by its own radiation) matter in the universe

  3. Locating Hidden Servers

    National Research Council Canada - National Science Library

    Oeverlier, Lasse; Syverson, Paul F

    2006-01-01

    .... Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship...

  4. Hidden charged dark matter

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kaplinghat, Manoj; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    Can dark matter be stabilized by charge conservation, just as the electron is in the standard model? We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact (\\rm U)(1) gauge symmetry of the hidden sector. Such candidates are predicted in WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many novel properties not shared by neutral dark matter: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may reduce its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ∼ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially impacting properties of the Bullet Cluster and the observed morphology of galactic halos. We analyze all of these effects in a WIMPless model in which the hidden sector is a simplified version of the minimal supersymmetric standard model and the dark matter is a hidden sector stau. We find that charged hidden dark matter is viable and consistent with the correct relic density for reasonable model parameters and dark matter masses in the range 1 GeV ∼ X ∼< 10 TeV. At the same time, in the preferred range of parameters, this model predicts cores in the dark matter halos of small galaxies and other halo properties that may be within the reach of future observations. These models therefore provide a viable and well-motivated framework for collisional dark matter with Sommerfeld enhancement, with novel implications for astrophysics and dark matter searches

  5. Geometric phases and hidden local gauge symmetry

    International Nuclear Information System (INIS)

    Fujikawa, Kazuo

    2005-01-01

    The analysis of geometric phases associated with level crossing is reduced to the familiar diagonalization of the Hamiltonian in the second quantized formulation. A hidden local gauge symmetry, which is associated with the arbitrariness of the phase choice of a complete orthonormal basis set, becomes explicit in this formulation (in particular, in the adiabatic approximation) and specifies physical observables. The choice of a basis set which specifies the coordinate in the functional space is arbitrary in the second quantization, and a subclass of coordinate transformations, which keeps the form of the action invariant, is recognized as the gauge symmetry. We discuss the implications of this hidden local gauge symmetry in detail by analyzing geometric phases for cyclic and noncyclic evolutions. It is shown that the hidden local symmetry provides a basic concept alternative to the notion of holonomy to analyze geometric phases and that the analysis based on the hidden local gauge symmetry leads to results consistent with the general prescription of Pancharatnam. We however note an important difference between the geometric phases for cyclic and noncyclic evolutions. We also explain a basic difference between our hidden local gauge symmetry and a gauge symmetry (or equivalence class) used by Aharonov and Anandan in their definition of generalized geometric phases

  6. Critical Success Factors for Intra-Disciplinary Transformation of the Agricultural Biotechnology Industry in Taiwan based on the Value Chain Concept

    OpenAIRE

    Meng-Shiunn Lee

    2008-01-01

    This study examines the agricultural biotechnology industry in the context of value chain theory introduced by Porter (1985). It also compiles opinions on development directions for agricultural biotechnology in Taiwan from numerous national scholars and experts using the fuzzy delphi and fuzzy analytical hierarchy process methods to learn about critical success factors for the agricultural biotechnology industry¡¦s intra-disciplinary transformation in Taiwan. In this way, we seek to contribu...

  7. Context Tree Estimation in Variable Length Hidden Markov Models

    OpenAIRE

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exp...

  8. Search for Hidden Particles

    CERN Multimedia

    Solovev, V

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  9. Hidden symmetries of the Principal Chiral Model unveiled

    International Nuclear Information System (INIS)

    Devchand, C.; Schiff, J.

    1996-12-01

    By relating the two-dimensional U(N) Principal Chiral Model to a Simple linear system we obtain a free-field parametrization of solutions. Obvious symmetry transformations on the free-field data give symmetries of the model. In this way all known 'hidden symmetries' and Baecklund transformations, as well as a host of new symmetries, arise. (author). 21 refs

  10. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report...

  11. Co-crystallization phase transformations in all π-conjugated block copolymers with different main-chain moieties.

    Science.gov (United States)

    Lee, Yi-Huan; Chen, Wei-Chih; Yang, Yi-Lung; Chiang, Chi-Ju; Yokozawa, Tsutomu; Dai, Chi-An

    2014-05-21

    Driven by molecular affinity and balance in the crystallization kinetics, the ability to co-crystallize dissimilar yet self-crystallizable blocks of a block copolymer (BCP) into a uniform domain may strongly affect its phase diagram. In this study, we synthesize a new series of crystalline and monodisperse all-π-conjugated poly(2,5-dihexyloxy-p-phenylene)-b-poly(3-(2-ethylhexyl)thiophene) (PPP-P3EHT) BCPs and investigate this multi-crystallization effect. Despite vastly different side-chain and main-chain structures, PPP and P3EHT blocks are able to co-crystallize into a single uniform domain comprising PPP and P3EHT main-chains with mutually interdigitated side-chains spaced in-between. With increasing P3EHT fraction, PPP-P3EHTs undergo sequential phase transitions and form hierarchical superstructures including predominately PPP nanofibrils, co-crystalline nanofibrils, a bilayer co-crystalline/pure P3EHT lamellar structure, a microphase-separated bilayer PPP-P3EHT lamellar structure, and finally P3EHT nanofibrils. In particular, the presence of the new co-crystalline lamellar structure is the manifestation of the interaction balance between self-crystallization and co-crystallization of the dissimilar polymers on the resulting nanostructure of the BCP. The current study demonstrates the co-crystallization nature of all-conjugated BCPs with different main-chain moieties and may provide new guidelines for the organization of π-conjugated BCPs for future optoelectronic applications.

  12. Hidden gauge structure of supersymmetric free differential algebras

    Energy Technology Data Exchange (ETDEWEB)

    Andrianopoli, Laura [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy); D’Auria, Riccardo [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); Ravera, Lucrezia [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy)

    2016-08-16

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q{sup ′} introduced in http://dx.doi.org/10.1016/0550-3213(82)90376-5 and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B{sup (2)} and B{sup (3)} in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of two nilpotent fermionic generators in the hidden algebra. We propose that our approach, where all the invariances of the FDA are expressed as Lie derivatives of the p-forms in the hidden supergroup manifold, could be an appropriate framework to discuss theories defined in enlarged versions of superspace recently considered in the literature, such us double field theory and its generalizations.

  13. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  14. A hidden history

    OpenAIRE

    Peppers, Emily

    2008-01-01

    The Cultural Collections Audit project began at the University of Edinburgh in 2004, searching for hidden treasures in its 'distributed heritage collections' across the university. The objects and collections recorded in the Audit ranged widely from fine art and furniture to historical scientific and teaching equipment and personalia relating to key figures in the university's long tradition of academic excellence. This information was gathered in order to create a central database of informa...

  15. Coupling of Hidden Sector

    OpenAIRE

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fer\\-mions (``sterinos'') and sterile mediating bosons (``sterons'') of mass dimension 1 (not 2!) --- the last described by an antisymmetric tensor field --- requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, sugge...

  16. Modelling decreased food chain accumulation of HOCs due to strong sorption to carbonaceous materials and metabolic transformation

    NARCIS (Netherlands)

    Moermond, C.T.A.; Traas, T.P.; Roessink, I.; Veltman, K.; Hendriks, A.J.; Koelmans, A.A.

    2007-01-01

    The predictive power of bioaccumulation models may be limited when they do not account for strong sorption of organic contaminants to carbonaceous materials (CM) such as black carbon, and when they do not include metabolic transformation. We tested a food web accumulation model, including sorption

  17. Exploring amino acid side chain decomposition using enzymatic digestion and HPLC-MS: combined lysine transformations in chlorinated waters

    Science.gov (United States)

    Characterizing the transformations of polypeptides is important across a broad range of scientific disciplines. As polypeptides are an important constituent of dissolved organic matter within seawater and freshwater, it is important to understand their fate. Oxidants formed in blood, as part of the ...

  18. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  19. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The estimation of the HMM is conducted using a variant of the Iterative Conditional Expectation-Generalized Mixture (ICE-GEMI) algorithm proposed by Delignon et al. (1997), that permits analysis of the conditional distributions of economic data and allows for different functional forms across regimes...

  20. Localization of hidden Chua's attractors

    International Nuclear Information System (INIS)

    Leonov, G.A.; Kuznetsov, N.V.; Vagaitsev, V.I.

    2011-01-01

    The classical attractors of Lorenz, Rossler, Chua, Chen, and other widely-known attractors are those excited from unstable equilibria. From computational point of view this allows one to use numerical method, in which after transient process a trajectory, started from a point of unstable manifold in the neighborhood of equilibrium, reaches an attractor and identifies it. However there are attractors of another type: hidden attractors, a basin of attraction of which does not contain neighborhoods of equilibria. In the present Letter for localization of hidden attractors of Chua's circuit it is suggested to use a special analytical-numerical algorithm. -- Highlights: → There are hidden attractors: basin doesn't contain neighborhoods of equilibria. → Hidden attractors cannot be reached by trajectory from neighborhoods of equilibria. → We suggested special procedure for localization of hidden attractors. → We discovered hidden attractor in Chua's system, L. Chua in his work didn't expect this.

  1. Modeling generator power plant portfolios and pollution taxes in electric power supply chain networks: a transportation network equilibrium transformation

    International Nuclear Information System (INIS)

    Kai Wu; Nagurney, A.; University of Massachusetts, Amherst, MA; Zugang Liu; Stranlund, J.K.

    2006-01-01

    Global climate change and fuel security risks have encouraged international and regional adoption of pollution/carbon taxes. A major portion of such policy interventions is directed at the electric power industry with taxes applied according to the type of fuel used by the power generators in their power plants. This paper proposes an electric power supply chain network model that captures the behavior of power generators faced with a portfolio of power plant options and subject to pollution taxes. We demonstrate that this general model can be reformulated as a transportation network equilibrium model with elastic demands and qualitatively analyzed and solved as such. The connections between these two different modeling schemas is done through finite-dimensional variational inequality theory. The numerical examples illustrate how changes in the pollution/carbon taxes affect the equilibrium electric power supply chain network production outputs, the transactions between the various decision-makers the demand market prices, as well as the total amount of carbon emissions generated. (author)

  2. Phasic Triplet Markov Chains.

    Science.gov (United States)

    El Yazid Boudaren, Mohamed; Monfrini, Emmanuel; Pieczynski, Wojciech; Aïssani, Amar

    2014-11-01

    Hidden Markov chains have been shown to be inadequate for data modeling under some complex conditions. In this work, we address the problem of statistical modeling of phenomena involving two heterogeneous system states. Such phenomena may arise in biology or communications, among other fields. Namely, we consider that a sequence of meaningful words is to be searched within a whole observation that also contains arbitrary one-by-one symbols. Moreover, a word may be interrupted at some site to be carried on later. Applying plain hidden Markov chains to such data, while ignoring their specificity, yields unsatisfactory results. The Phasic triplet Markov chain, proposed in this paper, overcomes this difficulty by means of an auxiliary underlying process in accordance with the triplet Markov chains theory. Related Bayesian restoration techniques and parameters estimation procedures according to the new model are then described. Finally, to assess the performance of the proposed model against the conventional hidden Markov chain model, experiments are conducted on synthetic and real data.

  3. Hidden Liquidity: Determinants and Impact

    OpenAIRE

    Gökhan Cebiroglu; Ulrich Horst

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, ...

  4. Production of recombinant single chain antibodies (scFv) in vegetatively reproductive Kalanchoe pinnata by in planta transformation.

    Science.gov (United States)

    Jung, Yuchul; Rhee, Yong; Auh, Chung-Kyoon; Shim, Hyekyung; Choi, Jung-Jin; Kwon, Suk-Tae; Yang, Joo-Sung; Kim, Donggiun; Kwon, Myung-Hee; Kim, Yong-Sung; Lee, Sukchan

    2009-10-01

    We developed an asexual reproductive plant, Kalanchoe pinnata, as a new bioreactor for plant-based molecular farming using a newly developed transformation method. Leaf crenate margins were pin-pricked to infect the plant with the Agrobacterium strain LBA4404 and vacuum infiltration was also applied to introduce the target gene into the plants. Subsequently, the young mother leaf produced new clones at the leaf crenate margins without the need for time- and labor-consuming tissue culture procedures. The average transformation rates were approximately 77 and 84% for pin-prickling and vacuum-infiltration methods, respectively. To functionally characterize an introduced target protein, a nucleic acid hydrolyzing recombinant 3D8 scFv was selected and the plant based 3D8 scFv proteins were purified and analyzed. Based on abzyme analysis, the purified protein expressed with this system had catalytic activity and exhibited all of properties of the protein produced in an E. coli system. This result suggested that vegetatively reproductive K. pinnata can be a novel and potent bioreactor for bio-pharmaceutical proteins.

  5. Hidden Risk Factors for Women

    Science.gov (United States)

    ... A.S.T. Quiz Hidden Stroke Risk Factors for Women Updated:Nov 22,2016 Excerpted from "What Women Need To Know About The Hidden Risk Factors ... 2012) This year, more than 100,000 U.S. women under 65 will have a stroke. Stroke is ...

  6. Higgs Portal into Hidden Sectors

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    Several attractive theoretical ideas suggest the existence of one or more 'hidden sectors' consisting of standard model singlet fields, some of which may not be too heavy. There is a profound reason to think that the Higgs sector might provide the first access to these hidden sectors. This scenario could affect Higgs phenomenology in drastic ways.

  7. Impact of initial FDG-PET/CT and serum-free light chain on transformation of conventionally defined solitary plasmacytoma to multiple myeloma.

    Science.gov (United States)

    Fouquet, Guillemette; Guidez, Stéphanie; Herbaux, Charles; Van de Wyngaert, Zoé; Bonnet, Sarah; Beauvais, David; Demarquette, Hélène; Adib, Salim; Hivert, Bénédicte; Wemeau, Mathieu; Berthon, Céline; Terriou, Louis; Coiteux, Valérie; Macro, Margaret; Decaux, Olivier; Facon, Thierry; Huglo, Damien; Leleu, Xavier

    2014-06-15

    Solitary plasmacytoma (SP) is a localized proliferation of monoclonal plasma cells in either bone or soft tissue, without evidence of multiple myeloma (MM), and whose prognosis is marked by a high risk of transformation to MM. We studied the impact of FDG-PET/CT (2[18F]fluoro-2-deoxy-D-glucose positron emission tomography-computed tomography) on the risk of transformation of SP to overt MM among other markers in a series of 43 patients diagnosed with SP. Median age was 57.5 years; 48% of patients had an abnormal involved serum-free light chain (sFLC) value, and 64% had an abnormal sFLC ratio at diagnosis. Thirty-three percent had two or more hypermetabolic lesions on initial PET/CT, and 20% had two or more focal lesions on initial MRI. With a median follow-up of 50 months, 14 patients transformed to MM with a median time (TTMM) of 71 months. The risk factors that significantly shortened TTMM at diagnosis were two or more hypermetabolic lesions on PET/CT, abnormal sFLC ratio and involved sFLC, and to a lesser extent at completion of treatment, absence of normalized involved sFLC and PET/CT or MRI. In a multivariate analysis, abnormal initial involved sFLC [OR = 10; 95% confidence interval (CI), 1-87; P = 0.008] and PET/CT (OR = 5; 95% CI, 0-9; P = 0.032) independently shortened TTMM. An abnormal involved sFLC value and the presence of at least two hypermetabolic lesions on PET/CT at diagnosis of SP were the two predictors of early evolution to myeloma in our series. This data analysis will need confirmation in a larger study, and the study of these two risk factors may lead to a different management of patients with SP in the future. . ©2014 American Association for Cancer Research.

  8. Multivariate longitudinal data analysis with mixed effects hidden Markov models.

    Science.gov (United States)

    Raffa, Jesse D; Dubin, Joel A

    2015-09-01

    Multiple longitudinal responses are often collected as a means to capture relevant features of the true outcome of interest, which is often hidden and not directly measurable. We outline an approach which models these multivariate longitudinal responses as generated from a hidden disease process. We propose a class of models which uses a hidden Markov model with separate but correlated random effects between multiple longitudinal responses. This approach was motivated by a smoking cessation clinical trial, where a bivariate longitudinal response involving both a continuous and a binomial response was collected for each participant to monitor smoking behavior. A Bayesian method using Markov chain Monte Carlo is used. Comparison of separate univariate response models to the bivariate response models was undertaken. Our methods are demonstrated on the smoking cessation clinical trial dataset, and properties of our approach are examined through extensive simulation studies. © 2015, The International Biometric Society.

  9. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  10. Infinite hidden conditional random fields for human behavior analysis.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time.

  11. Hidden Markov Model Application to Transfer The Trader Online Forex Brokers

    Directory of Open Access Journals (Sweden)

    Farida Suharleni

    2012-05-01

    Full Text Available Hidden Markov Model is elaboration of Markov chain, which is applicable to cases that can’t directly observe. In this research, Hidden Markov Model is used to know trader’s transition to broker forex online. In Hidden Markov Model, observed state is observable part and hidden state is hidden part. Hidden Markov Model allows modeling system that contains interrelated observed state and hidden state. As observed state in trader’s transition to broker forex online is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online, whereas as hidden state is broker forex online Marketiva, Masterforex, Instaforex, FBS and Others. First step on application of Hidden Markov Model in this research is making construction model by making a probability of transition matrix (A from every broker forex online. Next step is making a probability of observation matrix (B by making conditional probability of five categories, that is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online and also need to determine an initial state probability (π from every broker forex online. The last step is using Viterbi algorithm to find hidden state sequences that is broker forex online sequences which is the most possible based on model and observed state that is the five categories. Application of Hidden Markov Model is done by making program with Viterbi algorithm using Delphi 7.0 software with observed state based on simulation data. Example: By the number of observation T = 5 and observed state sequences O = (2,4,3,5,1 is found hidden state sequences which the most possible with observed state O as following : where X1 = FBS, X2 = Masterforex, X3 = Marketiva, X4 = Others, and X5 = Instaforex.

  12. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  13. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group....

  14. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...

  15. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... for Families - Vietnamese Spanish Facts for Families Guide Child Abuse - The Hidden Bruises No. 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ...

  16. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  17. Hidden Curriculum: An Analytical Definition

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Andarvazh

    2018-03-01

    Full Text Available Background: The concept of hidden curriculum was first used by Philip Jackson in 1968, and Hafferty brought this concept to the medical education. Many of the subjects that medical students learn are attributed to this curriculum. So far several definitions have been presented for the hidden curriculum, which on the one hand made this concept richer, and on the other hand, led to confusion and ambiguity.This paper tries to provide a clear and comprehensive definition of it.Methods: In this study, concept analysis of McKenna method was used. Using keywords and searching in the databases, 561 English and 26 Persian references related to the concept was found, then by limitingthe research scope, 125 abstracts and by finding more relevant references, 55 articles were fully studied.Results: After analyzing the definitions by McKenna method, the hidden curriculum is defined as follows: The hidden curriculum is a hidden, powerful, intrinsic in organizational structure and culture and sometimes contradictory message, conveyed implicitly and tacitly in the learning environment by structural and human factors and its contents includes cultural habits and customs, norms, values, belief systems, attitudes, skills, desires and behavioral and social expectations can have a positive or negative effect, unplanned, neither planners nor teachers, nor learners are aware of it. The ultimate consequence of the hidden curriculum includes reproducing the existing class structure, socialization, and familiarizing learners for transmission and joining the professional world.Conclusion: Based on the concept analysis, we arrived at an analytical definition of the hidden curriculum that could be useful for further studies in this area.Keywords: CONCEPT ANALYSIS, HIDDEN CURRICULUM, MCKENNA’S METHOD

  18. Transformation of Abandonment

    DEFF Research Database (Denmark)

    Krag, Mo Michelsen Stochholm

    2015-01-01

    the controlled ruin will play the role of catalyst of the disclosing of hidden narratives and through decay in the end turn Figure 2 Transformation process: Controlled ruin 2014, Thisted Municipality, Denmark into nature. The demolition process is simply slowed down. Similarly to the mechanisms in a mourning...

  19. Hidden ion population: Revisited

    International Nuclear Information System (INIS)

    Olsen, R.C.; Chappell, C.R.; Gallagher, D.L.; Green, J.L.; Gurnett, D.A.

    1985-01-01

    Satellite potentials in the outer plasmasphere range from near zero to +5 to +10 V. Under such conditions ion measurements may not include the low energy core of the plasma population. In eclipse, the photoelectron current drops to zero, and the spacecraft potential can drop to near zero volts. In regions where the ambient plasma density is below 100 cm -3 , previously unobserved portions of the ambient plasma distribution function can become visible in eclipse. A survey of the data obtained from the retarding ion mass spectrometer (RIMS) on Dynamics Explorer 1 shows that the RIMS detector generally measured the isotropic background in both sunlight and eclipse in the plasma-sphere. Absolute density measurements for the ''hidden'' ion population are obtained for the first time using the plasma wave instrument observations of the upper hybrid resonance. Agreement in total density is found in sunlight and eclipse measurements at densities above 80 cm -3 . In eclipse, agreement is found at densities as low as 20 cm -3 . The isotropic plasma composition is primarily H + , with approx.10% He + , and 0.1 to 1.0% O + . A low energy field-aligned ion population appears in eclipse measurements outside the plasmasphere, which is obscured in sunlight. These field-aligned ions can be interpreted as field-aligned flows with densities of a few particles per cubic centimeter, flowing at 5-20 km/s. The problem in measuring these field-aligned flows in sunlight is the masking of the high energy tail of the field-aligned distribution by the isotropic background. Effective measurement of the core of the magnetospheric plasma distribution awaits satellites with active means of controlling the satellite potential

  20. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  1. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  2. Hidden photons in connection to dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah; Ringwald, Andreas; Goodsell, Mark D.

    2013-06-01

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  3. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  4. Detecting hidden particles with MATHUSLA

    Science.gov (United States)

    Evans, Jared A.

    2018-03-01

    A hidden sector containing light long-lived particles provides a well-motivated place to find new physics. The recently proposed MATHUSLA experiment has the potential to be extremely sensitive to light particles originating from rare meson decays in the very long lifetime region. In this work, we illustrate this strength with the specific example of a light scalar mixed with the standard model-like Higgs boson, a model where MATHUSLA can further probe unexplored parameter space from exotic Higgs decays. Design augmentations should be considered in order to maximize the ability of MATHUSLA to discover very light hidden sector particles.

  5. Hidden Crises and Communication: An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  6. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  7. HIDDEN WAR AGAINST WOMEN

    Directory of Open Access Journals (Sweden)

    Şehriban Şahin Kaya

    2011-01-01

    Full Text Available For the last couple of decades, there has been a dramatic regress in the women’seconomic, social and political positions in Turkey.The number of womenparticipating in job market decreased from 34.1 percent in 1990 to 23.5 percent in2009. Almost 85 percent of the working women are still stuck in traditionalfemale jobs. A diminishing representation of womenin politics and increasingviolence against women have been other features ofthis regression. At the sametime period, a transformation of Turkish media camewith the boom of the numberof commercial TV channels, radio stations, magazines and newspapers. Thisnewly transformed media did manage traditional gender roles to infiltrate thethoughts of women, majority of whom stayed out of job market. The images ofwomen created through the advertisements, TV serials, TV talk shows, andmagazines have been more altruistic family orientedtype than women questingfor equal rights. Today, more and more women watchTV programs, supportcosmetic industry, spend lots of money on clothing, and are very interested intheir body, value traditional gender roles and do not ask for equality. Recently,the scholars began to discuss the rise of conservatism in Turkey withoutaddressing the backward shift in women position invarious spheres of life. Allthese problematical issues mentioned above need tobe considered within asociological framework that should be able to showus the current situation ofwomen in Turkey. This presentation attempts to dothis.

  8. SHIFT: server for hidden stops analysis in frame-shifted translation.

    Science.gov (United States)

    Gupta, Arun; Singh, Tiratha Raj

    2013-02-23

    Frameshift is one of the three classes of recoding. Frame-shifts lead to waste of energy, resources and activity of the biosynthetic machinery. In addition, some peptides synthesized after frame-shifts are probably cytotoxic which serve as plausible cause for innumerable number of diseases and disorders such as muscular dystrophies, lysosomal storage disorders, and cancer. Hidden stop codons occur naturally in coding sequences among all organisms. These codons are associated with the early termination of translation for incorrect reading frame selection and help to reduce the metabolic cost related to the frameshift events. Researchers have identified several consequences of hidden stop codons and their association with myriad disorders. However the wealth of information available is speckled and not effortlessly acquiescent to data-mining. To reduce this gap, this work describes an algorithmic web based tool to study hidden stops in frameshifted translation for all the lineages through respective genetic code systems. This paper describes SHIFT, an algorithmic web application tool that provides a user-friendly interface for identifying and analyzing hidden stops in frameshifted translation of genomic sequences for all available genetic code systems. We have calculated the correlation between codon usage frequencies and the plausible contribution of codons towards hidden stops in an off-frame context. Markovian chains of various order have been used to model hidden stops in frameshifted peptides and their evolutionary association with naturally occurring hidden stops. In order to obtain reliable and persuasive estimates for the naturally occurring and predicted hidden stops statistical measures have been implemented. This paper presented SHIFT, an algorithmic tool that allows user-friendly exploration, analysis, and visualization of hidden stop codons in frameshifted translations. It is expected that this web based tool would serve as a useful complement for

  9. Entry deterrence and hidden competition

    NARCIS (Netherlands)

    Lavrutich, Maria; Huisman, Kuno; Kort, Peter

    This paper studies strategic investment behavior of firms facing an uncertain demand in a duopoly setting. Firms choose both investment timing and the capacity level while facing additional uncertainty about market participants, which is introduced via the concept of hidden competition. We focus on

  10. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  11. The Hidden Dimensions of Databases.

    Science.gov (United States)

    Jacso, Peter

    1994-01-01

    Discusses methods of evaluating commercial online databases and provides examples that illustrate their hidden dimensions. Topics addressed include size, including the number of records or the number of titles; the number of years covered; and the frequency of updates. Comparisons of Readers' Guide Abstracts and Magazine Article Summaries are…

  12. Mathematical algorithm to transform digital biomass distribution maps into linear programming networks in order to optimize bio-energy delivery chains

    NARCIS (Netherlands)

    Velazquez-Marti, B.; Annevelink, E.

    2008-01-01

    Many linear programming models have been developed to model the logistics of bio-energy chains. These models help to determine the best set-up of bio-energy chains. Most of them use network structures built up from nodes with one or more depots, and arcs connecting these depots. Each depot is source

  13. Hidden supersymmetry and large N

    International Nuclear Information System (INIS)

    Alfaro, J.

    1988-01-01

    In this paper we present a new method to deal with the leading order in the large-N expansion of a quantum field theory. The method uses explicitly the hidden supersymmetry that is present in the path-integral formulation of a stochastic process. In addition to this we derive a new relation that is valid in the leading order of the large-N expansion of the hermitian-matrix model for any spacetime dimension. (orig.)

  14. Photoacoustic imaging of hidden dental caries by using a bundle of hollow optical fibers

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2018-02-01

    Photoacoustic imaging system using a bundle of hollow-optical fibers to detect hidden dental caries is proposed. Firstly, we fabricated a hidden caries model with a brown pigment simulating a common color of caries lesion. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating Nd:YAG laser light with a 532 nm wavelength to occlusal surface of model tooth. We calculated by Fourier transform and found that the waveform from the carious part provides frequency components of approximately from 0.5 to 1.2 MHz. Then a photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for clinical applications. From intensity map of frequency components in 0.5-1.2 MHz, photoacoustic images of hidden caries in the simulated samples were successfully obtained.

  15. Hidden particle production at the ILC

    International Nuclear Information System (INIS)

    Fujii, Keisuke; Itoh, Hideo; Okada, Nobuchika; Hano, Hitoshi; Yoshioka, Tamaki

    2008-01-01

    In a class of new physics models, the new physics sector is completely or partly hidden, namely, a singlet under the standard model (SM) gauge group. Hidden fields included in such new physics models communicate with the standard model sector through higher-dimensional operators. If a cutoff lies in the TeV range, such hidden fields can be produced at future colliders. We consider a scalar field as an example of the hidden fields. Collider phenomenology on this hidden scalar is similar to that of the SM Higgs boson, but there are several features quite different from those of the Higgs boson. We investigate productions of the hidden scalar at the International Linear Collider (ILC) and study the feasibility of its measurements, in particular, how well the ILC distinguishes the scalar from the Higgs boson, through realistic Monte Carlo simulations.

  16. Attenuated Total Reflectance Fourier transform infrared spectroscopy for determination of long chain free fatty acid concentration in oily wastewater using the double wavenumber extrapolation technique

    Science.gov (United States)

    Long Chain Free Fatty Acids (LCFFAs) from the hydrolysis of fat, oil and grease (FOG) are major components in the formation of insoluble saponified solids known as FOG deposits that accumulate in sewer pipes and lead to sanitary sewer overflows (SSOs). A Double Wavenumber Extrapolative Technique (DW...

  17. Hidden measurements, hidden variables and the volume representation of transition probabilities

    OpenAIRE

    Oliynyk, Todd A.

    2005-01-01

    We construct, for any finite dimension $n$, a new hidden measurement model for quantum mechanics based on representing quantum transition probabilities by the volume of regions in projective Hilbert space. For $n=2$ our model is equivalent to the Aerts sphere model and serves as a generalization of it for dimensions $n \\geq 3$. We also show how to construct a hidden variables scheme based on hidden measurements and we discuss how joint distributions arise in our hidden variables scheme and th...

  18. Dissipative hidden sector dark matter

    Science.gov (United States)

    Foot, R.; Vagnozzi, S.

    2015-01-01

    A simple way of explaining dark matter without modifying known Standard Model physics is to require the existence of a hidden (dark) sector, which interacts with the visible one predominantly via gravity. We consider a hidden sector containing two stable particles charged under an unbroken U (1 )' gauge symmetry, hence featuring dissipative interactions. The massless gauge field associated with this symmetry, the dark photon, can interact via kinetic mixing with the ordinary photon. In fact, such an interaction of strength ε ˜10-9 appears to be necessary in order to explain galactic structure. We calculate the effect of this new physics on big bang nucleosynthesis and its contribution to the relativistic energy density at hydrogen recombination. We then examine the process of dark recombination, during which neutral dark states are formed, which is important for large-scale structure formation. Galactic structure is considered next, focusing on spiral and irregular galaxies. For these galaxies we modeled the dark matter halo (at the current epoch) as a dissipative plasma of dark matter particles, where the energy lost due to dissipation is compensated by the energy produced from ordinary supernovae (the core-collapse energy is transferred to the hidden sector via kinetic mixing induced processes in the supernova core). We find that such a dynamical halo model can reproduce several observed features of disk galaxies, including the cored density profile and the Tully-Fisher relation. We also discuss how elliptical and dwarf spheroidal galaxies could fit into this picture. Finally, these analyses are combined to set bounds on the parameter space of our model, which can serve as a guideline for future experimental searches.

  19. Hidden Structural Codes in Protein Intrinsic Disorder.

    Science.gov (United States)

    Borkosky, Silvia S; Camporeale, Gabriela; Chemes, Lucía B; Risso, Marikena; Noval, María Gabriela; Sánchez, Ignacio E; Alonso, Leonardo G; de Prat Gay, Gonzalo

    2017-10-17

    Intrinsic disorder is a major structural category in biology, accounting for more than 30% of coding regions across the domains of life, yet consists of conformational ensembles in equilibrium, a major challenge in protein chemistry. Anciently evolved papillomavirus genomes constitute an unparalleled case for sequence to structure-function correlation in cases in which there are no folded structures. E7, the major transforming oncoprotein of human papillomaviruses, is a paradigmatic example among the intrinsically disordered proteins. Analysis of a large number of sequences of the same viral protein allowed for the identification of a handful of residues with absolute conservation, scattered along the sequence of its N-terminal intrinsically disordered domain, which intriguingly are mostly leucine residues. Mutation of these led to a pronounced increase in both α-helix and β-sheet structural content, reflected by drastic effects on equilibrium propensities and oligomerization kinetics, and uncovers the existence of local structural elements that oppose canonical folding. These folding relays suggest the existence of yet undefined hidden structural codes behind intrinsic disorder in this model protein. Thus, evolution pinpoints conformational hot spots that could have not been identified by direct experimental methods for analyzing or perturbing the equilibrium of an intrinsically disordered protein ensemble.

  20. Gauging hidden symmetries in two dimensions

    International Nuclear Information System (INIS)

    Samtleben, Henning; Weidner, Martin

    2007-01-01

    We initiate the systematic construction of gauged matter-coupled supergravity theories in two dimensions. Subgroups of the affine global symmetry group of toroidally compactified supergravity can be gauged by coupling vector fields with minimal couplings and a particular topological term. The gauge groups typically include hidden symmetries that are not among the target-space isometries of the ungauged theory. The gaugings constructed in this paper are described group-theoretically in terms of a constant embedding tensor subject to a number of constraints which parametrizes the different theories and entirely encodes the gauged Lagrangian. The prime example is the bosonic sector of the maximally supersymmetric theory whose ungauged version admits an affine e 9 global symmetry algebra. The various parameters (related to higher-dimensional p-form fluxes, geometric and non-geometric fluxes, etc.) which characterize the possible gaugings, combine into an embedding tensor transforming in the basic representation of e 9 . This yields an infinite-dimensional class of maximally supersymmetric theories in two dimensions. We work out and discuss several examples of higher-dimensional origin which can be systematically analyzed using the different gradings of e 9

  1. Hidden inventory and safety considerations

    International Nuclear Information System (INIS)

    Anderson, A.R.; James, R.H.; Morgan, F.

    1976-01-01

    Preliminary results are described of the evaluation of residual plutonium in a process line used for the production of experimental fast reactor fuel. Initial attention has been focussed on a selection of work boxes used for processing powders and solutions. Amounts of material measured as ''hidden inventory'' are generally less than 0.1 percent of throughput but in one box containing very complex equipment the amount was exceptionally about 0.5 percent. The total surface area of the box and the installed equipment appears to be the most significant factor in determining the amount of plutonium held-up as ''hidden inventory,'' representing an average of about 4 x 10 -4 g cm -2 . Present results are based on gamma spectrometer measurements but neutron techniques are being developed to overcome some of the inherent uncertainties in the gamma method. It is suggested that the routine use of sample plates of known surface area would be valuable in monitoring the deposition of plutonium in work boxes

  2. Hidden costs of nuclear power

    International Nuclear Information System (INIS)

    England, R.W.

    1979-01-01

    Mr. England contends that these hidden costs add up to a figure much higher than those that appear in the electric utilities' profit and loss account - costs that are borne by Federal taxpayers, by nuclear industry workers, and by all those people who must share their environment with nuclear facilities. Costs he details are additional deaths and illnesses resulting from exposure to radiation, and the use of tax dollars to clean up the lethal garbage produced by those activities. He asserts that careless handling of uranium ore and mill tailings in past years has apparently resulted in serious public health problems in those mining communities. In another example, Mr. England states that the failure to isolate uranium tailings physically from their environment has probably contributed to an acute leukemia rate in Mesa County, Colorado. He mentions much of the technology development for power reactors being done by the Federal government, not by private reactor manufacturers - thus, again, hidden costs that do not show up in electric bills of customers. The back end of the nuclear fuel cycle as a place for Federally subsidized research and development is discussed briefly. 1 figure, 2 tables

  3. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.

    2015-01-01

    with the neighborhood of that cycle. We show how the equilibrium point of a relay system disappears in a boundary-equilibrium bifurcation as the system enters the region of autonomous switching dynamics and demonstrate experimentally how a relay system can exhibit large amplitude chaotic oscillations at high values...... of the supply voltage. By investigating a four-dimensional model of the experimental relay system we finally show how a variety of hidden periodic, quasiperiodic and chaotic attractors arise, transform and disappear through different bifurcations. (C) 2015 Elsevier B.V. All rights reserved....

  4. How to Align the Hidden Curriculum of RM Education?

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2015-01-01

    Graduates are reputedly still leaving business school with poor morals, despite considerable focus on responsible management education? The ‘hidden curriculum’ (HC) directs the attention to the idea that what is taught in educational institutions is not necessarily what is actually learned. The HC...... operates through many areas of business schools, most notably in i) formal curriculum; ii) interaction; and iii) school governance. This means recognizing that changing curricula alone is not enough to bring about transformation in students’ moral attitudes because signals about appropriate conduct...

  5. Selectively deuterated liquid crystalline cyanoazobenzene side-chain polyesters. 3. Investigations of laser induced segmental mobility by Fourier transform infrared spectroscopy

    DEFF Research Database (Denmark)

    Kulinna, Christian; Hvilsted, Søren; Hendann, Claudia

    1998-01-01

    The laser-induced anisotropy in thin films of an extensive number of cyanoazobenzene sidechain liquid crystalline polytetradecanedioates, -dodecanedioates, and -adipates selectively deuterated at different positions have been investigated with polarized FTIR spectroscopy. The analysis of the segm......The laser-induced anisotropy in thin films of an extensive number of cyanoazobenzene sidechain liquid crystalline polytetradecanedioates, -dodecanedioates, and -adipates selectively deuterated at different positions have been investigated with polarized FTIR spectroscopy. The analysis...... of the segmental orientation based on dichroic ratios of characteristic absorption bands shows that, in polyesters with long main-chain spacing (tetradecanedioates and dodecanedioates), not only the light sensitive azo chromophore but also the main-chain methylene segment and to a smaller extent the flexible...

  6. Mathematical modeling of pollutant and radionuclide transformation in aquatic ecosystems results of elaboration and verification for the chain of industrial reservoirs on the Techa River

    International Nuclear Information System (INIS)

    Smirnov, A.B.; Mokrov, Y.G.; Glagolenko, Y.V.; Drozhko, E.G.; Khodakovsky, I.L.; Leonov, A.V.

    1995-01-01

    The modern radioecological situation around the oldest radiochemical plant, Mayak, in South Ural (Russia) is indicated by the storage of 300 million to tons of low level radioactive waste in the Techa's reservoir chain (TRC). Future approaches for TRC restoration may be evaluated using corresponding mathematical models. The mathematical modeling complex, KASKAD, was developed at Mayak and is intended for reservoir radioecological state forecasting and alternative remediation approaches evaluation. The paper describes this model

  7. Kac-Moody algebra is not hidden symmetry of chiral models

    International Nuclear Information System (INIS)

    Devchand, C.; Schiff, J.

    1997-01-01

    A detailed examination of the infinite dimensional loop algebra of hidden symmetry transformations of the Principal Chiral Model reveals it to have a structure differing from a standard centreless Kac-Moody algebra. A new infinite dimensional Abelian symmetry algebra is shown to preserve a symplectic form on the space of solutions. (author). 15 refs

  8. Assessing Chemical Transformation of Reactive, Interfacial Thin Films Made of End-Tethered Poly(2-vinyl-4,4-dimethyl azlactone) (PVDMA) Chains

    Energy Technology Data Exchange (ETDEWEB)

    Aden, Bethany [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Chemistry; Kite, Camille M. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Chemistry; Hopkins, Benjamin W. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Chemical and Biomolecular Engineering; Zetterberg, Anna [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Chemical and Biomolecular Engineering; Lokitz, Bradley S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Center for Nanophase Materials Science (CNMS); Ankner, John Francis [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Spallation Neutron Source (SNS); Kilbey, S. Michael [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Chemistry; Univ. of Tennessee, Knoxville, TN (United States). Dept. of Chemical and Biomolecular Engineering

    2017-01-24

    Designing thin films or surface scaffolds with an appropriate display of chemical functionality is useful for biomedical applications, sensing platforms, adhesives, and barrier coatings. Relationships between the structural characteristics of model thin films based on reactive poly(2-vinyl-4,4-dimethylazlactone) (PVDMA) brushes and the amount and distribution of primary amines used to chemically functionalize the layer in situ are quantitatively detailed via neutron reflectometry and compared with results from ellipsometry. After functionalization, the PVDMA brush thickness increases as a result of the primary amines reacting with the azlactone rings. Both techniques show that the extent of functionalization by small-molecule amines depends on the size of the amine, the grafting density of brush chains and their molecular weight. However, constrained analysis of neutron reflectivity data predicated on that technique’s sensitivity to isotopic substitution and its ability to resolve structure at the nanoscale, shows that the extent of functionalization is not accurately represented by the average extent of functionalization determined from ellipsometric thickness: reactive modification is not uniform, even in modestly dense brushes, except when the penetrant is small. Additionally, there appears to be a loss of PVDMA chains during functionalization, attributed to chain scission resulting from additional stretching brought about by functionalization. These findings provide unprecedented insight into the alteration of surface properties by reactive modification and broadly support efforts to produce tailored surfaces in which properties such as friction, colloidal stability, adhesion, wettability, and biocompatibility can be modulated in situ by chemical modification.

  9. Hidden Markov models applied to a subsequence of the Xylella fastidiosa genome

    Directory of Open Access Journals (Sweden)

    Silva Cibele Q. da

    2003-01-01

    Full Text Available Dependencies in DNA sequences are frequently modeled using Markov models. However, Markov chains cannot account for heterogeneity that may be present in different regions of the same DNA sequence. Hidden Markov models are more realistic than Markov models since they allow for the identification of heterogeneous regions of a DNA sequence. In this study we present an application of hidden Markov models to a subsequence of the Xylella fastidiosa DNA data. We found that a three-state model provides a good description for the data considered.

  10. The Hidden Reason Behind Children's Misbehavior.

    Science.gov (United States)

    Nystul, Michael S.

    1986-01-01

    Discusses hidden reason theory based on the assumptions that: (1) the nature of people is positive; (2) a child's most basic psychological need is involvement; and (3) a child has four possible choices in life (good somebody, good nobody, bad somebody, or severely mentally ill.) A three step approach for implementing hidden reason theory is…

  11. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...

  12. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  13. Hidden variables and locality in quantum theory

    International Nuclear Information System (INIS)

    Shiva, Vandana.

    1978-12-01

    The status of hidden variables in quantum theory has been debated since the 1920s. The author examines the no-hidden-variable theories of von Neumann, Kochen, Specker and Bell, and finds that they all share one basic assumption: averaging over the hidden variables should reproduce the quantum mechanical probabilities. Von Neumann also makes a linearity assumption, Kochen and Specker require the preservation of certain functional relations between magnitudes, and Bell proposes a locality condition. It has been assumed that the extrastatistical requirements are needed to serve as criteria of success for the introduction of hidden variables because the statistical condition is trivially satisfied, and that Bell's result is based on a locality condition that is physically motivated. The author shows that the requirement of weak locality, which is not physically motivated, is enough to give Bell's result. The proof of Bell's inequality works equally well for any pair of commuting magnitudes satisfying a condition called the degeneracy principle. None of the no-hidden-variable proofs apply to a class of hidden variable theories that are not phase-space reconstructions of quantum mechanics. The author discusses one of these theories, the Bohm-Bub theory, and finds that hidden variable theories that re all the quantum statistics, for single and sequential measurements, must introduce a randomization process for the hidden variables after each measurement. The philosophical significance of this theory lies in the role it can play in solving the conceptual puzzles posed by quantum theory

  14. Hidden supersymmetry and Fermion number fractionalization

    International Nuclear Information System (INIS)

    Akhoury, R.

    1985-01-01

    This paper discusses how a hidden supersymmetry of the underlying field theories can be used to interpret and to calculate fermion number fractionalization in different dimensions. This is made possible by relating it to a corresponding Witten index of the hidden supersymmetry. The closely related anomalies in odd dimensions are also discussed

  15. Bohlin transformation: the hidden symmetry that connects Hooke to Newton

    International Nuclear Information System (INIS)

    Saggio, Maria Luisa

    2013-01-01

    Hooke's name is familiar to students of mechanics thanks to the law of force that bears his name. Less well-known is the influence his findings had on the founder of mechanics, Isaac Newton. In a lecture given some twenty years ago, W Arnol'd pointed out the outstanding contribution to science made by Hooke, and also noted the controversial issue of the attribution of important discoveries to Newton that were actually inspired by Hooke. It therefore seems ironic that the two most famous force laws, named after Hooke and Newton, are two geometrical aspects of the same law. This relationship, together with other illuminating aspects of Newtonian mechanics, is described in Arnol'd's book and is worth remembering in standard physics courses. In this didactical paper the duality of the two forces is expounded and an account of the more recent contributions to the subject is given. (paper)

  16. Transforming the Hidden Curriculum: Gender and the Library Media Center.

    Science.gov (United States)

    Crew, Hilary S.

    1998-01-01

    Library media specialists are critically positioned to make a significant contribution to instituting gender-fair practices within a school. This article discusses instructional materials, curriculum, and collection development; gender culture and the media center; sports, gender, and different ways of knowing; and science, gender, and different…

  17. Helioscope bounds on hidden sector photons

    International Nuclear Information System (INIS)

    Redondo, J.

    2008-01-01

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to χ -14 , depending on the hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter χ at low masses (m γ' <1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  18. Transforming growth factor (type beta) promotes the addition of chondroitin sulfate chains to the cell surface proteoglycan (syndecan) of mouse mammary epithelia

    OpenAIRE

    1989-01-01

    Cultured monolayers of NMuMG mouse mammary epithelial cells have augmented amounts of cell surface chondroitin sulfate glycosaminoglycan (GAG) when cultured in transforming growth factor-beta (TGF-beta), presumably because of increased synthesis on their cell surface proteoglycan (named syndecan), previously shown to contain chondroitin sulfate and heparan sulfate GAG. This increase occurs throughout the monolayer as shown using soluble thrombospondin as a binding probe. However, comparison o...

  19. Characterization of Oilseed Lipids from “DHA-Producing Camelina sativa”: A New Transformed Land Plant Containing Long-Chain Omega-3 Oils

    Directory of Open Access Journals (Sweden)

    Maged P. Mansour

    2014-02-01

    Full Text Available New and sustainable sources of long-chain (LC, ≥C20 omega-3 oils containing DHA (docosahexaenoic acid, 22:6ω3 are required to meet increasing demands. The lipid content of the oilseed of a novel transgenic, DHA-producing land plant, Camelina sativa, containing microalgal genes able to produce LC omega-3 oils, contained 36% lipid by weight with triacylglycerols (TAG as the major lipid class in hexane extracts (96% of total lipid. Subsequent chloroform-methanol (CM extraction recovered further lipid (~50% polar lipid, comprising glycolipids and phospholipids and residual TAG. The main phospholipid species were phosphatidyl choline and phosphatidyl ethanolamine. The % DHA was: 6.8% (of total fatty acids in the TAG-rich hexane extract and 4.2% in the polar lipid-rich CM extract. The relative level of ALA (α-linolenic acid, 18:3ω3 in DHA-camelina seed was higher than the control. Major sterols in both DHA- and control camelina seeds were: sitosterol, campesterol, cholesterol, brassicasterol and isofucosterol. C16–C22 fatty alcohols, including iso-branched and odd-chain alcohols were present, including high levels of iso-17:0, 17:0 and 19:0. Other alcohols present were: 16:0, iso-18:0, 18:0 and 18:1 and the proportions varied between the hexane and CM extracts. These iso-branched odd-chain fatty alcohols, to our knowledge, have not been previously reported. These components may be derived from wax esters, or free fatty alcohols.

  20. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were...... available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...

  1. Hidden Valley Search at ATLAS

    CERN Document Server

    Verducci, M

    2011-01-01

    A number of extensions of the Standard Model result in neutral and weakly-coupled particles that decay to multi hadrons or multi leptons with macroscopic decay lengths. These particles with decay paths that can be comparable with ATLAS detector dimensions represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS detector. We will present a set of signature driven triggers for the ATLAS detector that target such displaced decays and evaluate their performances for some benchmark models and describe analysis strategies and limits on the production of such long-lived particles. A first estimation of the Hidden Valley trigger rates has been evaluated with 6 pb-1 of data collected at ATLAS during the data taking of 2010.

  2. a Probability Model for Drought Prediction Using Fusion of Markov Chain and SAX Methods

    Science.gov (United States)

    Jouybari-Moghaddam, Y.; Saradjian, M. R.; Forati, A. M.

    2017-09-01

    Drought is one of the most powerful natural disasters which are affected on different aspects of the environment. Most of the time this phenomenon is immense in the arid and semi-arid area. Monitoring and prediction the severity of the drought can be useful in the management of the natural disaster caused by drought. Many indices were used in predicting droughts such as SPI, VCI, and TVX. In this paper, based on three data sets (rainfall, NDVI, and land surface temperature) which are acquired from MODIS satellite imagery, time series of SPI, VCI, and TVX in time limited between winters 2000 to summer 2015 for the east region of Isfahan province were created. Using these indices and fusion of symbolic aggregation approximation and hidden Markov chain drought was predicted for fall 2015. For this purpose, at first, each time series was transformed into the set of quality data based on the state of drought (5 group) by using SAX algorithm then the probability matrix for the future state was created by using Markov hidden chain. The fall drought severity was predicted by fusion the probability matrix and state of drought severity in summer 2015. The prediction based on the likelihood for each state of drought includes severe drought, middle drought, normal drought, severe wet and middle wet. The analysis and experimental result from proposed algorithm show that the product of this algorithm is acceptable and the proposed algorithm is appropriate and efficient for predicting drought using remote sensor data.

  3. New infinite-dimensional hidden symmetries for heterotic string theory

    International Nuclear Information System (INIS)

    Gao Yajun

    2007-01-01

    The symmetry structures of two-dimensional heterotic string theory are studied further. A (2d+n)x(2d+n) matrix complex H-potential is constructed and the field equations are extended into a complex matrix formulation. A pair of Hauser-Ernst-type linear systems are established. Based on these linear systems, explicit formulations of new hidden symmetry transformations for the considered theory are given and then these symmetry transformations are verified to constitute infinite-dimensional Lie algebras: the semidirect product of the Kac-Moody o(d,d+n-circumflex) and Virasoro algebras (without center charges). These results demonstrate that the heterotic string theory under consideration possesses more and richer symmetry structures than previously expected

  4. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  5. A classification of hidden-variable properties

    International Nuclear Information System (INIS)

    Brandenburger, Adam; Yanofsky, Noson

    2008-01-01

    Hidden variables are extra components added to try to banish counterintuitive features of quantum mechanics. We start with a quantum-mechanical model and describe various properties that can be asked of a hidden-variable model. We present six such properties and a Venn diagram of how they are related. With two existence theorems and three no-go theorems (EPR, Bell and Kochen-Specker), we show which properties of empirically equivalent hidden-variable models are possible and which are not. Formally, our treatment relies only on classical probability models, and physical phenomena are used only to motivate which models to choose

  6. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  7. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  8. Hidden costs, value lost: uninsurance in America

    National Research Council Canada - National Science Library

    Committee on the Consequences of Uninsurance

    2003-01-01

    Hidden Cost, Value Lost , the fifth of a series of six books on the consequences of uninsurance in the United States, illustrates some of the economic and social losses to the country of maintaining...

  9. The hidden epidemic: confronting sexually transmitted diseases

    National Research Council Canada - National Science Library

    Eng, Thomas R; Butler, William T

    .... In addition, STDs increase the risk of HIV transmission. The Hidden Epidemic examines the scope of sexually transmitted infections in the United States and provides a critical assessment of the nation's response to this public health crisis...

  10. Perspective: Disclosing hidden sources of funding.

    Science.gov (United States)

    Resnik, David B

    2009-09-01

    In this article, the author discusses ethical and policy issues related to the disclosure of hidden sources of funding in research. The author argues that authors have an ethical obligation to disclose hidden sources of funding and that journals should adopt policies to enforce this obligation. Journal policies should require disclosure of hidden sources of funding that authors know about and that have a direct relation to their research. To stimulate this discussion, the author describes a recent case: investigators who conducted a lung cancer screening study had received funding from a private foundation that was supported by a tobacco company, but they did not disclose this relationship to the journal. Investigators and journal editors must be prepared to deal with these issues in a manner that promotes honesty, transparency, fairness, and accountability in research. The development of well-defined, reasonable policies pertaining to hidden sources of funding can be a step in this direction.

  11. A Rose By Other Names: Some General Musings on Lawrence and Colleagues' Hidden Curriculum Scoping Review.

    Science.gov (United States)

    Hafferty, Frederic W; Martimianakis, Maria Athina

    2017-11-07

    In this Commentary, the authors explore the scoping review by Lawrence and colleagues by challenging their conclusion that with over 25 years' worth of "ambiguous and seemingly ubiquitous use" of the hidden curriculum construct in health professions education scholarship, it is time to either move to a more uniform definitional foundation or abandon the term altogether. The commentary authors counter these remedial propositions by foregrounding the importance of theoretical diversity and the conceptual richness afforded when the hidden curriculum construct is used as an entry point for studying the interstitial space between the formal and a range of other-than-formal domains of learning. Further, they document how tightly-delimited scoping strategies fail to capture the wealth of educational scholarship that operates within a hidden curriculum framework, including "hidden" hidden curriculum articles, studies that employ alternative constructs, and investigations that target important tacit socio-cultural influences on learners and faculty without formally deploying the term. They offer examples of how the hidden curriculum construct, while undergoing significant transformation in its application within the field of health professions education, has created the conceptual foundation for the application of a number of critical perspectives that make visible the field's political investments in particular forms of knowing and associated practices. Finally, the commentary authors invite readers to consider the methodological promise afforded by conceptual heterogeneity, particularly strands of scholarship that resituate the hidden curriculum concept within the magically expansive dance of social relationships, social learning, and social life that form the learning environments of health professions education.

  12. Hidden charm molecules in a finite volume

    International Nuclear Information System (INIS)

    Albaladejo, M.; Hidalgo-Duque, C.; Nieves, J.; Oset, E.

    2014-01-01

    In the present paper we address the interaction of charmed mesons in hidden charm channels in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and several methods for the analysis of these levels ("inverse problem") are investigated. (author)

  13. Workplace ageism: discovering hidden bias.

    Science.gov (United States)

    Malinen, Sanna; Johnston, Lucy

    2013-01-01

    BACKGROUND/STUDY CONTEXT: Research largely shows no performance differences between older and younger employees, or that older workers even outperform younger employees, yet negative attitudes towards older workers can underpin discrimination. Unfortunately, traditional "explicit" techniques for assessing attitudes (i.e., self-report measures) have serious drawbacks. Therefore, using an approach that is novel to organizational contexts, the authors supplemented explicit with implicit (indirect) measures of attitudes towards older workers, and examined the malleability of both. This research consists of two studies. The authors measured self-report (explicit) attitudes towards older and younger workers with a survey, and implicit attitudes with a reaction-time-based measure of implicit associations. In addition, to test whether attitudes were malleable, the authors measured attitudes before and after a mental imagery intervention, where the authors asked participants in the experimental group to imagine respected and valued older workers from their surroundings. Negative, stable implicit attitudes towards older workers emerged in two studies. Conversely, explicit attitudes showed no age bias and were more susceptible to change intervention, such that attitudes became more positive towards older workers following the experimental manipulation. This research demonstrates the unconscious nature of bias against older workers, and highlights the utility of implicit attitude measures in the context of the workplace. In the current era of aging workforce and skill shortages, implicit measures may be necessary to illuminate hidden workplace ageism.

  14. Hidden slow pulsars in binaries

    Science.gov (United States)

    Tavani, Marco; Brookshaw, Leigh

    1993-01-01

    The recent discovery of the binary containing the slow pulsar PSR 1718-19 orbiting around a low-mass companion star adds new light on the characteristics of binary pulsars. The properties of the radio eclipses of PSR 1718-19 are the most striking observational characteristics of this system. The surface of the companion star produces a mass outflow which leaves only a small 'window' in orbital phase for the detection of PSR 1718-19 around 400 MHz. At this observing frequency, PSR 1718-19 is clearly observable only for about 1 hr out of the total 6.2 hr orbital period. The aim of this Letter is twofold: (1) to model the hydrodynamical behavior of the eclipsing material from the companion star of PSR 1718-19 and (2) to argue that a population of binary slow pulsars might have escaped detection in pulsar surveys carried out at 400 MHz. The possible existence of a population of partially or totally hidden slow pulsars in binaries will have a strong impact on current theories of binary evolution of neutron stars.

  15. Robust Dynamics and Control of a Partially Observed Markov Chain

    International Nuclear Information System (INIS)

    Elliott, R. J.; Malcolm, W. P.; Moore, J. P.

    2007-01-01

    In a seminal paper, Martin Clark (Communications Systems and Random Process Theory, Darlington, 1977, pp. 721-734, 1978) showed how the filtered dynamics giving the optimal estimate of a Markov chain observed in Gaussian noise can be expressed using an ordinary differential equation. These results offer substantial benefits in filtering and in control, often simplifying the analysis and an in some settings providing numerical benefits, see, for example Malcolm et al. (J. Appl. Math. Stoch. Anal., 2007, to appear).Clark's method uses a gauge transformation and, in effect, solves the Wonham-Zakai equation using variation of constants. In this article, we consider the optimal control of a partially observed Markov chain. This problem is discussed in Elliott et al. (Hidden Markov Models Estimation and Control, Applications of Mathematics Series, vol. 29, 1995). The innovation in our results is that the robust dynamics of Clark are used to compute forward in time dynamics for a simplified adjoint process. A stochastic minimum principle is established

  16. Falling chains

    OpenAIRE

    Wong, Chun Wa; Yasui, Kosuke

    2005-01-01

    The one-dimensional fall of a folded chain with one end suspended from a rigid support and a chain falling from a resting heap on a table is studied. Because their Lagrangians contain no explicit time dependence, the falling chains are conservative systems. Their equations of motion are shown to contain a term that enforces energy conservation when masses are transferred between subchains. We show that Cayley's 1857 energy nonconserving solution for a chain falling from a resting heap is inco...

  17. Using hidden Markov models to align multiple sequences.

    Science.gov (United States)

    Mount, David W

    2009-07-01

    A hidden Markov model (HMM) is a probabilistic model of a multiple sequence alignment (msa) of proteins. In the model, each column of symbols in the alignment is represented by a frequency distribution of the symbols (called a "state"), and insertions and deletions are represented by other states. One moves through the model along a particular path from state to state in a Markov chain (i.e., random choice of next move), trying to match a given sequence. The next matching symbol is chosen from each state, recording its probability (frequency) and also the probability of going to that state from a previous one (the transition probability). State and transition probabilities are multiplied to obtain a probability of the given sequence. The hidden nature of the HMM is due to the lack of information about the value of a specific state, which is instead represented by a probability distribution over all possible values. This article discusses the advantages and disadvantages of HMMs in msa and presents algorithms for calculating an HMM and the conditions for producing the best HMM.

  18. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, M.

    2008-07-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  19. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, Markus; Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the standard model Higgs via a renormalizable quartic term - sometimes called the Higgs portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs, we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone.

  20. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  1. Auto component supply chain: a path to global India

    OpenAIRE

    Kale, Shailendra; Palacios Fernández, Miguel; Tafur Segura, José Javier; Jarad, Rajendra; Chitale, C.M.

    2011-01-01

    Supply chain management works to bring the supplier, the distributor, and the customer into one cohesive process. The Supply Chain Council defined supply chain as ‘Supply Chain: The flow and transformation of raw materials into products from suppliers through production and distribution facilities to the ultimate consumer., and then Sunil Chopra and Meindl, (2001) have define Supply chain management as ‘Supply Chain Management involves the flows between and among stages in a supply chain to m...

  2. 供应链管理是煤炭经销商转型发展的方向%Supply chain management is direction of transformation development of coal dealer

    Institute of Scientific and Technical Information of China (English)

    周健奇

    2013-01-01

    认为传统的煤炭经销商是以关系人为核心资源,主要从事煤炭的采购和销售业务,利润点是贸易差价;煤炭供应链管理商依托网络资源实现规模经济和范围经济,通过价值流服务创造价值,属现代服务业。煤炭经销商升级为供应链管理商是实现可持续发展的方向。促进煤炭经销商实践供应链管理的政策要点:一是以转变煤炭产业发展方式为出发点,优化煤炭流通业健康发展的政策环境;二是站在提高资源利用效率的角度,支持智能配煤管理;三是从顶层设计的宏观性考虑,填补“虚流”服务空白。%Taking the related people as the core resources,the traditional coal dealers mainly en-gage in coal procurement and sales operations,and the profits are from the price difference in trading;while the coal supply chain management dealers rely on the cyber resources to achieve the scale and scope economies,to create value through the value stream services,which belongs to the modern service in-dustry.The coal dealer upgrading into supply chain management dealer is the direction to achieve sus-tainable development.Key points of policy of promoting the coal dealers practice the supply chain man-agement:Starting with transforming the coal industry development mode,to optimize the policy envi-ronment for healthy development of coal flow industry;From the angle of improving resource utilization efficiency,to support intelligent coal-distribution management;Considering on the macro top-level de-sign,to fill in the gap of"virtual flow"service.

  3. Massive hidden photons as lukewarm dark matter

    International Nuclear Information System (INIS)

    Redondo, Javier; Postma, Marieke

    2008-11-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  4. Massive hidden photons as lukewarm dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Postma, Marieke [Nationaal Inst. voor Kernfysica en Hoge-Energiefysica (NIKHEF), Amsterdam (Netherlands)

    2008-11-15

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  5. Religious Tolerance in the Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Kevin Nobel Kurniawan

    2018-03-01

    Full Text Available Religious intolerance is spreading within the Indonesian institution of education. Previous studies have shown that the growth of intolerance is due to the state’s regulation and pedagogical apparatus. In contrast to the previous studies, I argue that the intolerance is related to hidden curriculum applied by the institution of education.  Normatively, the hidden curriculum contains the value of religious tolerance. However, factually, the author found that there are practices of intolerance, through the formal and informal spheres in the school’s structure, within the hidden curriculum. This article applies a qualitative approach with a mixed method research strategy to analyze data collected from students, teachers, and alumnis through field observation, in-depth interview, and survey.

  6. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    and content alone is not enough to improve students’ sense of social responsibility. Business schools are conceptualized in this article as multilevel learning environments comprising various message sites where students undergo moral learning and socialization processes. Using perspectives from HC research...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...... phase of assessing a school’s PRME needs and in the implementation phase where PRME is integrated into business school learning environments. The concept of meta-messages is introduced to account for how students apprehend the HC at business schools....

  7. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  8. Signatures of a hidden cosmic microwave background.

    Science.gov (United States)

    Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-09-26

    If there is a light Abelian gauge boson gamma' in the hidden sector its kinetic mixing with the photon can produce a hidden cosmic microwave background (HCMB). For meV masses, resonant oscillations gammagamma' happen after big bang nucleosynthesis (BBN) but before CMB decoupling, increasing the effective number of neutrinos Nnu(eff) and the baryon to photon ratio, and distorting the CMB blackbody spectrum. The agreement between BBN and CMB data provides new constraints. However, including Lyman-alpha data, Nnu(eff) > 3 is preferred. It is tempting to attribute this effect to the HCMB. The interesting parameter range will be tested in upcoming laboratory experiments.

  9. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  10. Costs of Quality: Exploratory Analysis of Hidden Elements and Prioritization using Analytic Hierarchy Process

    Directory of Open Access Journals (Sweden)

    Sailaja A

    2015-02-01

    Full Text Available Cost of Quality analysis is emerged as an effective tool for the industrial managers for pinpointing the deficiencies in the system as well as for identifying the improvement areas by highlighting the cost reduction opportunities. However , this analysis will be fully effective only if it is further extended to identify the cost incurred in ensuring quality in all areas of the supply chain including the hidden costs and costs of missed out opportunities. Most of the hidden elements of quality costs are difficult to track and not accounted by the traditional accounting tools. An exploratory analysis is made in this research to identify the hidden elements of quality costs in manufacturing industry. Further, the identified cost elements are classified into various groups for better analysis and, finally, prioritized to identify the vital few among them. Analytic Hierarchy Process (AHP technique which is one of the most popular Multi Criteria Decision Method (MCDM and Pareto analysis were used in this study for prioritizing the hidden quality cost elements based on their degree of impact on overall cost of quality. By this analysis, the key cost elements which are to be addressed to reduce the overall cost of quality are identified.

  11. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2016-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  12. Compressing the hidden variable space of a qubit

    OpenAIRE

    Montina, Alberto

    2010-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of a single realization is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with the quantum states satisfy reasonable criteria ...

  13. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  14. The Hidden Cost of Buying a Computer.

    Science.gov (United States)

    Johnson, Michael

    1983-01-01

    In order to process data in a computer, application software must be either developed or purchased. Costs for modifications of the software package and maintenance are often hidden. The decision to buy or develop software packages should be based upon factors of time and maintenance. (MLF)

  15. Hidden symmetries in five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, M.

    2003-05-01

    This thesis is concerned with the study of hidden symmetries in supergravity, which play an important role in the present picture of supergravity and string theory. Concretely, the appearance of a hidden G 2(+2) /SO(4) symmetry is studied in the dimensional reduction of d=5, N=2 supergravity to three dimensions - a parallel model to the more famous E 8(+8) /SO(16) case in eleven-dimensional supergravity. Extending previous partial results for the bosonic part, I give a derivation that includes fermionic terms. This sheds new light on the appearance of the local hidden symmetry SO(4) in the reduction, and shows up an unusual feature which follows from an analysis of the R-symmetry associated with N=4 supergravity and of the supersymmetry variations, and which has no parallel in the eleven-dimensional case: The emergence of an additional SO(3) as part of the enhanced local symmetry, invisible in the dimensional reduction of the gravitino, and corresponding to the fact that, of the SO(4) used in the coset model, only the diagonal SO(3) is visible immediately upon dimensional reduction. The uncovering of the hidden symmetries proceeds via the construction of the proper coset gravity in three dimensions, and matching it with the Lagrangian obtained from the reduction. (orig.)

  16. Discovering hidden sectors with monophoton Z' searches

    International Nuclear Information System (INIS)

    Gershtein, Yuri; Petriello, Frank; Quackenbush, Seth; Zurek, Kathryn M.

    2008-01-01

    In many theories of physics beyond the standard model, from extra dimensions to Hidden Valleys and models of dark matter, Z ' bosons mediate between standard model particles and hidden sector states. We study the feasibility of observing such hidden states through an invisibly decaying Z ' at the LHC. We focus on the process pp→γZ ' →γXX † , where X is any neutral, (quasi-) stable particle, whether a standard model neutrino or a new state. This complements a previous study using pp→ZZ ' →l + l - XX † . Only the Z ' mass and two effective charges are needed to describe this process. If the Z ' decays invisibly only to standard model neutrinos, then these charges are predicted by observation of the Z ' through the Drell-Yan process, allowing discrimination between Z ' decays to standard model ν's and invisible decays to new states. We carefully discuss all backgrounds and systematic errors that affect this search. We find that hidden sector decays of a 1 TeV Z ' can be observed at 5σ significance with 50 fb -1 at the LHC. Observation of a 1.5 TeV state requires super-LHC statistics of 1 ab -1 . Control of the systematic errors, in particular, the parton distribution function uncertainty of the dominant Zγ background, is crucial to maximize the LHC search reach.

  17. Hidden Markov models for labeled sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1994-01-01

    A hidden Markov model for labeled observations, called a class HMM, is introduced and a maximum likelihood method is developed for estimating the parameters of the model. Instead of training it to model the statistics of the training sequences it is trained to optimize recognition. It resembles MMI...

  18. Probability Sampling Method for a Hidden Population Using Respondent-Driven Sampling: Simulation for Cancer Survivors.

    Science.gov (United States)

    Jung, Minsoo

    2015-01-01

    When there is no sampling frame within a certain group or the group is concerned that making its population public would bring social stigma, we say the population is hidden. It is difficult to approach this kind of population survey-methodologically because the response rate is low and its members are not quite honest with their responses when probability sampling is used. The only alternative known to address the problems caused by previous methods such as snowball sampling is respondent-driven sampling (RDS), which was developed by Heckathorn and his colleagues. RDS is based on a Markov chain, and uses the social network information of the respondent. This characteristic allows for probability sampling when we survey a hidden population. We verified through computer simulation whether RDS can be used on a hidden population of cancer survivors. According to the simulation results of this thesis, the chain-referral sampling of RDS tends to minimize as the sample gets bigger, and it becomes stabilized as the wave progresses. Therefore, it shows that the final sample information can be completely independent from the initial seeds if a certain level of sample size is secured even if the initial seeds were selected through convenient sampling. Thus, RDS can be considered as an alternative which can improve upon both key informant sampling and ethnographic surveys, and it needs to be utilized for various cases domestically as well.

  19. Roadmap on transformation optics

    Science.gov (United States)

    McCall, Martin; Pendry, John B.; Galdi, Vincenzo; Lai, Yun; Horsley, S. A. R.; Li, Jensen; Zhu, Jian; Mitchell-Thomas, Rhiannon C.; Quevedo-Teruel, Oscar; Tassin, Philippe; Ginis, Vincent; Martini, Enrica; Minatti, Gabriele; Maci, Stefano; Ebrahimpouri, Mahsa; Hao, Yang; Kinsler, Paul; Gratus, Jonathan; Lukens, Joseph M.; Weiner, Andrew M.; Leonhardt, Ulf; Smolyaninov, Igor I.; Smolyaninova, Vera N.; Thompson, Robert T.; Wegener, Martin; Kadic, Muamer; Cummer, Steven A.

    2018-06-01

    Transformation optics asks, using Maxwell’s equations, what kind of electromagnetic medium recreates some smooth deformation of space? The guiding principle is Einstein’s principle of covariance: that any physical theory must take the same form in any coordinate system. This requirement fixes very precisely the required electromagnetic medium. The impact of this insight cannot be overestimated. Many practitioners were used to thinking that only a few analytic solutions to Maxwell’s equations existed, such as the monochromatic plane wave in a homogeneous, isotropic medium. At a stroke, transformation optics increases that landscape from ‘few’ to ‘infinity’, and to each of the infinitude of analytic solutions dreamt up by the researcher, there corresponds an electromagnetic medium capable of reproducing that solution precisely. The most striking example is the electromagnetic cloak, thought to be an unreachable dream of science fiction writers, but realised in the laboratory a few months after the papers proposing the possibility were published. But the practical challenges are considerable, requiring meta-media that are at once electrically and magnetically inhomogeneous and anisotropic. How far have we come since the first demonstrations over a decade ago? And what does the future hold? If the wizardry of perfect macroscopic optical invisibility still eludes us in practice, then what compromises still enable us to create interesting, useful, devices? While three-dimensional (3D) cloaking remains a significant technical challenge, much progress has been made in two dimensions. Carpet cloaking, wherein an object is hidden under a surface that appears optically flat, relaxes the constraints of extreme electromagnetic parameters. Surface wave cloaking guides sub-wavelength surface waves, making uneven surfaces appear flat. Two dimensions is also the setting in which conformal and complex coordinate transformations are realisable, and the possibilities in

  20. Force law in material media, hidden momentum and quantum phases

    International Nuclear Information System (INIS)

    Kholmetskii, Alexander L.; Missevitch, Oleg V.; Yarman, T.

    2016-01-01

    We address to the force law in classical electrodynamics of material media, paying attention on the force term due to time variation of hidden momentum of magnetic dipoles. We highlight that the emergence of this force component is required by the general theorem, deriving zero total momentum for any static configuration of charges/currents. At the same time, we disclose the impossibility to add this force term covariantly to the Lorentz force law in material media. We further show that the adoption of the Einstein–Laub force law does not resolve the issue, because for a small electric/magnetic dipole, the density of Einstein–Laub force integrates exactly to the same equation, like the Lorentz force with the inclusion of hidden momentum contribution. Thus, none of the available expressions for the force on a moving dipole is compatible with the relativistic transformation of force, and we support this statement with a number of particular examples. In this respect, we suggest applying the Lagrangian approach to the derivation of the force law in a magnetized/polarized medium. In the framework of this approach we obtain the novel expression for the force on a small electric/magnetic dipole, with the novel expression for its generalized momentum. The latter expression implies two novel quantum effects with non-topological phases, when an electric dipole is moving in an electric field, and when a magnetic dipole is moving in a magnetic field. These phases, in general, are not related to dynamical effects, because they are not equal to zero, when the classical force on a dipole is vanishing. The implications of the obtained results are discussed.

  1. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  2. Laser experiments explore the hidden sector

    International Nuclear Information System (INIS)

    Ahlers, M.

    2007-11-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses -7 times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background. (orig.)

  3. Quantum mechanics and hidden superconformal symmetry

    Science.gov (United States)

    Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.

    2017-12-01

    Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).

  4. Hidden Costs and the Role of Modularity

    DEFF Research Database (Denmark)

    Larsen, Marcus M.

    2013-01-01

    that the inability to effectively estimate the costs of implementing an activity in a foreign location has a negative impact on the process performance of that activity. Performance is deterred as operations are likely to be disrupted by opportunity costs and managerial responses. However, this relationship......This paper addresses estimation errors in strategic decision-making processes due to hidden costs. While previous research has investigated the antecedents of hidden costs, this paper investigates performance consequences. Using unique data on 221 offshoring implementations, it is argued...... is mitigated by the degree of modularity in the activity as it reduces the need for costly coordination in offshoring. This paper contributes to research on offshoring and strategic decision-making by emphasizing the importance of organizational design and of estimating the costs of internal organizational...

  5. Developing sustainable food supply chains.

    Science.gov (United States)

    Smith, B Gail

    2008-02-27

    This paper reviews the opportunities available for food businesses to encourage consumers to eat healthier and more nutritious diets, to invest in more sustainable manufacturing and distribution systems and to develop procurement systems based on more sustainable forms of agriculture. The important factors in developing more sustainable supply chains are identified as the type of supply chain involved and the individual business attitude to extending responsibility for product quality into social and environmental performance within their own supply chains. Interpersonal trust and working to standards are both important to build more sustainable local and many conserved food supply chains, but inadequate to transform mainstream agriculture and raw material supplies to the manufactured and commodity food markets. Cooperation among food manufacturers, retailers, NGOs, governmental and farmers' organizations is vital in order to raise standards for some supply chains and to enable farmers to adopt more sustainable agricultural practices.

  6. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  7. Hidden neuronal correlations in cultured networks

    International Nuclear Information System (INIS)

    Segev, Ronen; Baruchi, Itay; Hulata, Eyal; Ben-Jacob, Eshel

    2004-01-01

    Utilization of a clustering algorithm on neuronal spatiotemporal correlation matrices recorded during a spontaneous activity of in vitro networks revealed the existence of hidden correlations: the sequence of synchronized bursting events (SBEs) is composed of statistically distinguishable subgroups each with its own distinct pattern of interneuron spatiotemporal correlations. These findings hint that each of the SBE subgroups can serve as a template for coding, storage, and retrieval of a specific information

  8. A masking index for quantifying hidden glitches

    OpenAIRE

    Berti-Equille, Laure; Loh, J. M.; Dasu, T.

    2015-01-01

    Data glitches are errors in a dataset. They are complex entities that often span multiple attributes and records. When they co-occur in data, the presence of one type of glitch can hinder the detection of another type of glitch. This phenomenon is called masking. In this paper, we define two important types of masking and propose a novel, statistically rigorous indicator called masking index for quantifying the hidden glitches. We outline four cases of masking: outliers masked by missing valu...

  9. Cold dark matter from the hidden sector

    International Nuclear Information System (INIS)

    Arias, Paola; Pontificia Univ. Catolica de Chile, Santiago

    2012-02-01

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  10. Completing Quantum Mechanics with Quantized Hidden Variables

    OpenAIRE

    van Enk, S. J.

    2015-01-01

    I explore the possibility that a quantum system S may be described completely by the combination of its standard quantum state $|\\psi\\rangle$ and a (hidden) quantum state $|\\phi\\rangle$ (that lives in the same Hilbert space), such that the outcome of any standard projective measurement on the system S is determined once the two quantum states are specified. I construct an algorithm that retrieves the standard quantum-mechanical probabilities, which depend only on $|\\psi\\rangle$, by assuming t...

  11. Cold dark matter from the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Arias, Paola [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Pontificia Univ. Catolica de Chile, Santiago (Chile). Facultad de Fisica

    2012-02-15

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  12. Hidden histories: challenges for pedagogy and participation

    OpenAIRE

    Morrice, Linda

    2013-01-01

    Higher Education has become and an increasingly diverse and globalised system in which the binaries between ‘traditional’ and ‘non-traditional’ students, exclusion and inclusion have less resonance and analytical purchase. Drawing on research with refugees Linda will suggest that higher education can be marked simultaneously by belonging and recognition, deficit and exclusion. Complex differences and inequalities remain hidden and unspoken, raising new questions and challenges for pedagogy an...

  13. CHAIN 2

    International Nuclear Information System (INIS)

    Bailey, D.

    1998-04-01

    The Second Processing Chain (CHAIN2) consists of a suite of ten programs which together provide a full local analysis of the bulk plasma physics within the JET Tokamak. In discussing these ten computational models this report is intended to fulfil two broad purposes. Firstly it is meant to be used as a reference source for any user of CHAIN2 data, and secondly it provides a basic User Manual sufficient to instruct anyone in running the CHAIN2 suite of codes. In the main report text each module is described in terms of its underlying physics and any associated assumptions or limitations, whilst deliberate emphasis is put on highlighting the physics and mathematics of the calculations required in deriving each individual datatype in the standard module PPF output. In fact each datatype of the CHAIN2 PPF output listed in Appendix D is cross referenced to the point in the main text where its evaluation is discussed. An effort is made not only to give the equation used to derive a particular data profile but also to explicitly define which external data sources are involved in the computational calculation

  14. Hidden sector behind the CKM matrix

    Science.gov (United States)

    Okawa, Shohei; Omura, Yuji

    2017-08-01

    The small quark mixing, described by the Cabibbo-Kobayashi-Maskawa (CKM) matrix in the standard model, may be a clue to reveal new physics around the TeV scale. We consider a simple scenario that extra particles in a hidden sector radiatively mediate the flavor violation to the quark sector around the TeV scale and effectively realize the observed CKM matrix. The lightest particle in the hidden sector, whose contribution to the CKM matrix is expected to be dominant, is a good dark matter (DM) candidate. There are many possible setups to describe this scenario, so that we investigate some universal predictions of this kind of model, focusing on the contribution of DM to the quark mixing and flavor physics. In this scenario, there is an explicit relation between the CKM matrix and flavor violating couplings, such as four-quark couplings, because both are radiatively induced by the particles in the hidden sector. Then, we can explicitly find the DM mass region and the size of Yukawa couplings between the DM and quarks, based on the study of flavor physics and DM physics. In conclusion, we show that DM mass in our scenario is around the TeV scale, and the Yukawa couplings are between O (0.01 ) and O (1 ). The spin-independent DM scattering cross section is estimated as O (10-9) [pb]. An extra colored particle is also predicted at the O (10 ) TeV scale.

  15. A Stochastic Flows Approach for Asset Allocation with Hidden Economic Environment

    Directory of Open Access Journals (Sweden)

    Tak Kuen Siu

    2015-01-01

    Full Text Available An optimal asset allocation problem for a quite general class of utility functions is discussed in a simple two-state Markovian regime-switching model, where the appreciation rate of a risky share changes over time according to the state of a hidden economy. As usual, standard filtering theory is used to transform a financial model with hidden information into one with complete information, where a martingale approach is applied to discuss the optimal asset allocation problem. Using a martingale representation coupled with stochastic flows of diffeomorphisms for the filtering equation, the integrand in the martingale representation is identified which gives rise to an optimal portfolio strategy under some differentiability conditions.

  16. The IASI detection chain

    Science.gov (United States)

    Nicol, Patrick; Fleury, Joel; Le Naour, Claire; Bernard, Frédéric

    2017-11-01

    IASI (Infrared Atmospheric Sounding Interferometer) is an infrared atmospheric sounder. It will provide meteorologist and scientific community with atmospheric spectra. The instrument is composed of a Fourier transform spectrometer and an associated infrared imager. The presentation will describe the spectrometer detection chain architecture, composed by three different detectors cooled in a passive cryo-cooler (so called CBS : Cold Box Subsystem) and associated analog electronics up to digital conversion. It will mainly focus on design choices with regards to environment constraints, implemented technologies, and associated performances. CNES is leading the IASI program in collaboration with EUMETSAT. The instrument Prime is ALCATEL SPACE responsible, notably, of the detection chain architecture. SAGEM SA provides the detector package (so called CAU : Cold Acquisition Unit).

  17. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  18. Microwave background constraints on mixing of photons with hidden photons

    International Nuclear Information System (INIS)

    Mirizzi, Alessandro; Redondo, Javier; Sigl, Guenter

    2008-12-01

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle χ 0 -7 - 10 -5 for hidden photon masses between 10 -14 eV and 10 -7 eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  19. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  20. Heavy Chain Diseases

    Science.gov (United States)

    ... of heavy chain produced: Alpha Gamma Mu Alpha Heavy Chain Disease Alpha heavy chain disease (IgA heavy ... the disease or lead to a remission. Gamma Heavy Chain Disease Gamma heavy chain disease (IgG heavy ...

  1. Decoding and modelling of time series count data using Poisson hidden Markov model and Markov ordinal logistic regression models.

    Science.gov (United States)

    Sebastian, Tunny; Jeyaseelan, Visalakshi; Jeyaseelan, Lakshmanan; Anandan, Shalini; George, Sebastian; Bangdiwala, Shrikant I

    2018-01-01

    Hidden Markov models are stochastic models in which the observations are assumed to follow a mixture distribution, but the parameters of the components are governed by a Markov chain which is unobservable. The issues related to the estimation of Poisson-hidden Markov models in which the observations are coming from mixture of Poisson distributions and the parameters of the component Poisson distributions are governed by an m-state Markov chain with an unknown transition probability matrix are explained here. These methods were applied to the data on Vibrio cholerae counts reported every month for 11-year span at Christian Medical College, Vellore, India. Using Viterbi algorithm, the best estimate of the state sequence was obtained and hence the transition probability matrix. The mean passage time between the states were estimated. The 95% confidence interval for the mean passage time was estimated via Monte Carlo simulation. The three hidden states of the estimated Markov chain are labelled as 'Low', 'Moderate' and 'High' with the mean counts of 1.4, 6.6 and 20.2 and the estimated average duration of stay of 3, 3 and 4 months, respectively. Environmental risk factors were studied using Markov ordinal logistic regression analysis. No significant association was found between disease severity levels and climate components.

  2. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  3. Symmetry chains and adaptation coefficients

    International Nuclear Information System (INIS)

    Fritzer, H.P.; Gruber, B.

    1985-01-01

    Given a symmetry chain of physical significance it becomes necessary to obtain states which transform properly with respect to the symmetries of the chain. In this article we describe a method which permits us to calculate symmetry-adapted quantum states with relative ease. The coefficients for the symmetry-adapted linear combinations are obtained, in numerical form, in terms of the original states of the system and can thus be represented in the form of numerical tables. In addition, one also obtains automatically the matrix elements for the operators of the symmetry groups which are involved, and thus for any physical operator which can be expressed either as an element of the algebra or of the enveloping algebra. The method is well suited for computers once the physically relevant symmetry chain, or chains, have been defined. While the method to be described is generally applicable to any physical system for which semisimple Lie algebras play a role we choose here a familiar example in order to illustrate the method and to illuminate its simplicity. We choose the nuclear shell model for the case of two nucleons with orbital angular momentum l = 1. While the states of the entire shell transform like the smallest spin representation of SO(25) we restrict our attention to its subgroup SU(6) x SU(2)/sub T/. We determine the symmetry chains which lead to total angular momentum SU(2)/sub J/ and obtain the symmetry-adapted states for these chains

  4. A hidden markov model derived structural alphabet for proteins.

    Science.gov (United States)

    Camproux, A C; Gautier, R; Tufféry, P

    2004-06-04

    Understanding and predicting protein structures depends on the complexity and the accuracy of the models used to represent them. We have set up a hidden Markov model that discretizes protein backbone conformation as series of overlapping fragments (states) of four residues length. This approach learns simultaneously the geometry of the states and their connections. We obtain, using a statistical criterion, an optimal systematic decomposition of the conformational variability of the protein peptidic chain in 27 states with strong connection logic. This result is stable over different protein sets. Our model fits well the previous knowledge related to protein architecture organisation and seems able to grab some subtle details of protein organisation, such as helix sub-level organisation schemes. Taking into account the dependence between the states results in a description of local protein structure of low complexity. On an average, the model makes use of only 8.3 states among 27 to describe each position of a protein structure. Although we use short fragments, the learning process on entire protein conformations captures the logic of the assembly on a larger scale. Using such a model, the structure of proteins can be reconstructed with an average accuracy close to 1.1A root-mean-square deviation and for a complexity of only 3. Finally, we also observe that sequence specificity increases with the number of states of the structural alphabet. Such models can constitute a very relevant approach to the analysis of protein architecture in particular for protein structure prediction.

  5. Enhanced Map-Matching Algorithm with a Hidden Markov Model for Mobile Phone Positioning

    Directory of Open Access Journals (Sweden)

    An Luo

    2017-10-01

    Full Text Available Numerous map-matching techniques have been developed to improve positioning, using Global Positioning System (GPS data and other sensors. However, most existing map-matching algorithms process GPS data with high sampling rates, to achieve a higher correct rate and strong universality. This paper introduces a novel map-matching algorithm based on a hidden Markov model (HMM for GPS positioning and mobile phone positioning with a low sampling rate. The HMM is a statistical model well known for providing solutions to temporal recognition applications such as text and speech recognition. In this work, the hidden Markov chain model was built to establish a map-matching process, using the geometric data, the topologies matrix of road links in road network and refined quad-tree data structure. HMM-based map-matching exploits the Viterbi algorithm to find the optimized road link sequence. The sequence consists of hidden states in the HMM model. The HMM-based map-matching algorithm is validated on a vehicle trajectory using GPS and mobile phone data. The results show a significant improvement in mobile phone positioning and high and low sampling of GPS data.

  6. The hidden carbon liability of Indonesian palm oil

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-05-15

    This report highlights the urgent need for global palm oil consumers and investors to support Unilever's call for an immediate moratorium on deforestation and peatland clearance in Indonesia. This report focuses on Unilever, which shares major institutional investors with other leading corporations including Nestle, Procter and Gamble and Kraft. Not only do these corporations share investors, they also share growing carbon liability within their raw material supply chains through the expansion in the palm oil sector in Indonesia. Unilever has recognised the global problems associated with palm oil expansion and the need for drastic reform to this sector. Unilever has taken a bold move in calling for an immediate moratorium on deforestation and peatland clearance. While Unilever's position is strengthened by its status as the largest palm oil consumer in the world, this report shows how, unless companies like Nestle, Procter and Gamble and Kraft support its call for a halt to deforestation, the palm oil industry will continue to present a massive carbon liability over the coming years. This report uses Unilever's palm oil supply chains as a case study to help quantify the carbon liability and collateral risks associated with the Indonesian palm oil sector. It shows how, by buying palm oil from suppliers who account for more than one-third of Indonesia's palm oil production, Unilever and its competitors are increasing their potential carbon liability and thus leaving investors exposed to potentially significant levels of hidden risk, compromising long-term financial and brand stability.

  7. Compressing the hidden variable space of a qubit

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of single realizations is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with quantum states satisfy reasonable criteria of regularity. Possible generalizations of this shrinking to an N-dimensional Hilbert space are discussed.

  8. Hidden acoustic information revealed by intentional nonlinearity

    Science.gov (United States)

    Dowling, David R.

    2017-11-01

    Acoustic waves are omnipresent in modern life and are well described by the linearized equations of fluid dynamics. Once generated, acoustic waves carry and collect information about their source and the environment through which they propagate, respectively, and this information may be retrieved by analyzing recordings of these waves. Because of this, acoustics is the primary means for observation, surveillance, reconnaissance, and remote sensing in otherwise opaque environments, such as the Earth's oceans and crust, and the interior of the human body. For such information-retrieval tasks, acoustic fields are nearly always interrogated within their recorded frequency range or bandwidth. However, this frequency-range restriction is not general; acoustic fields may also carry (hidden) information at frequencies outside their bandwidth. Although such a claim may seem counter intuitive, hidden acoustic-field information can be revealed by re-introducing a marquee trait of fluid dynamics: nonlinearity. In particular, an intentional quadratic nonlinearity - a form of intra-signal heterodyning - can be used to obtain acoustic field information at frequencies outside a recorded acoustic field's bandwidth. This quadratic nonlinearity enables a variety of acoustic remote sensing applications that were long thought to be impossible. In particular, it allows the detrimental effects of sparse recordings and random scattering to be suppressed when the original acoustic field has sufficient bandwidth. In this presentation, the topic is developed heuristically, with a just brief exposition of the relevant mathematics. Hidden acoustic field information is then revealed from simulated and measured acoustic fields in simple and complicated acoustic environments involving frequencies from a few Hertz to more than 100 kHz, and propagation distances from tens of centimeters to hundreds of kilometers. Sponsored by ONR, NAVSEA, and NSF.

  9. Recovering a hidden polarization by ghost polarimetry.

    Science.gov (United States)

    Janassek, Patrick; Blumenstein, Sébastien; Elsäßer, Wolfgang

    2018-02-15

    By exploiting polarization correlations of light from a broadband fiber-based amplified spontaneous emission source we succeed in reconstructing a hidden polarization in a ghost polarimetry experiment in close analogy to ghost imaging and ghost spectroscopy. Thereby, an original linear polarization state in the object arm of a Mach-Zehnder interferometer configuration which has been camouflaged by a subsequent depolarizer is recovered by correlating it with light from a reference beam. The variation of a linear polarizer placed inside the reference beam results in a Malus law type second-order intensity correlation with high contrast, thus measuring a ghost polarigram.

  10. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  11. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  12. The hidden face of the petroleum

    International Nuclear Information System (INIS)

    Laurent, E.

    2006-02-01

    For the first time, a book reveals what that was hidden to the public opinions: why the petroleum crisis of 1973 what only a manipulation, an arrangement between the OPEC and the petroleum companies, why the data concerning the petroleum reserves are wrong and increased by the producers countries, how Washington used the Saudi petroleum weapon to create the Soviet Union fall, and why from march 2001 maps of the Iraq (where were drawn the future petroleum explorations) were working documents for the vice President Cheney and petroleum managers for the ''secret society''. (A.L.B.)

  13. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  14. The hidden costs of nuclear power

    International Nuclear Information System (INIS)

    Keough, C.

    1981-01-01

    The two basic hidden costs of nuclear power are public money and public health. Nuclear power appears to be economical because many of the costs of producins electricity in these plants are paid by the federal government. So, like it or not, the citizens are footing the bill with their taxes. Design and development of plants have been paid for with public money, and disposal and cleanup costs will also be paid in this manner. The economic and health costs associated with nuclear accidents are staggering

  15. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  16. DOD's HIGH-RISK ARES: Efforts to Improve Supply Chain Can Be Enhanced by Linkage to Outcomes, Progress in Transforming Business Operations, and Reexamination of Logistics Governance and Strategy

    National Research Council Canada - National Science Library

    Solis, William M

    2007-01-01

    The most recent update to the plan shows that DOD has made progress developing and implementing its supply chain management improvement initiatives, but the current performance measures in the plan...

  17. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index

    Science.gov (United States)

    Stevens, Gretchen A.; Ezzati, Majid; Black, Robert E.; Kraemer, Klaus

    2015-01-01

    Background Deficiencies in essential vitamins and minerals–also termed hidden hunger–are pervasive and hold negative consequences for the cognitive and physical development of children. Methods This analysis evaluates the change in hidden hunger over time in the form of one composite indicator–the Hidden Hunger Index (HHI)–using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency). Net changes from 1995–2011 and population weighted regional means for various time periods are measured. Findings Globally, hidden hunger improved (-6.7 net change in HHI) from 1995–2011. Africa was the only region to see a deterioration in hidden hunger (+1.9) over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0), while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased. Interpretation This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs). However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda. Funding Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish. PMID:26673631

  18. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index.

    Directory of Open Access Journals (Sweden)

    Julie C Ruel-Bergeron

    Full Text Available Deficiencies in essential vitamins and minerals-also termed hidden hunger-are pervasive and hold negative consequences for the cognitive and physical development of children.This analysis evaluates the change in hidden hunger over time in the form of one composite indicator-the Hidden Hunger Index (HHI-using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency. Net changes from 1995-2011 and population weighted regional means for various time periods are measured.Globally, hidden hunger improved (-6.7 net change in HHI from 1995-2011. Africa was the only region to see a deterioration in hidden hunger (+1.9 over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0, while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased.This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs. However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda.Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish.

  19. Hidden in plain sight: the formal, informal, and hidden curricula of a psychiatry clerkship.

    Science.gov (United States)

    Wear, Delese; Skillicorn, Jodie

    2009-04-01

    To examine perceptions of the formal, informal, and hidden curricula in psychiatry as they are observed and experienced by (1) attending physicians who have teaching responsibilities for residents and medical students, (2) residents who are taught by those same physicians and who have teaching responsibilities for medical students, and (3) medical students who are taught by attendings and residents during their psychiatry rotation. From June to November 2007, the authors conducted focus groups with attendings, residents, and students in one midwestern academic setting. The sessions were audiotaped, transcribed, and analyzed for themes surrounding the formal, informal, and hidden curricula. All three groups offered a similar belief that the knowledge, skills, and values of the formal curriculum focused on building relationships. Similarly, all three suggested that elements of the informal and hidden curricula were expressed primarily as the values arising from attendings' role modeling, as the nature and amount of time attendings spend with patients, and as attendings' advice arising from experience and intuition versus "textbook learning." Whereas students and residents offered negative values arising from the informal and hidden curricula, attendings did not, offering instead the more positive values they intended to encourage through the informal and hidden curricula. The process described here has great potential in local settings across all disciplines. Asking teachers and learners in any setting to think about how they experience the educational environment and what sense they make of all curricular efforts can provide a reality check for educators and a values check for learners as they critically reflect on the meanings of what they are learning.

  20. Representation of Hidden Curriculum in EFL Textbook (Gender Markers

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2014-01-01

    Full Text Available The article considers the mechanism ofrepresenting the hidden curriculum in the discourse of EFL textbooks, i.e. the transmission ofsociocultural norms and values of native speakers to foreign students. To do this the authors make a brieftheoretical review of this problem and demonstrate the results of the comparative discourse analysis of two popular textbooks, the one of the pre-globalization age and the present-day one. The authors provide evidence for their idea of the dual role, which English plays today being simultaneously a national language of different English-speaking societies and the global lingua franca. The conducted discourse analysis is based on the analysis of semiotic means, which are used to nominate concepts basic to any society and culture. In the article, the authors demonstrate their own plan of analysis by the example of the "gender" concept. The gender concept shows social and cultural conditionality of distinctions in behavior and the identity of men and women. The comparative analysis of gender markers in the discourse of EFL textbooks reveals a global vector of transformation and distribution ofsociocultural values. Authors state that cultural expansion through English teaching is an instrument of smart power. It is suggested using the mechanism of transmission ofsociocultural norms and values, which is analyzed in the research, to create Russian textbooks for foreign students.

  1. Service Value Chains and Effects of Scale

    NARCIS (Netherlands)

    Nooteboom, B.

    2007-01-01

    This paper generalizes Porter’s notion of the value chain for the analysis of service industries. The generalization entails that the flow and the physical transformation and assembly of goods that are characteristic of manufacturing are generalized into flows and transformation of data and flows

  2. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  3. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier, E-mail: redondo@mpp.mpg.de [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza, España (Spain)

    2015-07-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  4. Bayesian structural inference for hidden processes

    Science.gov (United States)

    Strelioff, Christopher C.; Crutchfield, James P.

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ɛ-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ɛ-machines, irrespective of estimated transition probabilities. Properties of ɛ-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  5. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  6. Hidden ion population of the magnetosphere

    International Nuclear Information System (INIS)

    Olsen, R.C.

    1982-01-01

    Particle data from two geosynchronous satellites (Applied Technology Satellite 6 and SCATHA) show a normally hidden ion population appearing when the satellites are in the earth's shadow. Ion and electron data show the spacecraft potential dropping from +10 V in sunlight to +4 and +5 V in eclipse at local midnight, in low-energy (T/sub e/ -2 ), isotropic ion population appears which was invisible in sunlight because of the larger positive spacecraft potential. Higher-energy populations generally cover the tails of the hidden ion populations, so they cannot be inferred from daylight data. The isotropic populations appears only in a few percent of the spacecraft eclipse events, appearing only at times of low Kp (2 or less, preceded by a day with Σ Kp< or =20). A low-energy (T = 1--2 eV) field-aligned population often appears with and without the isotropic population, at slightly higher flux levels. These fluxes are visible in sunlight, but again the distribution functions obtained in eclipse differ from those that would be inferred from daylight data. Measurement of the thermal plasma population on a consistent basis, particularly in the plasma sheet, will require some method of controlling the detector potential with respect to the ambient plamsa

  7. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  8. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  9. Pentaquarks with hidden charm as hadroquarkonia

    Energy Technology Data Exchange (ETDEWEB)

    Eides, Michael I. [University of Kentucky, Department of Physics and Astronomy, Lexington, KY (United States); Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Petrov, Victor Yu. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Polyakov, Maxim V. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Ruhr-Universitaet Bochum, Institut fuer Theoretische Physik II, Bochum (Germany)

    2018-01-15

    We consider hidden charm pentaquarks as hadroquarkonium states in a QCD inspired approach. Pentaquarks arise naturally as bound states of quarkonia excitations and ordinary baryons. The LHCb P{sub c}(4450) pentaquark is interpreted as a ψ{sup '}-nucleon bound state with spin-parity J{sup P} = 3/2{sup -}. The partial decay width Γ(P{sub c}(4450) → J/ψ + N) ∼ 11 MeV is calculated and turned out to be in agreement with the experimental data for P{sub c}(4450). The P{sub c}(4450) pentaquark is predicted to be a member of one of the two almost degenerate hidden-charm baryon octets with spin-parities J{sup P} = 1/2{sup -}, 3/2{sup -}. The masses and decay widths of the octet pentaquarks are calculated. The widths are small and comparable with the width of the P{sub c}(4450) pentaquark, and the masses of the octet pentaquarks satisfy the Gell-Mann-Okubo relation. Interpretation of pentaquarks as loosely bound Σ{sub c} anti D* and Σ{sub c}{sup *} anti D* deuteronlike states is also considered. We determine quantum numbers of these bound states and calculate their masses in the one-pion exchange scenario. The hadroquarkonium and molecular approaches to exotic hadrons are compared and the relative advantages and drawbacks of each approach are discussed. (orig.)

  10. Low energy theorems of hidden local symmetries

    International Nuclear Information System (INIS)

    Harada, Masayasu; Kugo, Taichiro; Yamawaki, Koichi.

    1994-01-01

    We prove to all orders of the loop expansion the low energy theorems of hidden local symmetries in four-dimensional nonlinear sigma models based on the coset space G/H, with G and H being arbitrary compact groups. Although the models are non-renormalizable, the proof is done in an analogous manner to the renormalization proof of gauge theories and two-dimensional nonlinear sigma models by restricting ourselves to the operators with two derivatives (counting a hidden gauge boson field as one derivative), i.e., with dimension 2, which are the only operators relevant to the low energy limit. Through loop-wise mathematical induction based on the Ward-Takahashi identity for the BRS symmetry, we solve renormalization equation for the effective action up to dimension-2 terms plus terms with the relevant BRS sources. We then show that all the quantum corrections to the dimension-2 operators, including the finite parts as well as the divergent ones, can be entirely absorbed into a re-definition (renormalization) of the parameters and the fields in the dimension-2 part of the tree-level Lagrangian. (author)

  11. Black holes, hidden symmetries, and complete integrability.

    Science.gov (United States)

    Frolov, Valeri P; Krtouš, Pavel; Kubizňák, David

    2017-01-01

    The study of higher-dimensional black holes is a subject which has recently attracted vast interest. Perhaps one of the most surprising discoveries is a realization that the properties of higher-dimensional black holes with the spherical horizon topology and described by the Kerr-NUT-(A)dS metrics are very similar to the properties of the well known four-dimensional Kerr metric. This remarkable result stems from the existence of a single object called the principal tensor. In our review we discuss explicit and hidden symmetries of higher-dimensional Kerr-NUT-(A)dS black hole spacetimes. We start with discussion of the Killing and Killing-Yano objects representing explicit and hidden symmetries. We demonstrate that the principal tensor can be used as a "seed object" which generates all these symmetries. It determines the form of the geometry, as well as guarantees its remarkable properties, such as special algebraic type of the spacetime, complete integrability of geodesic motion, and separability of the Hamilton-Jacobi, Klein-Gordon, and Dirac equations. The review also contains a discussion of different applications of the developed formalism and its possible generalizations.

  12. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  13. Asymptotics for Estimating Equations in Hidden Markov Models

    DEFF Research Database (Denmark)

    Hansen, Jørgen Vinsløv; Jensen, Jens Ledet

    Results on asymptotic normality for the maximum likelihood estimate in hidden Markov models are extended in two directions. The stationarity assumption is relaxed, which allows for a covariate process influencing the hidden Markov process. Furthermore a class of estimating equations is considered...

  14. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  15. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  16. Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.

    Science.gov (United States)

    Krokoff, Lowell J.

    1990-01-01

    Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)

  17. Hidden symmetries in minimal five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, Markus; Silva, Sebastian

    2004-01-01

    We study the hidden symmetries arising in the dimensional reduction of d=5, N=2 supergravity to three dimensions. Extending previous partial results for the bosonic part, we give a derivation that includes fermionic terms, shedding light on the appearance of the local hidden symmetry SO(4) in the reduction

  18. Abelian hidden sectors at a GeV

    International Nuclear Information System (INIS)

    Morrissey, David E.; Poland, David; Zurek, Kathryn M.

    2009-01-01

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1) x gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  19. Transformative Learning

    Science.gov (United States)

    Wang, Victor C. X.; Cranton, Patricia

    2011-01-01

    The theory of transformative learning has been explored by different theorists and scholars. However, few scholars have made an attempt to make a comparison between transformative learning and Confucianism or between transformative learning and andragogy. The authors of this article address these comparisons to develop new and different insights…

  20. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  1. … To be hidden does not mean to be merely revealed – Part 1 Artistic research on hidden curriculum

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-09-01

    Full Text Available This text revisits the long-term project Hidden Curriculum, initiated by Annette Krauss. The project addresses unquestioned routines, hierarchies of knowledge (part 1, and the role of the body in learning processes (part 2 from the perspective of secondary/high school education (in the research on a hidden curriculum. A deeper analysis of educational studies on the phenomenon of ‘hidden curriculum’ in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire, and Jacques Rancière brings forward important insights generated through the artistic research within hidden curriculum. The aim of this text is to address academic canons, corporeality, and investigate everyday norms through revisiting the framework, results, and processes of the collaborative research into hidden curriculum with secondary high school students.

  2. Dynamic portfolio optimization across hidden market regimes

    DEFF Research Database (Denmark)

    Nystrup, Peter; Madsen, Henrik; Lindström, Erik

    2017-01-01

    Regime-based asset allocation has been shown to add value over rebalancing to static weights and, in particular, reduce potential drawdowns by reacting to changes in market conditions. The predominant approach in previous studies has been to specify in advance a static decision rule for changing...... the allocation based on the state of financial markets or the economy. In this article, model predictive control (MPC) is used to dynamically optimize a portfolio based on forecasts of the mean and variance of financial returns from a hidden Markov model with time-varying parameters. There are computational...... than a buy-and-hold investment in various major stock market indices. This is after accounting for transaction costs, with a one-day delay in the implementation of allocation changes, and with zero-interest cash as the only alternative to the stock indices. Imposing a trading penalty that reduces...

  3. Supersymmetric leptogenesis with a light hidden sector

    International Nuclear Information System (INIS)

    De Simone, Andrea

    2010-04-01

    Supersymmetric scenarios incorporating thermal leptogenesis as the origin of the observed matter-antimatter asymmetry generically predict abundances of the primordial elements which are in conflict with observations. In this paper we pro- pose a simple way to circumvent this tension and accommodate naturally ther- mal leptogenesis and primordial nucleosynthesis. We postulate the existence of a light hidden sector, coupled very weakly to the Minimal Supersymmetric Standard Model, which opens up new decay channels for the next-to-lightest supersymmetric particle, thus diluting its abundance during nucleosynthesis. We present a general model-independent analysis of this mechanism as well as two concrete realizations, and describe the relevant cosmological and astrophysical bounds and implications for this dark matter scenario. Possible experimental signatures at colliders and in cosmic-ray observations are also discussed. (orig.)

  4. Nuclear scissors modes and hidden angular momenta

    Energy Technology Data Exchange (ETDEWEB)

    Balbutsev, E. B., E-mail: balbuts@theor.jinr.ru; Molodtsova, I. V. [Joint Institute for Nuclear Research (Russian Federation); Schuck, P. [Université Paris-Sud, Institut de Physique Nucléaire, IN2P3–CNRS (France)

    2017-01-15

    The coupled dynamics of low-lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time-Dependent Hartree–Fock–Bogoliubov equations. The model of the harmonic oscillator including spin–orbit potential plus quadrupole–quadrupole and spin–spin interactions is considered. New low-lying spin-dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  5. Neuroevolution Mechanism for Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-12-01

    Full Text Available Hidden Markov Model (HMM is a statistical model based on probabilities. HMM is becoming one of the major models involved in many applications such as natural language
    processing, handwritten recognition, image processing, prediction systems and many more. In this research we are concerned with finding out the best HMM for a certain application domain. We propose a neuroevolution process that is based first on converting the HMM to a neural network, then generating many neural networks at random where each represents a HMM. We proceed by
    applying genetic operators to obtain new set of neural networks where each represents HMMs, and updating the population. Finally select the best neural network based on a fitness function.

  6. Improved hidden Markov model for nosocomial infections.

    Science.gov (United States)

    Khader, Karim; Leecaster, Molly; Greene, Tom; Samore, Matthew; Thomas, Alun

    2014-12-01

    We propose a novel hidden Markov model (HMM) for parameter estimation in hospital transmission models, and show that commonly made simplifying assumptions can lead to severe model misspecification and poor parameter estimates. A standard HMM that embodies two commonly made simplifying assumptions, namely a fixed patient count and binomially distributed detections is compared with a new alternative HMM that does not require these simplifying assumptions. Using simulated data, we demonstrate how each of the simplifying assumptions used by the standard model leads to model misspecification, whereas the alternative model results in accurate parameter estimates. © The Authors 2013. Published by Oxford University Press on behalf of the Institute of Mathematics and its Applications. All rights reserved.

  7. The elliptic genus and Hidden symmetry

    International Nuclear Information System (INIS)

    Jaffe, A.

    2001-01-01

    We study the elliptic genus (a partition function) in certain interacting, twist quantum field theories. Without twists, these theories have N=2 supersymmetry. The twists provide a regularization, and also partially break the supersymmetry. In spite of the regularization, one can establish a homotopy of the elliptic genus in a coupling parameter. Our construction relies on a priori estimates and other methods from constructive quantum field theory; this mathematical underpinning allows us to justify evaluating the elliptic genus at one endpoint of the homotopy. We obtain a version of Witten's proposed formula for the elliptic genus in terms of classical theta functions. As a consequence, the elliptic genus has a hidden SL(2,Z) symmetry characteristic of conformal theory, even though the underlying theory is not conformal. (orig.)

  8. Hidden conformal symmetry of extremal black holes

    International Nuclear Information System (INIS)

    Chen Bin; Long Jiang; Zhang Jiaju

    2010-01-01

    We study the hidden conformal symmetry of extremal black holes. We introduce a new set of conformal coordinates to write the SL(2,R) generators. We find that the Laplacian of the scalar field in many extremal black holes, including Kerr(-Newman), Reissner-Nordstrom, warped AdS 3 , and null warped black holes, could be written in terms of the SL(2,R) quadratic Casimir. This suggests that there exist dual conformal field theory (CFT) descriptions of these black holes. From the conformal coordinates, the temperatures of the dual CFTs could be read directly. For the extremal black hole, the Hawking temperature is vanishing. Correspondingly, only the left (right) temperature of the dual CFT is nonvanishing, and the excitations of the other sector are suppressed. In the probe limit, we compute the scattering amplitudes of the scalar off the extremal black holes and find perfect agreement with the CFT prediction.

  9. Exact solution of the hidden Markov processes

    Science.gov (United States)

    Saakian, David B.

    2017-11-01

    We write a master equation for the distributions related to hidden Markov processes (HMPs) and solve it using a functional equation. Thus the solution of HMPs is mapped exactly to the solution of the functional equation. For a general case the latter can be solved only numerically. We derive an exact expression for the entropy of HMPs. Our expression for the entropy is an alternative to the ones given before by the solution of integral equations. The exact solution is possible because actually the model can be considered as a generalized random walk on a one-dimensional strip. While we give the solution for the two second-order matrices, our solution can be easily generalized for the L values of the Markov process and M values of observables: We should be able to solve a system of L functional equations in the space of dimension M -1 .

  10. Backlund transformations as canonical transformations

    International Nuclear Information System (INIS)

    Villani, A.; Zimerman, A.H.

    1977-01-01

    Toda and Wadati as well as Kodama and Wadati have shown that the Backlund transformations, for the exponential lattice equation, sine-Gordon equation, K-dV (Korteweg de Vries) equation and modifies K-dV equation, are canonical transformation. It is shown that the Backlund transformation for the Boussinesq equation, for a generalized K-dV equation, for a model equation for shallow water waves and for the nonlinear Schroedinger equation are also canonical transformations [pt

  11. Simulating the Afghanistan-Pakistan opium supply chain

    Energy Technology Data Exchange (ETDEWEB)

    Watkins, Jennifer H [Los Alamos National Laboratory; MacKerrow, Edward P [Los Alamos National Laboratory; Merritt, Terence M [Los Alamos National Laboratory

    2010-04-08

    This paper outlines an opium supply chain using the Hilmand province of Afghanistan as exemplar. The opium supply chain model follows the transformation of opium poppy seed through cultivation and chemical alteration to brown heroin base. The purpose of modeling and simulating the Afghanistan-Pakistan opium supply chain is to discover and test strategies that will disrupt this criminal enterprise.

  12. Social exclusion, health and hidden homelessness.

    Science.gov (United States)

    Watson, J; Crawley, J; Kane, D

    2016-10-01

    Homelessness and poverty are extreme forms of social exclusion which extend beyond the lack of physical or material needs. The purpose of this study was to explore and expand the concept of social exclusion within the social determinants of health perspective - to understand how the social environment, health behaviours and health status are associated with material and social deprivation. Fundamental qualitative description with tones of focused ethnography. Participants who identified as hidden homeless described their everyday living conditions and how these everyday conditions were impacted and influenced by their social environments, coping/health behaviours and current health status. Research Ethics Board approval was granted and informed consents were obtained from 21 participants prior to the completion of individual interviews. Qualitative content analysis examined the descriptions of men and women experiencing hidden homelessness. Participants described the 'lack of quality social interactions and supports' and their 'daily struggles of street life'. They also shared the 'pain of addiction' and how coping strategies influenced health. Participants were hopeful that their insights would 'better the health of homeless people' by helping shape public policy and funding of community resources that would reduce barriers and improve overall health. Health professionals who understand health behaviours as coping mechanisms for poor quality social environments can provide more comprehensive and holistic care. The findings of this study can be used to support the importance of housing as a key factor in the health and well-being of people experiencing poverty, homelessness and social exclusion; and consequently, reinforces the need for a national housing strategy. Copyright © 2016 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  13. Skyrmions with holography and hidden local symmetry

    International Nuclear Information System (INIS)

    Nawa, Kanabu; Hosaka, Atsushi; Suganuma, Hideo

    2009-01-01

    We study baryons as Skyrmions in holographic QCD with D4/D8/D8 multi-D brane system in type IIA superstring theory, and also in the nonlinear sigma model with hidden local symmetry. Comparing these two models, we find that the extra dimension and its nontrivial curvature can largely change the role of (axial) vector mesons for baryons in four-dimensional space-time. In the hidden local symmetry approach, the ρ-meson field as a massive Yang-Mills field has a singular configuration in Skyrmion, which gives a strong repulsion for the baryon as a stabilizer. When the a 1 meson is added in this approach, the stability of Skyrmion is lost by the cancellation of ρ and a 1 contributions. On the contrary, in holographic QCD, the ρ-meson field does not appear as a massive Yang-Mills field due to the extra dimension and its nontrivial curvature. We show that the ρ-meson field has a regular configuration in Skyrmion, which gives a weak attraction for the baryon in holographic QCD. We argue that Skyrmion with π, ρ, and a 1 mesons become stable due to the curved extra dimension and also the presence of the Skyrme term in holographic QCD. From this result, we also discuss the features of our truncated-resonance analysis on baryon properties with π and ρ mesons below the cutoff scale M KK ∼1 GeV in holographic QCD, which is compared with other 5D instanton analysis.

  14. CHALLENGES OF SUPPLY CHAIN MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Natalia GALANTON

    2017-11-01

    Full Text Available The present article highlights the basic characteristics of the supply chain, specific to changes in the business environment of companies at the beginning of the 21st century. Supply chain activities turn natural resources, raw materials and components into a finished product, which is then delivered to the final customer. The supply chain incorporates the production process alongside the raw material acquisition and distribution of finished products, encompassing all the existing process responsible for transforming the materials taken from the supplier to the finished products delivered to customers. Today, competitiveness and performance of an organization are dependent on belonging to an efficient and effective supply-delivery chain where synergies exist due to the establishment and implementation of common goals and strategies by partners. Competition does not take place between independent organizations or between small groups of organizations, but between supply and delivery chains, made up of interconnected networks of producers, distributors and logistics providers. Under these circumstances, supply chain managers must seek solutions to respond promptly to the most important challenges in the field.

  15. Adaptive filtering for hidden node detection and tracking in networks.

    Science.gov (United States)

    Hamilton, Franz; Setzer, Beverly; Chavez, Sergio; Tran, Hien; Lloyd, Alun L

    2017-07-01

    The identification of network connectivity from noisy time series is of great interest in the study of network dynamics. This connectivity estimation problem becomes more complicated when we consider the possibility of hidden nodes within the network. These hidden nodes act as unknown drivers on our network and their presence can lead to the identification of false connections, resulting in incorrect network inference. Detecting the parts of the network they are acting on is thus critical. Here, we propose a novel method for hidden node detection based on an adaptive filtering framework with specific application to neuronal networks. We consider the hidden node as a problem of missing variables when model fitting and show that the estimated system noise covariance provided by the adaptive filter can be used to localize the influence of the hidden nodes and distinguish the effects of different hidden nodes. Additionally, we show that the sequential nature of our algorithm allows for tracking changes in the hidden node influence over time.

  16. Supply chains in global production

    Directory of Open Access Journals (Sweden)

    Anatolii Mazaraki

    2017-10-01

    Full Text Available Introduction. Analyzing the current processes of global sales and sales interaction over the past two decades shows that the world’s system of exchanges has undergone significant changes that have been caused by a multitude of factors. The formation of a complex model of global production, determined by the peculiarities of the transformation of individual economies’ growth models, the specifics of their industrialization and the forms of development of their national production business, its institutional and market-wise restructuring and the degree of inclusion in the system of international division of labor. The change in the level and depth of the specialization of individual countries in the field of production and sale of products, in turn, has accelerated the overcoming of economic distance (which is measured by the cost of transport and information services. Based on the above, namely, within the framework of forming a new model of global production, the issue of studying the role and value of supply chains in this model is made relevant. Aim and tasks. The purpose of the article is to study the modern transformation of supply chains within the global production system. The findings will allow to determine what exactly needs to be done in the direction of further redeveloping the regulatory tools of global supply chain management. Research results. The article presents the results of studying the transformation of supply chains’ role in global production. It is determined that taking into account the existing specificity of industrialization and fragmentation of national production, as well as the rapid spread of the results of scientific and technological progress in the world economy, there is a need for a more thorough study of this change. As a result of analyzing open source statistical data, a conclusion was reached regarding the transition from the competition of individual business entities to the competition of global

  17. Sociocultural Dimension of Hidden Content in a Professional Language Curriculum

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2017-12-01

    Full Text Available Introduction: studying curriculum as a pedagogical problem has traditionally been reduced to the analysis of its explicit content, set in official educational documents. However, a much less studied hidden content plays a significant role in education. So, what is the role of the hidden curriculum during professional language training? The purpose of the article is to determine the potential impact of hidden curriculum on students’ conceptual worldview. Comparing the worldview presented in textbooks with students’ one has allowed us to estimate the rate of influence of hidden curr iculum. Materials and Methods: the methodological basis of the work is the cultural concept of personalityoriented education. The methodology for studying the role of hidden curriculum includes four stages: at the first stage, the authors set the criteria for selecting textbooks for analysis and do the selection; at the second stage, the authors select sociocultural concepts for analysis; at the third stage, the scheme of analysis is designed and the analysis of textbooks is done; at the fourth stage, the authors identify the potential influence of hidden curriculum on students’ conceptual worldview. Results: the structure of hidden curriculum has been determined and the scheme for analysing its subject component has been developed. The authors have identified a significant influence of hidden curriculum on students’ worldview, which represents the scientific novelty of the article. Discussion and Conclusions: the article gives the definition of a hidden curriculum which is new for Russian pedagogy and presents a methodology for its analysis in EFL textbooks. That analysis is recommended to be conducted when selecting teaching materials both i n languages and other humanities.

  18. Explore the Buffering Effects of Perceived Hidden Inflation on Survival of Mobile Phone Service Providers in Taiwan

    Directory of Open Access Journals (Sweden)

    Sheng-Wen Liu

    2017-04-01

    Full Text Available The purpose of this study is to examine the moderating role of perceived hidden inflation on the relationships between service quality, brand trust and brand loyalty. All data collected from the target population are analyzed through two-step structural equation modeling (SEM and moderated multiple regression (MMR to examine the hypotheses. 1,050 questionnaires are randomly distributed at 21 telecommunication service stores in Taiwan. Findings indicated that service quality has no direct impact on behavioral loyalty but it has a significant indirect impact on behavioral loyalty through brand trust or attitudinal loyalty. Moreover, findings identify perceived hidden inflation as the moderating role in the service quality–brand trust–brand loyalty chain. Besides the need for empirical confirmation of the hypotheses given, finally, there are several practical implications for service marketers and future research directions for scholars.

  19. Transformation of hand-shape features for a biometric identification approach.

    Science.gov (United States)

    Travieso, Carlos M; Briceño, Juan Carlos; Alonso, Jesús B

    2012-01-01

    The present work presents a biometric identification system for hand shape identification. The different contours have been coded based on angular descriptions forming a Markov chain descriptor. Discrete Hidden Markov Models (DHMM), each representing a target identification class, have been trained with such chains. Features have been calculated from a kernel based on the HMM parameter descriptors. Finally, supervised Support Vector Machines were used to classify parameters from the DHMM kernel. First, the system was modelled using 60 users to tune the DHMM and DHMM_kernel+SVM configuration parameters and finally, the system was checked with the whole database (GPDS database, 144 users with 10 samples per class). Our experiments have obtained similar results in both cases, demonstrating a scalable, stable and robust system. Our experiments have achieved an upper success rate of 99.87% for the GPDS database using three hand samples per class in training mode, and seven hand samples in test mode. Secondly, the authors have verified their algorithms using another independent and public database (the UST database). Our approach has reached 100% and 99.92% success for right and left hand, respectively; showing the robustness and independence of our algorithms. This success was found using as features the transformation of 100 points hand shape with our DHMM kernel, and as classifier Support Vector Machines with linear separating functions, with similar success.

  20. Transformation of Hand-Shape Features for a Biometric Identification Approach

    Directory of Open Access Journals (Sweden)

    Jesús B. Alonso

    2012-01-01

    Full Text Available The present work presents a biometric identification system for hand shape identification. The different contours have been coded based on angular descriptions forming a Markov chain descriptor. Discrete Hidden Markov Models (DHMM, each representing a target identification class, have been trained with such chains. Features have been calculated from a kernel based on the HMM parameter descriptors. Finally, supervised Support Vector Machines were used to classify parameters from the DHMM kernel. First, the system was modelled using 60 users to tune the DHMM and DHMM_kernel+SVM configuration parameters and finally, the system was checked with the whole database (GPDS database, 144 users with 10 samples per class. Our experiments have obtained similar results in both cases, demonstrating a scalable, stable and robust system. Our experiments have achieved an upper success rate of 99.87% for the GPDS database using three hand samples per class in training mode, and seven hand samples in test mode. Secondly, the authors have verified their algorithms using another independent and public database (the UST database. Our approach has reached 100% and 99.92% success for right and left hand, respectively; showing the robustness and independence of our algorithms. This success was found using as features the transformation of 100 points hand shape with our DHMM kernel, and as classifier Support Vector Machines with linear separating functions, with similar success.

  1. Multilayer Neural Networks with Extensively Many Hidden Units

    International Nuclear Information System (INIS)

    Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido

    2001-01-01

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones

  2. Update on hidden sectors with dark forces and dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-11-15

    Recently there has been much interest in hidden sectors, especially in the context of dark matter and ''dark forces'', since they are a common feature of beyond standard model scenarios like string theory and SUSY and additionally exhibit interesting phenomenological aspects. Various laboratory experiments place limits on the so-called hidden photon and continuously further probe and constrain the parameter space; an updated overview is presented here. Furthermore, for several hidden sector models with light dark matter we study the viability with respect to the relic abundance and direct detection experiments.

  3. Hidden photon dark matter search with large metallic mirror

    International Nuclear Information System (INIS)

    Doebrich, Babette; Lindner, Axel; Daumiller, Kai; Engel, Ralph; Roth, Markus; Kowalski, Marek

    2014-10-01

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  4. Naturally light hidden photons in LARGE volume string compactifications

    International Nuclear Information System (INIS)

    Goodsell, M.; Jaeckel, J.; Redondo, J.; Ringwald, A.

    2009-09-01

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  5. Hidden Area and Mechanical Nonlinearities in Freestanding Graphene

    Science.gov (United States)

    Nicholl, Ryan J. T.; Lavrik, Nickolay V.; Vlassiouk, Ivan; Srijanto, Bernadeta R.; Bolotin, Kirill I.

    2017-06-01

    We investigated the effect of out-of-plane crumpling on the mechanical response of graphene membranes. In our experiments, stress was applied to graphene membranes using pressurized gas while the strain state was monitored through two complementary techniques: interferometric profilometry and Raman spectroscopy. By comparing the data obtained through these two techniques, we determined the geometric hidden area which quantifies the crumpling strength. While the devices with hidden area ˜0 % obeyed linear mechanics with biaxial stiffness 428 ±10 N /m , specimens with hidden area in the range 0.5%-1.0% were found to obey an anomalous nonlinear Hooke's law with an exponent ˜0.1 .

  6. Local models and hidden nonlocality in Quantum Theory

    OpenAIRE

    Guerini, Leonardo

    2014-01-01

    This Master's thesis has two central subjects: the simulation of correlations generated by local measurements on entangled quantum states by local hidden-variables models and the revelation of hidden nonlocality. We present and detail the Werner's local model and the hidden nonlocality of some Werner states of dimension $d\\geq5$, the Gisin-Degorre's local model for a Werner state of dimension $d=2$ and the local model of Hirsch et al. for mixtures of the singlet state and noise, all of them f...

  7. Suppressing the QCD axion abundance by hidden monopoles

    International Nuclear Information System (INIS)

    Kawasaki, Masahiro

    2015-11-01

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10 12 GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  8. Chain reaction

    International Nuclear Information System (INIS)

    Balogh, Brian.

    1991-01-01

    Chain Reaction is a work of recent American political history. It seeks to explain how and why America came to depend so heavily on its experts after World War II, how those experts translated that authority into political clout, and why that authority and political discretion declined in the 1970s. The author's research into the internal memoranda of the Atomic Energy Commission substantiates his argument in historical detail. It was not the ravages of American anti-intellectualism, as so many scholars have argued, that brought the experts back down to earth. Rather, their decline can be traced to the very roots of their success after World War II. The need to over-state anticipated results in order to garner public support, incessant professional and bureaucratic specialization, and the sheer proliferation of expertise pushed arcane and insulated debates between experts into public forums at the same time that a broad cross section of political participants found it easier to gain access to their own expertise. These tendencies ultimately undermined the political influence of all experts. (author)

  9. Hadamard Transforms

    CERN Document Server

    Agaian, Sos; Egiazarian, Karen; Astola, Jaakko

    2011-01-01

    The Hadamard matrix and Hadamard transform are fundamental problem-solving tools in a wide spectrum of scientific disciplines and technologies, such as communication systems, signal and image processing (signal representation, coding, filtering, recognition, and watermarking), digital logic (Boolean function analysis and synthesis), and fault-tolerant system design. Hadamard Transforms intends to bring together different topics concerning current developments in Hadamard matrices, transforms, and their applications. Each chapter begins with the basics of the theory, progresses to more advanced

  10. The Second International Conference on Nutrition: Implications for Hidden Hunger.

    Science.gov (United States)

    Amoroso, Leslie

    2016-01-01

    The Second International Conference on Nutrition (ICN2) was jointly organized by the Food and Agriculture Organization of the United Nations (FAO) and the World Health Organization (WHO) and was held at the FAO Headquarters in Rome, Italy, from 19 to 21 November 2014. The ICN2 was a high-level intergovernmental meeting that focused global attention on addressing malnutrition in all its forms: undernutrition, including micronutrient deficiencies, overweight, and obesity. The ICN2 was held to specifically address the persistent and unacceptably high levels of malnutrition. Despite much progress in reducing hunger globally, 795 million people remain undernourished, over 2 billion people suffer from various micronutrient deficiencies, and an estimated 161 million children under 5 years of age are stunted, 99 million underweight, and 51 million wasted. Meanwhile, more than 600 million adults are obese. Global problems require global solutions. The ICN2 brought together national policy-makers from food, agriculture, health, education, social protection and other relevant sectors to address the complex problem of malnutrition through a multi-sectoral approach. Two outcome documents - the Rome Declaration on Nutrition and the Framework for Action - were endorsed by participating governments at the Conference, committing world leaders to establishing national policies aimed at eradicating malnutrition in all its forms and transforming food systems to make nutritious diets available to all. The Rome Declaration on Nutrition is a political statement of 10 commitments for more effective and coordinated action to improve nutrition, while the Framework for Action is a voluntary technical guide of 60 recommendations for the implementation of the political commitments. This chapter provides information on the ICN2 and its outcomes as well as follow-up activities. Emphasis is placed on the Rome Declaration on Nutrition and the Framework for Action, with special focus on hidden

  11. High Energy Colliders and Hidden Sectors

    Science.gov (United States)

    Dror, Asaf Jeff

    This thesis explores two dominant frontiers of theoretical physics, high energy colliders and hidden sectors. The Large Hadron Collider (LHC) is just starting to reach its maximum operational capabilities. However, already with the current data, large classes of models are being put under significant pressure. It is crucial to understand whether the (thus far) null results are a consequence of a lack of solution to the hierarchy problem around the weak scale or requires expanding the search strategy employed at the LHC. It is the duty of the current generation of physicists to design new searches to ensure that no stone is left unturned. To this end, we study the sensitivity of the LHC to the couplings in the Standard Model top sector. We find it can significantly improve the measurements on ZtRtR coupling by a novel search strategy, making use of an implied unitarity violation in such models. Analogously, we show that other couplings in the top sector can also be measured with the same technique. Furthermore, we critically analyze a set of anomalies in the LHC data and how they may appear from consistent UV completions. We also propose a technique to measure lifetimes of new colored particles with non-trivial spin. While the high energy frontier will continue to take data, it is likely the only collider of its kind for the next couple decades. On the other hand, low-energy experiments have a promising future with many new proposed experiments to probe the existence of particles well below the weak scale but with small couplings to the Standard Model. In this work we survey the different possibilities, focusingon the constraints as well as possible new hidden sector dynamics. In particular, we show that vector portals which couple to an anomalous current, e.g., baryon number, are significantly constrained from flavor changing meson decays and rare Z decays. Furthermore, we present a new mechanism for dark matter freezeout which depletes the dark sector through an

  12. Alleviating hidden hunger. Approaches that work

    International Nuclear Information System (INIS)

    Kennedy, E.; Mannar, V.; Iyengar, V.

    2003-01-01

    The world has come a long way in understanding the nature, magnitude and range of solutions to micronutrient malnutrition - often called 'hidden hunger'. The most sustainable solutions - that is those that are likely to be maintained in the long term - almost surely will include food-based approaches including diet diversity, food fortification and biofortification. Food fortification and biofortification could be some of the most cost-effective of all public health interventions and thus within the economic reach of even the world's poorest. In order to implement them in a sustainable manner, a combination of technical, operational, economic, behavioural and political factors need to be addressed. In some ways the technological issues are the easiest. Because of attention to research, we now have a variety of ways for both single and multiple micronutrients to reach the target population. We also know what is needed in order to ensure delivery systems. The key factor for continued success in reducing micronutrient malnutrition through fortification is a political commitment at the national and international level and creating effective public-private partnerships at the national level. The payoff for eliminating hidden hunger through nutrient fortification is enormous and few other public health interventions offer such a promising health, nutrition and economic success story. Nuclear and isotopic techniques are valuable tools in helping to meet the multifaceted challenges posed by nutritional disorders affecting the entire human life span (embryonic to elderly). Among the numerous applications available, isotopic techniques are uniquely well suited for targeting and tracking progress in food and nutrition development programmes (See box: How Nutrients are Tracked). These include: use of the stable isotopes of iron (Fe) and zinc (Zn) as a kind of gold standard in studies of their bioavailability from foods; trace element bioavailability and pool sizes for

  13. Prediction of Annual Rainfall Pattern Using Hidden Markov Model ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Hidden Markov model is very influential in stochastic world because of its ... the earth from the clouds. The usual ... Rainfall modelling and ... Markov Models have become popular tools ... environment sciences, University of Jos, plateau state,.

  14. New limits on hidden photons from past electron beam dumps

    International Nuclear Information System (INIS)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-01

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  15. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  16. Cosmological abundance of the QCD axion coupled to hidden photons

    Science.gov (United States)

    Kitajima, Naoya; Sekiguchi, Toyokazu; Takahashi, Fuminobu

    2018-06-01

    We study the cosmological evolution of the QCD axion coupled to hidden photons. For a moderately strong coupling, the motion of the axion field leads to an explosive production of hidden photons by tachyonic instability. We use lattice simulations to evaluate the cosmological abundance of the QCD axion. In doing so, we incorporate the backreaction of the produced hidden photons on the axion dynamics, which becomes significant in the non-linear regime. We find that the axion abundance is suppressed by at most O (102) for the decay constant fa =1016GeV, compared to the case without the coupling. For a sufficiently large coupling, the motion of the QCD axion becomes strongly damped, and as a result, the axion abundance is enhanced. Our results show that the cosmological upper bound on the axion decay constant can be relaxed by a few hundred for a certain range of the coupling to hidden photons.

  17. Dopamine reward prediction errors reflect hidden state inference across time

    Science.gov (United States)

    Starkweather, Clara Kwon; Babayan, Benedicte M.; Uchida, Naoshige; Gershman, Samuel J.

    2017-01-01

    Midbrain dopamine neurons signal reward prediction error (RPE), or actual minus expected reward. The temporal difference (TD) learning model has been a cornerstone in understanding how dopamine RPEs could drive associative learning. Classically, TD learning imparts value to features that serially track elapsed time relative to observable stimuli. In the real world, however, sensory stimuli provide ambiguous information about the hidden state of the environment, leading to the proposal that TD learning might instead compute a value signal based on an inferred distribution of hidden states (a ‘belief state’). In this work, we asked whether dopaminergic signaling supports a TD learning framework that operates over hidden states. We found that dopamine signaling exhibited a striking difference between two tasks that differed only with respect to whether reward was delivered deterministically. Our results favor an associative learning rule that combines cached values with hidden state inference. PMID:28263301

  18. Optimisation of Hidden Markov Model using Baum–Welch algorithm ...

    Indian Academy of Sciences (India)

    The present work is a part of development of Hidden Markov Model. (HMM) based ... the Himalaya. In this work, HMMs have been developed for forecasting of maximum and minimum ..... data collection teams of Snow and Avalanche Study.

  19. On the LHC sensitivity for non-thermalised hidden sectors

    Science.gov (United States)

    Kahlhoefer, Felix

    2018-04-01

    We show under rather general assumptions that hidden sectors that never reach thermal equilibrium in the early Universe are also inaccessible for the LHC. In other words, any particle that can be produced at the LHC must either have been in thermal equilibrium with the Standard Model at some point or must be produced via the decays of another hidden sector particle that has been in thermal equilibrium. To reach this conclusion, we parametrise the cross section connecting the Standard Model to the hidden sector in a very general way and use methods from linear programming to calculate the largest possible number of LHC events compatible with the requirement of non-thermalisation. We find that even the HL-LHC cannot possibly produce more than a few events with energy above 10 GeV involving states from a non-thermalised hidden sector.

  20. Risk from the frontlines of a hidden epidemic sexuality, masculinities ...

    African Journals Online (AJOL)

    Risk from the frontlines of a hidden epidemic sexuality, masculinities and social pressures ... It frames risk in the context of the dynamics governing sexuality, underlined ... MSM risk and practice, in these contexts, are consequently shaped by ...

  1. New limits on hidden photons from past electron beam dumps

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-15

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  2. Visualizing Transformation

    DEFF Research Database (Denmark)

    Pedersen, Pia

    2012-01-01

    Transformation, defined as the step of extracting, arranging and simplifying data into visual form (M. Neurath, 1974), was developed in connection with ISOTYPE (International System Of TYpographic Picture Education) and might well be the most important legacy of Isotype to the field of graphic...... design. Recently transformation has attracted renewed interest because of the book The Transformer written by Robin Kinross and Marie Neurath. My on-going research project, summarized in this paper, identifies and depicts the essential principles of data visualization underlying the process...... of transformation with reference to Marie Neurath’s sketches on the Bilston Project. The material has been collected at the Otto and Marie Neurath Collection housed at the University of Reading, UK. By using data visualization as a research method to look directly into the process of transformation, the project...

  3. A two particle hidden sector and the oscillations with photons

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Pedro D. [Universidad de Antofagasta, Departamento de Fisica, Antofagasta (Chile); Arias, Paola; Maldonado, Carlos [Universidad de Santiago de Chile, Departmento de Fisica, Santiago (Chile)

    2018-01-15

    We present a detailed study of the oscillations and optical properties for vacuum, in a model for the dark sector that contains axion-like particles and hidden photons. We provide bounds for the couplings versus the mass, using current results from ALPS-I and PVLAS. We also discuss the challenges for the detection of models with more than one hidden particle in light shining trough wall-like experiments. (orig.)

  4. Rare Z boson decays to a hidden sector

    Science.gov (United States)

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-01

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  5. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  6. Hidden twelve-dimensional super Poincare symmetry in eleven dimensions

    International Nuclear Information System (INIS)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2004-01-01

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional super Poincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven-dimensional superparticle, taken off-shell, we discover a hidden twelve-dimensional super Poincare symmetry that governs the theory

  7. Hidden charged dark matter and chiral dark radiation

    Science.gov (United States)

    Ko, P.; Nagata, Natsumi; Tang, Yong

    2017-10-01

    In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.

  8. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  9. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  10. Dietary phytate, zinc and hidden zinc deficiency.

    Science.gov (United States)

    Sandstead, Harold H; Freeland-Graves, Jeanne H

    2014-10-01

    Epidemiological data suggest at least one in five humans are at risk of zinc deficiency. This is in large part because the phytate in cereals and legumes has not been removed during food preparation. Phytate, a potent indigestible ligand for zinc prevents it's absorption. Without knowledge of the frequency of consumption of foods rich in phytate, and foods rich in bioavailable zinc, the recognition of zinc deficiency early in the illness may be difficult. Plasma zinc is insensitive to early zinc deficiency. Serum ferritin concentration≤20μg/L is a potential indirect biomarker. Early effects of zinc deficiency are chemical, functional and may be "hidden". The clinical problem is illustrated by 2 studies that involved US Mexican-American children, and US premenopausal women. The children were consuming home diets that included traditional foods high in phytate. The premenopausal women were not eating red meat on a regular basis, and their consumption of phytate was mainly from bran breakfast cereals. In both studies the presence of zinc deficiency was proven by functional responses to controlled zinc treatment. In the children lean-mass, reasoning, and immunity were significantly affected. In the women memory, reasoning, and eye-hand coordination were significantly affected. A screening self-administered food frequency questionnaire for office might help caregiver's identify patients at risk of zinc deficiency. Copyright © 2014 Elsevier GmbH. All rights reserved.

  11. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  12. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  13. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  14. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M; Aarnio, P [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T; Tiilikainen, H [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1998-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  15. Analytical method for solving radioactive transformations

    International Nuclear Information System (INIS)

    Vudakin, Z.

    1999-01-01

    Analytical method for solving radioactive transformations is presented in this paper. High accuracy series expansion of the depletion function and nonsingular Bateman coefficients are used to overcome numerical difficulties when applying well-known Bateman solution of a simple radioactive decay. Generality and simplicity of the method are found to be useful in evaluating nuclide chains with one hundred or more nuclides in the chain. Method enables evaluation of complete chain, without elimination of short-lives nuclides. It is efficient and accurate

  16. Contextuality for preparations, transformations, and unsharp measurements

    International Nuclear Information System (INIS)

    Spekkens, R.W.

    2005-01-01

    The Bell-Kochen-Specker theorem establishes the impossibility of a noncontextual hidden variable model of quantum theory, or equivalently, that quantum theory is contextual. In this paper, an operational definition of contextuality is introduced which generalizes the standard notion in three ways: (i) it applies to arbitrary operational theories rather than just quantum theory (ii) it applies to arbitrary experimental procedures rather than just sharp measurements, and (iii) it applies to a broad class of ontological models of quantum theory rather than just deterministic hidden variable models. We derive three no-go theorems for ontological models, each based on an assumption of noncontextuality for a different sort of experimental procedure; one for preparation procedures, another for unsharp measurement procedures (that is, measurement procedures associated with positive-operator valued measures), and a third for transformation procedures. All three proofs apply to two-dimensional Hilbert spaces, and are therefore stronger than traditional proofs of contextuality

  17. Hidden-Sector Dynamics and the Supersymmetric Seesaw

    CERN Document Server

    Campbell, Bruce A; Maybury, David W

    2008-01-01

    In light of recent analyses that have shown that nontrivial hidden-sector dynamics in models of supersymmetry breaking can lead to a significant impact on the predicted low-energy supersymmetric spectrum, we extend these studies to consider hidden-sector effects in extensions of the MSSM to include a seesaw model for neutrino masses. A dynamical hidden sector in an interval of mass scales below the seesaw scale would yield renormalization-group running involving both the anomalous dimension from the hidden sector and the seesaw-extended MSSM renormalization group equations (RGEs). These effects interfere in general, altering the generational mixing of the sleptons, and allowing for a substantial change to the expected level of charged-lepton flavour violation in seesaw-extended MSSM models. These results provide further support for recent theoretical observations that knowledge of the hidden sector is required in order to make concrete low-energy predictions, if the hidden sector is strongly coupled. In parti...

  18. Poisson-Gaussian Noise Reduction Using the Hidden Markov Model in Contourlet Domain for Fluorescence Microscopy Images

    Science.gov (United States)

    Yang, Sejung; Lee, Byung-Uk

    2015-01-01

    In certain image acquisitions processes, like in fluorescence microscopy or astronomy, only a limited number of photons can be collected due to various physical constraints. The resulting images suffer from signal dependent noise, which can be modeled as a Poisson distribution, and a low signal-to-noise ratio. However, the majority of research on noise reduction algorithms focuses on signal independent Gaussian noise. In this paper, we model noise as a combination of Poisson and Gaussian probability distributions to construct a more accurate model and adopt the contourlet transform which provides a sparse representation of the directional components in images. We also apply hidden Markov models with a framework that neatly describes the spatial and interscale dependencies which are the properties of transformation coefficients of natural images. In this paper, an effective denoising algorithm for Poisson-Gaussian noise is proposed using the contourlet transform, hidden Markov models and noise estimation in the transform domain. We supplement the algorithm by cycle spinning and Wiener filtering for further improvements. We finally show experimental results with simulations and fluorescence microscopy images which demonstrate the improved performance of the proposed approach. PMID:26352138

  19. Influence of chain length of pyrene fatty acids on their uptake and metabolism by Epstein-Barr-virus-transformed lymphoid cell lines from a patient with multisystemic lipid storage myopathy and from control subjects.

    OpenAIRE

    Radom, J; Salvayre, R; Levade, T; Douste-Blazy, L

    1990-01-01

    The uptake and intracellular metabolism of 4-(1-pyrene)butanoic acid (P4), 10-(1-pyrene)decanoic acid (P10) and 12-(1-pyrene)dodecanoic acid (P12) were investigated in cultured lymphoid cell lines from normal individuals and from a patient with multisystemic lipid storage myopathy (MLSM). The cellular uptake was shown to be dependent on the fatty-acid chain length, but no significant difference in the uptake of pyrene fatty acids was observed between MLSM and control lymphoid cells. After inc...

  20. Influence of chain length of pyrene fatty acids on their uptake and metabolism by Epstein-Barr-virus-transformed lymphoid cell lines from a patient with multisystemic lipid storage myopathy and from control subjects.

    Science.gov (United States)

    Radom, J; Salvayre, R; Levade, T; Douste-Blazy, L

    1990-01-01

    The uptake and intracellular metabolism of 4-(1-pyrene)butanoic acid (P4), 10-(1-pyrene)decanoic acid (P10) and 12-(1-pyrene)dodecanoic acid (P12) were investigated in cultured lymphoid cell lines from normal individuals and from a patient with multisystemic lipid storage myopathy (MLSM). The cellular uptake was shown to be dependent on the fatty-acid chain length, but no significant difference in the uptake of pyrene fatty acids was observed between MLSM and control lymphoid cells. After incubation for 1 h the distribution of fluorescent fatty acids taken up by the lymphoid cell lines also differed with the chain length, most of the fluorescence being associated with phospholipid and triacylglycerols. In contrast with P10 and P12, P4 was not incorporated into neutral lipids. When the cells were incubated for 24 h with the pyrene fatty acids, the amount of fluorescent lipids synthesized by the cells was proportional to the fatty acid concentration in the culture medium. After a 24 h incubation in the presence of P10 or P12, at any concentration, the fluorescent triacylglycerol content of MLSM cells was 2-5-fold higher than that of control cells. Concentrations of pyrene fatty acids higher than 40 microM seemed to be more toxic for mutant cells than for control cells. This cytotoxicity was dependent on the fluorescent-fatty-acid chain length (P12 greater than P10 greater than P4). Pulse-chase experiments permitted one to demonstrate the defect in the degradation of endogenously biosynthesized triacylglycerols in MLSM cells (residual activity was around 10-25% of controls on the basis of half-lives and initial rates of P10- or P12-labelled-triacylglycerol catabolism); MLSM lymphoid cells exhibited a mild phenotypic expression of the lipid storage (less severe than that observed in fibroblasts). P4 was not utilized in the synthesis of triacylglycerols, and thus did not accumulate in MLSM cells: this suggests that natural short-chain fatty acids might induce a lesser

  1. A single hidden layer feedforward network with only one neuron in the hidden layer can approximate any univariate function

    OpenAIRE

    Guliyev , Namig; Ismailov , Vugar

    2016-01-01

    The possibility of approximating a continuous function on a compact subset of the real line by a feedforward single hidden layer neural network with a sigmoidal activation function has been studied in many papers. Such networks can approximate an arbitrary continuous function provided that an unlimited number of neurons in a hidden layer is permitted. In this paper, we consider constructive approximation on any finite interval of $\\mathbb{R}$ by neural networks with only one neuron in the hid...

  2. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  3. Hidden burden of malaria in Indian women

    Directory of Open Access Journals (Sweden)

    Sharma Vinod P

    2009-12-01

    Full Text Available Abstract Malaria is endemic in India with an estimated 70-100 million cases each year (1.6-1.8 million reported by NVBDCP; of this 50-55% are Plasmodium vivax and 45-50% Plasmodium falciparum. A recent study on malaria in pregnancy reported from undivided Madhya Pradesh state (includes Chhattisgarh state, that an estimated over 220,000 pregnant women contract malaria infection each year. Malaria in pregnancy caused- abortions 34.5%; stillbirths 9%; and maternal deaths 0.45%. Bulk of this tragic outcome can be averted by following the Roll Back Malaria/WHO recommendations of the use of malaria prevention i.e. indoor residual spraying (IRS/insecticide-treated bed nets (ITN preferably long-lasting treated bed nets (LLIN; intermittent preventive therapy (IPT; early diagnosis, prompt and complete treatment using microscopic/malaria rapid diagnostics test (RDT and case management. High incidence in pregnancy has arisen because of malaria surveillance lacking coverage, lack of age and sex wise data, staff shortages, and intermittent preventive treatment (IPT applicable in high transmission states/pockets is not included in the national drug policy- an essential component of fighting malaria in pregnancy in African settings. Inadequate surveillance and gross under-reporting has been highlighted time and again for over three decades. As a result the huge problem of malaria in pregnancy reported occasionally by researchers has remained hidden. Malaria in pregnancy may quicken severity in patients with drug resistant parasites, anaemia, endemic poverty, and malnutrition. There is, therefore, urgent need to streamline malaria control strategies to make a difference in tackling this grim scenario in human health.

  4. Hydrogeophysical investigations at Hidden Dam, Raymond, California

    Science.gov (United States)

    Minsley, Burke J.; Burton, Bethany L.; Ikard, Scott; Powers, Michael H.

    2011-01-01

    Self-potential and direct current resistivity surveys are carried out at the Hidden Dam site in Raymond, California to assess present-day seepage patterns and better understand the hydrogeologic mechanisms that likely influence seepage. Numerical modeling is utilized in conjunction with the geophysical measurements to predict variably-saturated flow through typical two-dimensional dam cross-sections as a function of reservoir elevation. Several different flow scenarios are investigated based on the known hydrogeology, as well as information about typical subsurface structures gained from the resistivity survey. The flow models are also used to simulate the bulk electrical resistivity in the subsurface under varying saturation conditions, as well as the self-potential response using petrophysical relationships and electrokinetic coupling equations.The self-potential survey consists of 512 measurements on the downstream area of the dam, and corroborates known seepage areas on the northwest side of the dam. Two direct-current resistivity profiles, each approximately 2,500 ft (762 m) long, indicate a broad sediment channel under the northwest side of the dam, which may be a significant seepage pathway through the foundation. A focusing of seepage in low-topography areas downstream of the dam is confirmed from the numerical flow simulations, which is also consistent with past observations. Little evidence of seepage is identified from the self-potential data on the southeast side of the dam, also consistent with historical records, though one possible area of focused seepage is identified near the outlet works. Integration of the geophysical surveys, numerical modeling, and observation well data provides a framework for better understanding seepage at the site through a combined hydrogeophysical approach.

  5. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  6. Identifying hidden voice and video streams

    Science.gov (United States)

    Fan, Jieyan; Wu, Dapeng; Nucci, Antonio; Keralapura, Ram; Gao, Lixin

    2009-04-01

    Given the rising popularity of voice and video services over the Internet, accurately identifying voice and video traffic that traverse their networks has become a critical task for Internet service providers (ISPs). As the number of proprietary applications that deliver voice and video services to end users increases over time, the search for the one methodology that can accurately detect such services while being application independent still remains open. This problem becomes even more complicated when voice and video service providers like Skype, Microsoft, and Google bundle their voice and video services with other services like file transfer and chat. For example, a bundled Skype session can contain both voice stream and file transfer stream in the same layer-3/layer-4 flow. In this context, traditional techniques to identify voice and video streams do not work. In this paper, we propose a novel self-learning classifier, called VVS-I , that detects the presence of voice and video streams in flows with minimum manual intervention. Our classifier works in two phases: training phase and detection phase. In the training phase, VVS-I first extracts the relevant features, and subsequently constructs a fingerprint of a flow using the power spectral density (PSD) analysis. In the detection phase, it compares the fingerprint of a flow to the existing fingerprints learned during the training phase, and subsequently classifies the flow. Our classifier is not only capable of detecting voice and video streams that are hidden in different flows, but is also capable of detecting different applications (like Skype, MSN, etc.) that generate these voice/video streams. We show that our classifier can achieve close to 100% detection rate while keeping the false positive rate to less that 1%.

  7. CHAINS-PC, Decay Chain Atomic Densities

    International Nuclear Information System (INIS)

    1994-01-01

    1 - Description of program or function: CHAINS computes the atom density of members of a single radioactive decay chain. The linearity of the Bateman equations allows tracing of interconnecting chains by manually accumulating results from separate calculations of single chains. Re-entrant loops can be treated as extensions of a single chain. Losses from the chain are also tallied. 2 - Method of solution: The Bateman equations are solved analytically using double-precision arithmetic. Poles are avoided by small alterations of the loss terms. Multigroup fluxes, cross sections, and self-shielding factors entered as input are used to compute the effective specific reaction rates. The atom densities are computed at any specified times. 3 - Restrictions on the complexity of the problem: Maxima of 100 energy groups, 100 time values, 50 members in a chain

  8. Landskabets transformation

    DEFF Research Database (Denmark)

    Munck Petersen, Rikke

    2005-01-01

    Seminaroplæg fra forskere. Faglige seminarer på KA, forår 2005. Belyser transformation af det danske landskab fysisk som holdningsmæssigt, samt hvordan phd-arbejdets egen proces håndterer den.......Seminaroplæg fra forskere. Faglige seminarer på KA, forår 2005. Belyser transformation af det danske landskab fysisk som holdningsmæssigt, samt hvordan phd-arbejdets egen proces håndterer den....

  9. Covariant Transform

    OpenAIRE

    Kisil, Vladimir V.

    2010-01-01

    The paper develops theory of covariant transform, which is inspired by the wavelet construction. It was observed that many interesting types of wavelets (or coherent states) arise from group representations which are not square integrable or vacuum vectors which are not admissible. Covariant transform extends an applicability of the popular wavelets construction to classic examples like the Hardy space H_2, Banach spaces, covariant functional calculus and many others. Keywords: Wavelets, cohe...

  10. Transforming Anatomy

    OpenAIRE

    Hall, Anndee

    2017-01-01

    Abstract: Transforming Anatomy Studying historic books allows people to witness the transformation of the world right before their very eyes. The Bruxellensis Icones Anatomicae[1] by Andreas Vesalius is a vital piece of evidence in the movement from a more rudimentary understanding of the human body into the more complex and accurate development of modern anatomy. Vesalius’ research worked to both refute and confirm findings of his predecessor, the great historical Greek philosopher, Galen...

  11. Relationships between molecular structure and kinetic and thermodynamic controls in lipid systems. Part II: Phase behavior and transformation paths of SSS, PSS and PPS saturated triacylglycerols--effect of chain length mismatch.

    Science.gov (United States)

    Bouzidi, Laziz; Narine, Suresh S

    2012-01-01

    The kinetic phase behavior and phase transformation paths of purified tristearoylglycerol (SSS), 3-palmitoyl-1,2-distearoyl-sn-glycerol (PSS) and 1,2-dipalmitoyl-3-stearoyl-sn-glycerol (PPS) were investigated in terms of polymorphism, crystallization and melting. The details of the phase transformation paths were obtained using the heating cycles of two sets of experiments: (a) cooling rate was varied and heating rate fixed and (b) cooling rate was fixed and heating rate varied. Kinetic effects were manifest in all measured properties, underscoring the complexity of the phase transformation paths for each TAG, and the intricate thermodynamics-molecular relationships. For the first time, XRD data obtained for SSS, PSS and PPS TAGs, cooled at rates higher than 0.5°C/min, suggested the formation of a transient structure similar to the so-called α(2)-phase which has been observed in mixed saturated-unsaturated TAGs quenched from the melt. The more stable phases (β' in PSS and PPS, and β in SSS) were only observed for cooling rates lower than 1.0°C/min. The kinetic and thermodynamic differences observed in the crystallization, structure and melting of SSS, PSS and PPS are proposed to be mainly due to the disturbances introduced at the "terrace" level via methyl-end group interactions, i.e., the missing of two or four CH(2) groups compared to SSS. The symmetrical SSS with a relatively flat "terrace" crystallizes preferably in the most stable β-form. Two missing CH(2) groups at the sn-1 position (PSS) introduces enough structural disturbances to promote the relative prevalence and persistence of the β'-phase, and four missing CH(2) groups at the sn-1 and sn-2 positions (PPS) is relatively too large of a disturbance and therefore favors the α-form. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  12. Increased taxon sampling reveals thousands of hidden orthologs in flatworms

    Science.gov (United States)

    2017-01-01

    Gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the gene complement of an organism consists of hidden orthologs, i.e., those with no apparent homology to sequenced animal lineages—mistakenly considered new genes—but actually representing rapidly evolving orthologs or undetected paralogs. Here, we describe Leapfrog, a simple automated BLAST pipeline that leverages increased taxon sampling to overcome long evolutionary distances and identify putative hidden orthologs in large transcriptomic databases by transitive homology. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3427 putative hidden orthologs, some unidentified by OrthoFinder and HaMStR, two common orthogroup inference algorithms. Unexpectedly, we do not observe a correlation between the number of putative hidden orthologs in a lineage and its “average” evolutionary rate. Hidden orthologs do not show unusual sequence composition biases that might account for systematic errors in sequence similarity searches. Instead, gene duplication with divergence of one paralog and weak positive selection appear to underlie hidden orthology in Platyhelminthes. By using Leapfrog, we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g., planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire in flatworms, qualifying the impact of gene losses and gains in gene complement evolution. PMID:28400424

  13. A Duration Hidden Markov Model for the Identification of Regimes in Stock Market Returns

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    This paper introduces a Duration Hidden Markov Model to model bull and bear market regime switches in the stock market; the duration of each state of the Markov Chain is a random variable that depends on a set of exogenous variables. The model not only allows the endogenous determination...... of the different regimes and but also estimates the effect of the explanatory variables on the regimes' durations. The model is estimated here on NYSE returns using the short-term interest rate and the interest rate spread as exogenous variables. The bull market regime is assigned to the identified state...... with the higher mean and lower variance; bull market duration is found to be negatively dependent on short-term interest rates and positively on the interest rate spread, while bear market duration depends positively the short-term interest rate and negatively on the interest rate spread....

  14. A hidden Markov model approach to analyze longitudinal ternary outcomes when some observed states are possibly misclassified.

    Science.gov (United States)

    Benoit, Julia S; Chan, Wenyaw; Luo, Sheng; Yeh, Hung-Wen; Doody, Rachelle

    2016-04-30

    Understanding the dynamic disease process is vital in early detection, diagnosis, and measuring progression. Continuous-time Markov chain (CTMC) methods have been used to estimate state-change intensities but challenges arise when stages are potentially misclassified. We present an analytical likelihood approach where the hidden state is modeled as a three-state CTMC model allowing for some observed states to be possibly misclassified. Covariate effects of the hidden process and misclassification probabilities of the hidden state are estimated without information from a 'gold standard' as comparison. Parameter estimates are obtained using a modified expectation-maximization (EM) algorithm, and identifiability of CTMC estimation is addressed. Simulation studies and an application studying Alzheimer's disease caregiver stress-levels are presented. The method was highly sensitive to detecting true misclassification and did not falsely identify error in the absence of misclassification. In conclusion, we have developed a robust longitudinal method for analyzing categorical outcome data when classification of disease severity stage is uncertain and the purpose is to study the process' transition behavior without a gold standard. Copyright © 2016 John Wiley & Sons, Ltd.

  15. Embodied memory allows accurate and stable perception of hidden objects despite orientation change.

    Science.gov (United States)

    Pan, Jing Samantha; Bingham, Ned; Bingham, Geoffrey P

    2017-07-01

    Rotating a scene in a frontoparallel plane (rolling) yields a change in orientation of constituent images. When using only information provided by static images to perceive a scene after orientation change, identification performance typically decreases (Rock & Heimer, 1957). However, rolling generates optic flow information that relates the discrete, static images (before and after the change) and forms an embodied memory that aids recognition. The embodied memory hypothesis predicts that upon detecting a continuous spatial transformation of image structure, or in other words, seeing the continuous rolling process and objects undergoing rolling observers should accurately perceive objects during and after motion. Thus, in this case, orientation change should not affect performance. We tested this hypothesis in three experiments and found that (a) using combined optic flow and image structure, participants identified locations of previously perceived but currently occluded targets with great accuracy and stability (Experiment 1); (b) using combined optic flow and image structure information, participants identified hidden targets equally well with or without 30° orientation changes (Experiment 2); and (c) when the rolling was unseen, identification of hidden targets after orientation change became worse (Experiment 3). Furthermore, when rolling was unseen, although target identification was better when participants were told about the orientation change than when they were not told, performance was still worse than when there was no orientation change. Therefore, combined optic flow and image structure information, not mere knowledge about the rolling, enables accurate and stable perception despite orientation change. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  16. Modelling Lean and Green Supply Chain

    Science.gov (United States)

    Duarte, Susana Carla Vieira Lino Medina

    The success of an organization depends on the effective control of its supply chain. It is important to recognize new opportunities for organization and its supply chain. In the last few years the approach to lean, agile, resilient and green supply chain paradigms has been addressed in the scientific literature. Research in this field shows that the integration of these concepts revealed some contradictions among so many paradigms. This thesis is mainly focused on the lean and green approaches. Thirteen different management frameworks, embodied in awards, standards and tools were studied to understand if they could contribute for the modelling process of a lean and green approach. The study reveals a number of categories that are common in most management frameworks, providing adequate conditions for a lean and green supply chain transformation. A conceptual framework for the evaluation of a lean and green organization`s supply chain was proposed. The framework considers six key criteria, namely, leadership, people, strategic planning, stakeholders, processes and results. It was proposed an assessment method considering a criteria score for each criterion. The purpose is to understand how lean and green supply chain can be compatible, using principles, practices, techniques or tools (i.e. elements) that support both, a lean and a green approach, in all key criteria. A case study in the automotive upstream supply chain was performed to understand more deeply if the elements proposed for the conceptual framework could be implemented in a real-scenario. Based on the conceptual framework and the case study, a roadmap to achieve a lean-green transformation is presented. The proposed roadmap revealed its contribution to the understanding on how and when an organization`s supply chain should apply the lean and green elements. This study is relevant to practice, as it may assist managers in the adoption of a lean and green supply chain approach, giving insights for the

  17. Logistic chain modelling

    NARCIS (Netherlands)

    Slats, P.A.; Bhola, B.; Evers, J.J.M.; Dijkhuizen, G.

    1995-01-01

    Logistic chain modelling is very important in improving the overall performance of the total logistic chain. Logistic models provide support for a large range of applications, such as analysing bottlenecks, improving customer service, configuring new logistic chains and adapting existing chains to

  18. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  19. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  20. Polyneutron Chain Reactions

    International Nuclear Information System (INIS)

    John C. Fisher

    2000-01-01

    Although helium atoms do not form molecules, a sufficiently large number will bind into a stable liquid droplet. A comparable situation is expected for neutrons, with a sufficiently large number binding into a stable droplet of neutron matter. Such polyneutron droplets can be viewed as isotopes of an element with nuclear charge Z=0, tentatively denoted neutrium, symbol Nt. Because of the relatively weak binding of neutrons compared with that of a mix of neutrons and protons, the minimum number of neutrons required for stability of a droplet is fairly large. Early estimates of ∼60 may be reduced to a dozen or so by the BCS pairing interaction. The Nt entries with N≥12 are new to the table of isotopes. Because all of them are beta-unstable, none is expected to persist as a free particle. Yet, some may occasionally be produced by means to be described below, and it is of interest to examine their decay chains and their interactions with charged nuclei to ascertain how their presence might be revealed. Although these reactions are interesting, they cannot be taken seriously without identifying a source for the initial Nt isotope that begins the chain. Here, we consider possible interactions between 16 O and A Nt. Although there is no strong interaction between them, we can expect a very weak residual attraction that can form a loosely bound 16 O A Nt nuclear molecule. This is not a compound nucleus in the usual sense because, considered as fluids, the 16 O and A Nt droplets are immiscible. For a droplet with fewer than about 60 neutrons, beta decay of A Nt is prevented by the buildup of Coulomb energy associated with transforming A Nt into A H in close proximity to 16 O. Thus, it is possible that 16 O A Nt molecules can persist indefinitely and that a few of them may be present in ordinary water as supermassive oxygen nuclei. Because the binding of these molecules is weak, the A Nt component can tunnel to an adjacent nucleus, and if the adjacent nucleus is 18 O, a

  1. Sustainable transformation

    DEFF Research Database (Denmark)

    Andersen, Nicolai Bo

    This paper is about sustainable transformation with a particular focus on listed buildings. It is based on the notion that sustainability is not just a question of energy conditions, but also about the building being robust. Robust architecture means that the building can be maintained and rebuilt......, that it can be adapted to changing functional needs, and that it has an architectural and cultural value. A specific proposal for a transformation that enhances the architectural qualities and building heritage values of an existing building forms the empirical material, which is discussed using different...... theoretical lenses. It is proposed that three parameters concerning the ꞌtransformabilityꞌ of the building can contribute to a more nuanced understanding of sustainable transformation: technical aspects, programmatic requirements and narrative value. It is proposed that the concept of ꞌsustainable...

  2. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    , as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  3. Experimental discovery of nodal chains

    Science.gov (United States)

    Yan, Qinghui; Liu, Rongjuan; Yan, Zhongbo; Liu, Boyuan; Chen, Hongsheng; Wang, Zhong; Lu, Ling

    2018-05-01

    Three-dimensional Weyl and Dirac nodal points1 have attracted widespread interest across multiple disciplines and in many platforms but allow for few structural variations. In contrast, nodal lines2-4 can have numerous topological configurations in momentum space, forming nodal rings5-9, nodal chains10-15, nodal links16-20 and nodal knots21,22. However, nodal lines are much less explored because of the lack of an ideal experimental realization23-25. For example, in condensed-matter systems, nodal lines are often fragile to spin-orbit coupling, located away from the Fermi level, coexist with energy-degenerate trivial bands or have a degeneracy line that disperses strongly in energy. Here, overcoming all these difficulties, we theoretically predict and experimentally observe nodal chains in a metallic-mesh photonic crystal having frequency-isolated linear band-touching rings chained across the entire Brillouin zone. These nodal chains are protected by mirror symmetry and have a frequency variation of less than 1%. We use angle-resolved transmission measurements to probe the projected bulk dispersion and perform Fourier-transformed field scans to map out the dispersion of the drumhead surface state. Our results establish an ideal nodal-line material for further study of topological line degeneracies with non-trivial connectivity and consequent wave dynamics that are richer than those in Weyl and Dirac materials.

  4. Fractional and hidden magnetic excitations in f-electron metal Yb2Pt2Pb

    Science.gov (United States)

    Zaliznyak, Igor

    Quantum states with fractionalized excitations such as spinons in one-dimensional chains are commonly viewed as belonging to the domain of S=1/2 spin systems. However, recent experiments on the quantum antiferromagnet Yb2Pt2Pb, part of a large family of R2T2X (R=rare earth, T=transition metal, X=main group) materials spectacularly disqualify this opinion. The results show that spinons can also emerge in an f-electron system with strong spin-orbit coupling, where magnetism is mainly associated with large and anisotropic orbital moment. Here, the competition of several high-energy interactions Coulomb repulsion, spin-orbit coupling, crystal field, and the peculiar crystal structure, which combines low dimensionality and geometrical frustration, lead to the emergence, at low energy, of an effective spin-1/2, purely quantum Hamiltonian. Consequently, it produces unusual spin-liquid states and fractional excitations enabled by the inherently quantum mechanical nature of the moments. The emergent quantum spins bear the unique birthmark of their unusual origin in that they only lead to measurable longitudinal magnetic fluctuations, while the transverse excitations such as spin waves remain invisible to scattering experiments. Similarlyhidden would be transverse magnetic ordering, although it would have visible excitations. The rich magnetic phase diagram of Yb2Pt2Pb is suggestive of the existence of hidden-order phases, while the recent experiments indeed reveal the dark magnon, a hidden excitation in the saturated ferromagnetic (FM) phase of Yb2Pt2Pb. Unlike copper-based spin-1/2 chains, where the magnon in the FM state accounts for the full spectral weight of the zero-field spinon continuum, in the spin-orbital chains in Yb2Pt2Pb it is 100 times, or more weaker. It thus presents an example of dark magnon matter\\x9D, whose Hamiltonian is that of the effective spin-1/2 chain, but whose coupling to magnetic field, the physical probe at our disposal, is vanishingly small

  5. Evaluating the Security of the Global Containerized Supply Chain

    National Research Council Canada - National Science Library

    Willis, Henry H; Ortiz, David S

    2004-01-01

    The global supply chain is the network of suppliers, manufacturing centers, warehouses, distribution centers, and retail outlets that transforms raw materials into finished products and delivers them to consumers...

  6. Gauge mediation scenario with hidden sector renormalization in MSSM

    International Nuclear Information System (INIS)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-01-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5 minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  7. Gauge mediation scenario with hidden sector renormalization in MSSM

    Science.gov (United States)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-02-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5¯ minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  8. Applications of hidden symmetries to black hole physics

    International Nuclear Information System (INIS)

    Frolov, Valeri

    2011-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  9. Discovering Hidden Controlling Parameters using Data Analytics and Dimensional Analysis

    Science.gov (United States)

    Del Rosario, Zachary; Lee, Minyong; Iaccarino, Gianluca

    2017-11-01

    Dimensional Analysis is a powerful tool, one which takes a priori information and produces important simplifications. However, if this a priori information - the list of relevant parameters - is missing a relevant quantity, then the conclusions from Dimensional Analysis will be incorrect. In this work, we present novel conclusions in Dimensional Analysis, which provide a means to detect this failure mode of missing or hidden parameters. These results are based on a restated form of the Buckingham Pi theorem that reveals a ridge function structure underlying all dimensionless physical laws. We leverage this structure by constructing a hypothesis test based on sufficient dimension reduction, allowing for an experimental data-driven detection of hidden parameters. Both theory and examples will be presented, using classical turbulent pipe flow as the working example. Keywords: experimental techniques, dimensional analysis, lurking variables, hidden parameters, buckingham pi, data analysis. First author supported by the NSF GRFP under Grant Number DGE-114747.

  10. Supersymmetry, p-brane duality, and hidden spacetime dimensions

    International Nuclear Information System (INIS)

    Bars, I.

    1996-01-01

    A global superalgebra with 32 supercharges and all possible central extensions is studied in order to extract some general properties of duality and hidden dimensions in a theory that treats p-branes democratically. The maximal number of dimensions is 12, with signature (10,2), containing one space and one time dimension that are hidden from the point of view of perturbative ten-dimensional string theory or its compactifications. When the theory is compactified on R d-1,1 circle-times T c+1,1 with d+c+2=12, there are isometry groups that relate to the hidden dimensions as well as to duality. Their combined intersecting classification schemes provide some properties of nonperturbative states and their couplings. copyright 1996 The American Physical Society

  11. Nonlinear-drifted Brownian motion with multiple hidden states for remaining useful life prediction of rechargeable batteries

    Science.gov (United States)

    Wang, Dong; Zhao, Yang; Yang, Fangfang; Tsui, Kwok-Leung

    2017-09-01

    Brownian motion with adaptive drift has attracted much attention in prognostics because its first hitting time is highly relevant to remaining useful life prediction and it follows the inverse Gaussian distribution. Besides linear degradation modeling, nonlinear-drifted Brownian motion has been developed to model nonlinear degradation. Moreover, the first hitting time distribution of the nonlinear-drifted Brownian motion has been approximated by time-space transformation. In the previous studies, the drift coefficient is the only hidden state used in state space modeling of the nonlinear-drifted Brownian motion. Besides the drift coefficient, parameters of a nonlinear function used in the nonlinear-drifted Brownian motion should be treated as additional hidden states of state space modeling to make the nonlinear-drifted Brownian motion more flexible. In this paper, a prognostic method based on nonlinear-drifted Brownian motion with multiple hidden states is proposed and then it is applied to predict remaining useful life of rechargeable batteries. 26 sets of rechargeable battery degradation samples are analyzed to validate the effectiveness of the proposed prognostic method. Moreover, some comparisons with a standard particle filter based prognostic method, a spherical cubature particle filter based prognostic method and two classic Bayesian prognostic methods are conducted to highlight the superiority of the proposed prognostic method. Results show that the proposed prognostic method has lower average prediction errors than the particle filter based prognostic methods and the classic Bayesian prognostic methods for battery remaining useful life prediction.

  12. Analysing the hidden curriculum: use of a cultural web.

    Science.gov (United States)

    Mossop, Liz; Dennick, Reg; Hammond, Richard; Robbé, Iain

    2013-02-01

    Major influences on learning about medical professionalism come from the hidden curriculum. These influences can contribute positively or negatively towards the professional enculturation of clinical students. The fact that there is no validated method for identifying the components of the hidden curriculum poses problems for educators considering professionalism. The aim of this study was to analyse whether a cultural web, adapted from a business context, might assist in the identification of elements of the hidden curriculum at a UK veterinary school. A qualitative approach was used. Seven focus groups consisting of three staff groups and four student groups were organised. Questioning was framed using the cultural web, which is a model used by business owners to assess their environment and consider how it affects their employees and customers. The focus group discussions were recorded, transcribed and analysed thematically using a combination of a priori and emergent themes. The cultural web identified elements of the hidden curriculum for both students and staff. These included: core assumptions; routines; rituals; control systems; organisational factors; power structures, and symbols. Discussions occurred about how and where these issues may affect students' professional identity development. The cultural web framework functioned well to help participants identify elements of the hidden curriculum. These aspects aligned broadly with previously described factors such as role models and institutional slang. The influence of these issues on a student's development of a professional identity requires discussion amongst faculty staff, and could be used to develop learning opportunities for students. The framework is promising for the analysis of the hidden curriculum and could be developed as an instrument for implementation in other clinical teaching environments. © Blackwell Publishing Ltd 2013.

  13. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  14. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  15. Low-intensity interference effects and hidden-variable theories

    Energy Technology Data Exchange (ETDEWEB)

    Buonomano, V [Universidade Estadual de Campinas (Brazil). Inst. de Matematica

    1978-05-11

    The double-slit interference experiment and other similar experiments in the low-intensity limit (that is, one photon in the apparatus at a time) are examined in the spirit of Bell's work from the point of view of hidden-variable theories. It is found that there exists a class of hidden-variable theories which disagrees with quantum mechanics for a certain type of interference experiment. A manufactured conceptualization of this class, which is a particle view of interference, is described. An experiment, which appears to be feasible, is proposed to examine this disagreement.

  16. Application of Hidden Markov Models in Biomolecular Simulations.

    Science.gov (United States)

    Shukla, Saurabh; Shamsi, Zahra; Moffett, Alexander S; Selvam, Balaji; Shukla, Diwakar

    2017-01-01

    Hidden Markov models (HMMs) provide a framework to analyze large trajectories of biomolecular simulation datasets. HMMs decompose the conformational space of a biological molecule into finite number of states that interconvert among each other with certain rates. HMMs simplify long timescale trajectories for human comprehension, and allow comparison of simulations with experimental data. In this chapter, we provide an overview of building HMMs for analyzing bimolecular simulation datasets. We demonstrate the procedure for building a Hidden Markov model for Met-enkephalin peptide simulation dataset and compare the timescales of the process.

  17. Enhanced axion-photon coupling in GUT with hidden photon

    Science.gov (United States)

    Daido, Ryuji; Takahashi, Fuminobu; Yokozaki, Norimi

    2018-05-01

    We show that the axion coupling to photons can be enhanced in simple models with a single Peccei-Quinn field, if the gauge coupling unification is realized by a large kinetic mixing χ = O (0.1) between hypercharge and unbroken hidden U(1)H. The key observation is that the U(1)H gauge coupling should be rather strong to induce such large kinetic mixing, leading to enhanced contributions of hidden matter fields to the electromagnetic anomaly. We find that the axion-photon coupling is enhanced by about a factor of 10-100 with respect to the GUT-axion models with E / N = 8 / 3.

  18. Hidden Neural Networks: A Framework for HMM/NN Hybrids

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric; Krogh, Anders Stærmose

    1997-01-01

    This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN is nor...... HMMs on TIMIT continuous speech recognition benchmarks. On the task of recognizing five broad phoneme classes an accuracy of 84% is obtained compared to 76% for a standard HMM. Additionally, we report a preliminary result of 69% accuracy on the TIMIT 39 phoneme task...

  19. Search for hidden Higgs decay in ATLAS detector

    International Nuclear Information System (INIS)

    Gabrielli, A.

    2013-01-01

    In this paper, a brief overview of the search for the Higgs boson in Hidden Valley models is given. Hidden Valley models predict Higgs decays to neutral particles, which can be also long lived with decay paths comparable to the LHC detectors dimensions. Decay final states consist of collimated leptons (Lepton Jets). Results are presented of a search for Higgs decays to long lived particles in the ATLAS detector at the LHC, based on 1.92 fb −1 data collected during 2011 at a 7TeV center-of-mass energy.

  20. Detecting Faults By Use Of Hidden Markov Models

    Science.gov (United States)

    Smyth, Padhraic J.

    1995-01-01

    Frequency of false alarms reduced. Faults in complicated dynamic system (e.g., antenna-aiming system, telecommunication network, or human heart) detected automatically by method of automated, continuous monitoring. Obtains time-series data by sampling multiple sensor outputs at discrete intervals of t and processes data via algorithm determining whether system in normal or faulty state. Algorithm implements, among other things, hidden first-order temporal Markov model of states of system. Mathematical model of dynamics of system not needed. Present method is "prior" method mentioned in "Improved Hidden-Markov-Model Method of Detecting Faults" (NPO-18982).

  1. From the solar system fo hidden cosmic structures

    Energy Technology Data Exchange (ETDEWEB)

    Benes, K

    1987-01-01

    The development of experimental astrophysics showed that in the evolution of planets, natural processes of a common nature take place. They include, e.g., radiogenic heat, the production of magmas, volcanic activity, degassing, etc. The solar system is a cosmic formation in an advanced stage of development and it is a realistic assumption that in the Galaxy other hidden planetary systems in various stages of development exist. The views on the possibility of the origination of life in other systems differ; life, however, is seen as a hidden property of cosmic matter. (M.D.).

  2. Sustainable transformation

    DEFF Research Database (Denmark)

    Andersen, Nicolai Bo

    This paper is about sustainable transformation with a particular focus on listed buildings. It is based on the notion that sustainability is not just a question of energy conditions, but also about the building being robust. Robust architecture means that the building can be maintained and rebuil...

  3. Transformer core

    NARCIS (Netherlands)

    Mehendale, A.; Hagedoorn, Wouter; Lötters, Joost Conrad

    2008-01-01

    A transformer core includes a stack of a plurality of planar core plates of a magnetically permeable material, which plates each consist of a first and a second sub-part that together enclose at least one opening. The sub-parts can be fitted together via contact faces that are located on either side

  4. Transformer core

    NARCIS (Netherlands)

    Mehendale, A.; Hagedoorn, Wouter; Lötters, Joost Conrad

    2010-01-01

    A transformer core includes a stack of a plurality of planar core plates of a magnetically permeable material, which plates each consist of a first and a second sub-part that together enclose at least one opening. The sub-parts can be fitted together via contact faces that are located on either side

  5. Superconducting transformer

    International Nuclear Information System (INIS)

    Murphy, J.H.

    1982-01-01

    A superconducting transformer having a winding arrangement that provides for current limitation when subjected to a current transient as well as more efficient utilization of radial spacing and winding insulation. Structural innovations disclosed include compressed conical shaped winding layers and a resistive matrix to promote rapid switching of current between parallel windings

  6. Transformation & Metamorphosis

    Science.gov (United States)

    Lott, Debra

    2009-01-01

    The sculptures of Canadian artist Brian Jungen are a great inspiration for a lesson on creating new forms. Jungen transforms found objects into unique creations without fully concealing their original form or purpose. Frank Stella's sculpture series, including "K.132,2007" made of stainless steel and spray paint, is another great example of…

  7. Transforming Society

    DEFF Research Database (Denmark)

    Enemark, Stig; Dahl Højgaard, Pia

    2017-01-01

    , was a result of transforming society from a feudal system to a capitalistic and market based economy. This story is interesting in itself - but it also provides a key to understanding the cadastral system of today. The system has evolved over time and now serves a whole range of functions in society. The paper...

  8. Sustainable Supply Chain Design

    DEFF Research Database (Denmark)

    Bals, Lydia; Tate, Wendy

    A significant conceptual and practical challenge is how to integrate triple bottom line (TBL; including economic, social and environmental) sustainability into global supply chains. Although this integration is necessary to slow down global resource depletion, understanding is limited of how...... to implement TBL goals across the supply chain. In supply chain design, the classic economic perspective still dominates, although the idea of the TBL is more widely disseminated. The purpose of this research is to add to the sustainable supply chain management literature (SSCM) research agenda...... by incorporating the physical chain, and the (information and financial) support chains into supply chain design. This manuscript tackles issues of what the chains are designed for and how they are designed structurally. Four sustainable businesses are used as illustrative case examples of innovative supply chain...

  9. The hidden fermions in Z(2) theories

    International Nuclear Information System (INIS)

    Srednicki, M.

    1983-01-01

    Low dimensional Z(2) gauge theories have been rewritten in terms of locally coupled fermionic degrees of freedom by means of the Jordan-Wigner transformation. In this paper it is shown that higher dimensional Z(2) gauge theories are also fermionic theories in disguise. The SML solution to the 1+1 dimension Ising model is reviewed. Psi operators are represented pictorially as arrows, psi 1 points to the left, psi 2 to the right, each site of H a multiple of two operators. The 2+1 dimension Ising model is then considered. A fermion plaquette operator is introduced as the generator of a gauge symmetry for the fermionic H. Findings in 1+1 and 2+1 are then applied to 3+1 dimensional Z(2) gauge theory. A construction of this lattice is undertaken. Psi formalism replaces sigma formalism, as it permits extremely simple duality transformations to be made on any Z(2) Hamiltonian. It is shown that the fermionic formalism will lead to new ideas in Z(2) theories

  10. Advertising Industry Chain Roles Reconstruction and Platform Transformation in Mobile Internet Era%移动互联网时代的广告产业链角色重构与平台化转型∗

    Institute of Scientific and Technical Information of China (English)

    段淳林; 李梦

    2015-01-01

    随着移动互联网时代的到来,我国广告产业的生存环境发生了剧烈变化。大数据与云计算的广泛应用使得程序化购买的广告模式对传统广告产业形成巨大冲击,本文将移动互联网时代的广告产业链作为研究对象,以广告主、广告媒体、广告公司、受众这四大广告活动的主体为切入点,通过分析各主体在此过程中的角色重构,揭示出未来广告产业将向程序化购买的DSP转型的发展趋势。%With the advent of the mobile Internet era, China's advertising industry living environment has changed dramatically. Procedural purchase causes a tremendous impact on traditional advertising industry in the background of big data and cloud services. The paper studies the advertising industry chain in the mobile Internet era, taking the four major campaigns of advertisers, advertising media, advertising companies, and audience as the starting point. It analyzes the role of each body in the process of reconstruction, and proposes the development trend of fu-ture purchase advertising industry.

  11. Hidden Pair of Supermassive Black Holes

    Science.gov (United States)

    Kohler, Susanna

    2015-08-01

    Could a pair of supermassive black holes (SMBHs) be lurking at the center of the galaxy Mrk 231? A recent study finds that this may be the case and the unique spectrum of this galaxy could be the key to discovering more hidden binary SMBH systems.Where Are the Binary Supermassive Black Holes?Its believed that most, if not all, galaxies have an SMBH at their centers. As two galaxies merge, the two SMBHs should evolve into a closely-bound binary system before they eventually merge. Given the abundance of galaxy mergers, we would expect to see the kinematic and visual signatures of these binary SMBHs among observed active galactic nuclei yet such evidence for sub-parsec binary SMBH systems remains scarce and ambiguous. This has led researchers to wonder: is there another way that we might detect these elusive systems?A collaboration led by Chang-Shuo Yan (National Astronomical Observatories, Chinese Academy of Sciences) thinks that there is. The group suggests that these systems might have distinct signatures in their optical-to-UV spectra, and they identify a system that might be just such a candidate: Mrk 231.A Binary CandidateProposed model of Mrk 231. Two supermassive black holes, each with their own mini-disk, orbit each other in the center of a circumbinary disk. The secondary black hole has cleared gap in the circumbinary disk as a result of its orbit around the primary black hole. [Yan et al. 2015]Mrk 231 is a galaxy with a disturbed morphology and tidal tails strong clues that it might be in the final stages of a galactic merger. In addition to these signs, Mrk 231 also has an unusual spectrum for a quasar: its continuum emission displays an unexpected drop in the near-UV band.Yan and her collaborators propose that the odd behavior of Mrk 231s spectrum can be explained if the center of the galaxy houses a pair of SMBHs each with its own mini accretion disk surrounded by a circumbinary accretion disk. As the secondary SMBH orbits the primary SMBH (with a

  12. Symmetry chains for the atomic shell model. I. Classification of symmetry chains for atomic configurations

    International Nuclear Information System (INIS)

    Gruber, B.; Thomas, M.S.

    1980-01-01

    In this article the symmetry chains for the atomic shell model are classified in such a way that they lead from the group SU(4l+2) to its subgroup SOsub(J)(3). The atomic configurations (nl)sup(N) transform like irreducible representations of the group SU(4l+2), while SOsub(J)(3) corresponds to total angular momentum in SU(4l+2). The defining matrices for the various embeddings are given for each symmetry chain that is obtained. These matrices also define the projection onto the weight subspaces for the corresponding subsymmetries and thus relate the various quantum numbers and determine the branching of representations. It is shown in this article that three (interrelated) symmetry chains are obtained which correspond to L-S coupling, j-j coupling, and a seniority dependent coupling. Moreover, for l<=6 these chains are complete, i.e., there are no other chains but these. In articles to follow, the symmetry chains that lead from the group SO(8l+5) to SOsub(J)(3) will be discussed, with the entire atomic shell transforming like an irreducible representation of SO(8l+5). The transformation properties of the states of the atomic shell will be determined according to the various symmetry chains obtained. The symmetry lattice discussed in this article forms a sublattice of the larger symmetry lattice with SO(8l+5) as supergroup. Thus the transformation properties of the states of the atomic configurations, according to the various symmetry chains discussed in this article, will be obtained too. (author)

  13. A Multiobjective Optimization Model in Automotive Supply Chain Networks

    Directory of Open Access Journals (Sweden)

    Abdolhossein Sadrnia

    2013-01-01

    Full Text Available In the new decade, green investment decisions are attracting more interest in design supply chains due to the hidden economic benefits and environmental legislative barriers. In this paper, a supply chain network design problem with both economic and environmental concerns is presented. Therefore, a multiobjective optimization model that captures the trade-off between the total logistics cost and CO2 emissions is proposed. With regard to the complexity of logistic networks, a new multiobjective swarm intelligence algorithm known as a multiobjective Gravitational search algorithm (MOGSA has been implemented for solving the proposed mathematical model. To evaluate the effectiveness of the model, a comprehensive set of numerical experiments is explained. The results obtained show that the proposed model can be applied as an effective tool in strategic planning for optimizing cost and CO2 emissions in an environmentally friendly automotive supply chain.

  14. Ground-state properties of a supersymmetric fermion chain

    International Nuclear Information System (INIS)

    Fendley, Paul; Hagendorf, Christian

    2011-01-01

    We analyze the ground state of a strongly interacting fermion chain with a supersymmetry. We conjecture a number of exact results, such as a hidden duality between weak and strong couplings. By exploiting a scale-free property of the perturbative expansions, we find exact expressions for the order parameters, yielding the critical exponents. We show that the ground state of this fermion chain and another model in the same universality class, the XYZ chain along a line of couplings, are both written in terms of the same polynomials. We demonstrate this explicitly for up to N = 24 sites and provide consistency checks for large N. These polynomials satisfy a recursion relation related to the Painlevé VI differential equation and, using a scale-free property of these polynomials, we derive a simple and exact formula for their N→∞ limit

  15. Spin chain and duality between string theory and gauge theories

    International Nuclear Information System (INIS)

    Gorskij, A.S.

    2005-01-01

    One discusses a string pattern hidden by the integrable spin chains describing the evolution equations in the Yang- Mills theory. It is shown that the single-loop correction to the dilatation operator in N = 4 theory may be expressed in terms of two-point correlation functions at two-dimensional world surface of a string. Correspondence between the Neumann integrable systems and the spin chains leads us to believe that passing to the finite values of the coupling constants in the gauge theory corresponds to the quantization of the world surface. The model of string bits for the digitized world surface is assumed to be in line with representation of the integrable spin chains in terms of the separable variables [ru

  16. Explicit solutions for exit-only radioactive decay chains

    International Nuclear Information System (INIS)

    Yuan, Ding; Kernan, Warnick

    2007-01-01

    In this study, we extended Bateman's [Proc. Cambridge Philos. Soc. 15, 423 (1910)] original work for solving radioactive decay chains and explicitly derived analytic solutions for generic exit-only radioactive decay problems under given initial conditions. Instead of using the conventional Laplace transform for solving Bateman's equations, we used a much simpler algebraic approach. Finally, we discuss methods of breaking down certain classes of large decay chains into collections of simpler chains for easy handling

  17. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  18. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    International Nuclear Information System (INIS)

    Itoh, H.; Okada, N.; Yamashita, T.

    2007-01-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden. (author)

  19. Discrete transforms

    CERN Document Server

    Firth, Jean M

    1992-01-01

    The analysis of signals and systems using transform methods is a very important aspect of the examination of processes and problems in an increasingly wide range of applications. Whereas the initial impetus in the development of methods appropriate for handling discrete sets of data occurred mainly in an electrical engineering context (for example in the design of digital filters), the same techniques are in use in such disciplines as cardiology, optics, speech analysis and management, as well as in other branches of science and engineering. This text is aimed at a readership whose mathematical background includes some acquaintance with complex numbers, linear differen­ tial equations, matrix algebra, and series. Specifically, a familiarity with Fourier series (in trigonometric and exponential forms) is assumed, and an exposure to the concept of a continuous integral transform is desirable. Such a background can be expected, for example, on completion of the first year of a science or engineering degree cour...

  20. XML Transformations

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2012-04-01

    Full Text Available XSLT style sheets are designed to transform the XML documents into something else. The two most popular parsers of the moment are the Document Object Model (DOM and the Simple API for XML (SAX. DOM is an official recommendation of the W3C (available at http://www.w3.org/TR/REC-DOM-Level-1, while SAX is a de facto standard. A good parser should be fast, space efficient, rich in functionality and easy to use.

  1. RF transformer

    Science.gov (United States)

    Smith, James L.; Helenberg, Harold W.; Kilsdonk, Dennis J.

    1979-01-01

    There is provided an improved RF transformer having a single-turn secondary of cylindrical shape and a coiled encapsulated primary contained within the secondary. The coil is tapered so that the narrowest separation between the primary and the secondary is at one end of the coil. The encapsulated primary is removable from the secondary so that a variety of different capacity primaries can be utilized with one secondary.

  2. Transformative Agency

    DEFF Research Database (Denmark)

    Majgaard, Klaus

    The purpose of this paper is to enhance the conceptual understanding of the mediatory relationship between paradoxes on an organizational and an individual level. It presents a concept of agency that comprises and mediates between a structural and individual pole. The constitution of this agency ...... is achieved through narrative activity that oscillates between the poles and transforms paradoxes through the configuration of plots and metaphors. Empirical cases are introduced in order to illustrate the implications of this understanding....

  3. On the hidden maxwell superalgebra underlying D = 4 supergravity

    Energy Technology Data Exchange (ETDEWEB)

    Penafiel, D.M. [Departamento de Fisica, Universidad de Concepcion (Chile); DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy); Ravera, L. [DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy)

    2017-09-15

    In this work, we expand the hidden AdS-Lorentz superalgebra underlying D = 4 supergravity, reaching a (hidden) Maxwell superalgebra. The latter can be viewed as an extension involving cosmological constant of the superalgebra underlying D = 4 supergravity in flat spacetime. We write the Maurer-Cartan equations in this context and we find some interesting extensions of the antisymmetric 3-form A{sup (3)} appearing in the Free Differential Algebra in Minkowski space. The structure of Free Differential Algebras is obtained by considering the zero curvature equations. We write the parametrization of A{sup (3)} in terms of 1-forms and we rend the topological features of its extensions manifest. We interestingly find out that the structure of these extensions, and consequently the structure of the corresponding boundary contribution dA{sup (3)}, strongly depends on the form of the extra fermionic generator appearing in the hidden Maxwell superalgebra. The model we develop in this work is defined in an enlarged superspace with respect to the ordinary one, and the extra bosonic and fermionic 1-forms required for the closure of the hidden Maxwell superalgebra must be considered as physical fields in this enlarged superspace. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  4. Generalized inequalities for quantum correlations with hidden variables

    International Nuclear Information System (INIS)

    Vinduska, M.

    1991-01-01

    Renowned inequalities for quantum correlations are generalized for the case when quantum system cannot be described with an absolute independent measure of the probability. Such a formulation appears to be suitable for the formulation of the hidden variables theory in terms of non-Euclidean geometry. 10 refs

  5. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated

  6. Measurement problem and local hidden variables with entangled photons

    Directory of Open Access Journals (Sweden)

    Muchowski Eugen

    2017-12-01

    Full Text Available It is shown that there is no remote action with polarization measurements of photons in singlet state. A model is presented introducing a hidden parameter which determines the polarizer output. This model is able to explain the polarization measurement results with entangled photons. It is not ruled out by Bell’s Theorem.

  7. The incompatibility between local hidden variable theories and the ...

    Indian Academy of Sciences (India)

    I discuss in detail the result that the Bell's inequalities derived in the context of local hidden variable theories for discrete quantized observables can be satisfied only if a fundamental conservation law is violated on the average. This result shows that such theories are physically nonviable, and makes the demarcating criteria ...

  8. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  9. A hidden bias in a common calorimeter calibration scheme

    International Nuclear Information System (INIS)

    Lincoln, Don; Morrow, Greg; Kasper, Peter

    1994-01-01

    In this paper, a common calorimeter calibration scheme is explored and a hidden bias found. Since this bias mimics a non-linearity in response in the calorimeter, it must be understood and removed from the calibration before true non-linearities are investigated. The effect and its removal are explored and understood through straightforward calculus and algebra. ((orig.))

  10. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  11. Crisis Entrepreneurs and Hidden Crises : Illustrative Examples of Interactional

    NARCIS (Netherlands)

    Prof. Cees van Woerkum; dr. Annette Klarenbeek

    2012-01-01

    We examine the ways in which a hidden crisis can be exposed from a communication point of view. In which way can organisations create general awareness of a crisis and try to understand the dynamic nature of interactions? With the help of discourse analysis, we have examined the interactional

  12. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...... functions are also discussed....

  13. Duality and hidden symmetries in interacting particle systems

    NARCIS (Netherlands)

    Giardinà, C.; Kurchan, J.; Redig, F.H.J.; Vafayi, K.

    2009-01-01

    In the context of Markov processes, both in discrete and continuous setting, we show a general relation between duality functions and symmetries of the generator. If the generator can be written in the form of a Hamiltonian of a quantum spin system, then the "hidden" symmetries are easily derived.

  14. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving ...

  15. Is There Hidden Potential for Rural Population Growth in Sweden?

    Science.gov (United States)

    Niedomysl, Thomas; Amcoff, Jan

    2011-01-01

    Rural depopulation is a concern in many countries, and various policy initiatives have been taken to combat such trends. This article examines whether hidden potential for rural population growth can be found in Sweden. If such potential exists, it implies that the development prospects for many rural areas are not as unpromising as they may seem…

  16. Optimisation of Hidden Markov Model using Baum–Welch algorithm

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 126; Issue 1. Optimisation of Hidden Markov Model using Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya. J C Joshi Tankeshwar Kumar Sunita Srivastava Divya Sachdeva. Volume 126 Issue 1 February 2017 ...

  17. Hidden Markov Model for quantitative prediction of snowfall

    Indian Academy of Sciences (India)

    A Hidden Markov Model (HMM) has been developed for prediction of quantitative snowfall in Pir-Panjal and Great Himalayan mountain ranges of Indian Himalaya. The model predicts snowfall for two days in advance using daily recorded nine meteorological variables of past 20 winters from 1992–2012. There are six ...

  18. Light hidden-sector U(1)s in string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-15

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  19. Book Review: "Hidden Markov Models for Time Series: An ...

    African Journals Online (AJOL)

    Hidden Markov Models for Time Series: An Introduction using R. by Walter Zucchini and Iain L. MacDonald. Chapman & Hall (CRC Press), 2009. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/saaj.v10i1.61717 · AJOL African Journals Online.

  20. TeraHertz imaging of hidden paint layers on canvas

    NARCIS (Netherlands)

    Adam, A.J.L.; Planken, P.C.M.; Meloni, S.; Dik, J.

    2009-01-01

    We show terahertz reflection images of hidden paint layers in a painting on canvas and compare the results with X-ray Radiography and Infrared Reflectography. Our terahertz measurements show strong reflections from both the canvas/paint interface and from the raw umber/lead white interface,

  1. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  2. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  3. Hidden and generalized conformal symmetry of Kerr–Sen spacetimes

    International Nuclear Information System (INIS)

    Ghezelbash, A M; Siahaan, H M

    2013-01-01

    It is recently conjectured that generic non-extremal Kerr black hole could be holographically dual to a hidden conformal field theory (CFT) in two dimensions. Moreover, it is known that there are two CFT duals (pictures) to describe the charged rotating black holes which correspond to angular momentum J and electric charge Q of the black hole. Furthermore these two pictures can be incorporated by the CFT duals (general picture) that are generated by SL(2,Z) modular group. The general conformal structure can be revealed by looking at charged scalar wave equation in some appropriate values of frequency and charge. In this regard, we consider the wave equation of a charged massless scalar field in the background of Kerr–Sen black hole and show that in the ‘near region’, the wave equation can be reproduced by the Casimir operator of a local SL(2,R) L ×SL(2,R) R hidden conformal symmetry. We find the exact agreement between macroscopic and microscopic physical quantities like entropy and absorption cross section of scalars for Kerr–Sen black hole. We then find an extension of vector fields that in turn yields an extended local family of SL(2,R) L ×SL(2,R) R hidden conformal symmetry, parameterized by one parameter. For some special values of the parameter, we find a copy of SL(2,R) hidden conformal algebra for the charged Gibbons–Maeda–Garfinkle–Horowitz–Strominger black hole in the strong deflection limit. (paper)

  4. Light hidden-sector U(1)s in string compactifications

    International Nuclear Information System (INIS)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-01

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  5. Securing Localization With Hidden and Mobile Base Stations

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Srivastava, Mani; Cagalj, Mario

    2006-01-01

    localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure nodecentric...

  6. Optimal Number of States in Hidden Markov Models and its ...

    African Journals Online (AJOL)

    In this paper, Hidden Markov Model is applied to model human movements as to facilitate an automatic detection of the same. A number of activities were simulated with the help of two persons. The four movements considered are walking, sitting down-getting up, fall while walking and fall while standing. The data is ...

  7. Book review: Troubling possibility, hidden fires and secret drawers ...

    African Journals Online (AJOL)

    Book review: Troubling possibility, hidden fires and secret drawers: Tiyambe Zeleza's smouldering charcoal. H.F. Ross. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL.

  8. Charm and Hidden Charm Scalar Resonances in Nuclear Matter

    NARCIS (Netherlands)

    Tolos, Laura; Molina, Raquel; Gamermann, Daniel; Oset, Eulogio

    2009-01-01

    We study the properties of the scalar charm resonances D(s0)(2317) and D(0)(2400), and the theoretical hidden charm state X(3700) in nuclear matter. We find that for the D(s0)(2317) and X(3700) resonances, with negligible and small width at zero density, respectively, the width becomes about 100 MeV

  9. Hidden Markov model for improved ultrasound-based presence detection

    NARCIS (Netherlands)

    Jaramillo Garcia, P.A.; Linnartz, J.P.M.G.

    2015-01-01

    Adaptive lighting systems typically use a presence detector to save energy by switching off lights in unoccupied rooms. However, it is highly annoying when lights are erroneously turned off while a user is present (false negative, FN). This paper focuses on the estimation of presence, using a Hidden

  10. Job Clubs: Getting into the Hidden Labor Market.

    Science.gov (United States)

    Kimeldorf, Martin; Tornow, Janice A.

    1984-01-01

    A job club approach for secondary disabled youth focuses on mastering job seeking skills by behaviorally sequenced steps learned in situational experiences within a self-help group process framework. Students learn to penetrate the hidden job market, to use social networking via the telephone, and to participate successfully in job interviews. (CL)

  11. Unpacking the Hidden Efficacies of Learning in Productive Failure

    Science.gov (United States)

    Hung, David; Chen, Victor; Lim, Seo Hong

    2009-01-01

    This paper describes a framework for learning where learners undergo experimentations with the phenomena at hand according to progressive and staged goals. Bowling is used as a case study in this paper. The premise for experimentations is that learners can experience hidden efficacies, including the formation of "bad habits." A distinction is made…

  12. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  13. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  14. Qualtiy Issues in Project configured Supply Chains

    DEFF Research Database (Denmark)

    Koch, Christian; Larsen, Casper Schultz

    by configuration by project. In such a setting creating value for the customers and the enterprises becomes dependent of the ability to organise and coordinate in the supply chains. That the configuration is not always successful can be demonstrated by studying the emergence of failures occurring in the supply...... observation period. These were compiled and analysed. The economic consequences are calculated to be 8% of the production costs. The analysis of relations in the supply chain both show relations to materials and knowledge chains and their interaction. Most of the failures were generated in the knowledge...... stream and then occasionally transform into the material stream. The paper proposes initiatives to strengthen partnerships in supply chains and especially at engineer to order production. The contradiction between the permanent enterprise organisation potentially capable of handling purchasing...

  15. Quantum communication through an unmodulated spin chain

    International Nuclear Information System (INIS)

    Bose, Sougato

    2003-01-01

    We propose a scheme for using an unmodulated and unmeasured spin chain as a channel for short distance quantum communications. The state to be transmitted is placed on one spin of the chain and received later on a distant spin with some fidelity. We first obtain simple expressions for the fidelity of quantum state transfer and the amount of entanglement sharable between any two sites of an arbitrary Heisenberg ferromagnet using our scheme. We then apply this to the realizable case of an open ended chain with nearest neighbor interactions. The fidelity of quantum state transfer is obtained as an inverse discrete cosine transform and as a Bessel function series. We find that in a reasonable time, a qubit can be directly transmitted with better than classical fidelity across the full length of chains of up to 80 spins. Moreover, our channel allows distillable entanglement to be shared over arbitrary distances

  16. The Global Value Chain

    DEFF Research Database (Denmark)

    Sørensen, Olav Jull

    The conference paper aims to develop the global value chain concept by including corporate internal value adding activities and competition to the basic framework in order to turn the global value chain into a strategic management tool......The conference paper aims to develop the global value chain concept by including corporate internal value adding activities and competition to the basic framework in order to turn the global value chain into a strategic management tool...

  17. Predicting Hidden Links in Supply Networks

    Directory of Open Access Journals (Sweden)

    A. Brintrup

    2018-01-01

    Full Text Available Manufacturing companies often lack visibility of the procurement interdependencies between the suppliers within their supply network. However, knowledge of these interdependencies is useful to plan for potential operational disruptions. In this paper, we develop the Supply Network Link Predictor (SNLP method to infer supplier interdependencies using the manufacturer’s incomplete knowledge of the network. SNLP uses topological data to extract relational features from the known network to train a classifier for predicting potential links. Using a test case from the automotive industry, four features are extracted: (i number of existing supplier links, (ii overlaps between supplier product portfolios, (iii product outsourcing associations, and (iv likelihood of buyers purchasing from two suppliers together. Naïve Bayes and Logistic Regression are then employed to predict whether these features can help predict interdependencies between two suppliers. Our results show that these features can indeed be used to predict interdependencies in the network and that predictive accuracy is maximised by (i and (iii. The findings give rise to the exciting possibility of using data analytics for improving supply chain visibility. We then proceed to discuss to what extent such approaches can be adopted and their limitations, highlighting next steps for future work in this area.

  18. Baryon states with hidden charm in the extended local hidden gauge approach

    International Nuclear Information System (INIS)

    Uchino, T.; Oset, E.; Liang, Wei-Hong

    2016-01-01

    The s-wave interaction of anti DΛ c , anti DΣ c , anti D * Λ c , anti D * Σ c and anti DΣ c * , anti D * Σ c * , is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ c - anti D * Σ c with J = 1/2, and two of anti DΣ c * - anti D * Σ c * with J = 3/2. Moreover, we find a anti D * Σ c resonance which couples to the anti DΛ c channel and one spin degenerated bound state of anti D * Σ c * with J = 1/2,5/2. (orig.)

  19. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  20. Quantum decoration transformation for spin models

    Energy Technology Data Exchange (ETDEWEB)

    Braz, F.F.; Rodrigues, F.C.; Souza, S.M. de; Rojas, Onofre, E-mail: ors@dfi.ufla.br

    2016-09-15

    It is quite relevant the extension of decoration transformation for quantum spin models since most of the real materials could be well described by Heisenberg type models. Here we propose an exact quantum decoration transformation and also showing interesting properties such as the persistence of symmetry and the symmetry breaking during this transformation. Although the proposed transformation, in principle, cannot be used to map exactly a quantum spin lattice model into another quantum spin lattice model, since the operators are non-commutative. However, it is possible the mapping in the “classical” limit, establishing an equivalence between both quantum spin lattice models. To study the validity of this approach for quantum spin lattice model, we use the Zassenhaus formula, and we verify how the correction could influence the decoration transformation. But this correction could be useless to improve the quantum decoration transformation because it involves the second-nearest-neighbor and further nearest neighbor couplings, which leads into a cumbersome task to establish the equivalence between both lattice models. This correction also gives us valuable information about its contribution, for most of the Heisenberg type models, this correction could be irrelevant at least up to the third order term of Zassenhaus formula. This transformation is applied to a finite size Heisenberg chain, comparing with the exact numerical results, our result is consistent for weak xy-anisotropy coupling. We also apply to bond-alternating Ising–Heisenberg chain model, obtaining an accurate result in the limit of the quasi-Ising chain.

  1. Quantum decoration transformation for spin models

    International Nuclear Information System (INIS)

    Braz, F.F.; Rodrigues, F.C.; Souza, S.M. de; Rojas, Onofre

    2016-01-01

    It is quite relevant the extension of decoration transformation for quantum spin models since most of the real materials could be well described by Heisenberg type models. Here we propose an exact quantum decoration transformation and also showing interesting properties such as the persistence of symmetry and the symmetry breaking during this transformation. Although the proposed transformation, in principle, cannot be used to map exactly a quantum spin lattice model into another quantum spin lattice model, since the operators are non-commutative. However, it is possible the mapping in the “classical” limit, establishing an equivalence between both quantum spin lattice models. To study the validity of this approach for quantum spin lattice model, we use the Zassenhaus formula, and we verify how the correction could influence the decoration transformation. But this correction could be useless to improve the quantum decoration transformation because it involves the second-nearest-neighbor and further nearest neighbor couplings, which leads into a cumbersome task to establish the equivalence between both lattice models. This correction also gives us valuable information about its contribution, for most of the Heisenberg type models, this correction could be irrelevant at least up to the third order term of Zassenhaus formula. This transformation is applied to a finite size Heisenberg chain, comparing with the exact numerical results, our result is consistent for weak xy-anisotropy coupling. We also apply to bond-alternating Ising–Heisenberg chain model, obtaining an accurate result in the limit of the quasi-Ising chain.

  2. Electrical transformer handbook

    Energy Technology Data Exchange (ETDEWEB)

    Hurst, R.W.; Horne, D. (eds.)

    2005-07-01

    This handbook is a valuable user guide intended for electrical engineering and maintenance personnel, electrical contractors and electrical engineering students. It provides current information on techniques and technologies that can help extend the life of transformers. It discusses transformer testing, monitoring, design, commissioning, retrofitting and other elements involved in keeping electrical transformers in safe and efficient operation. It demonstrates how a power transformer can be put to use and common problems faced by owners. In addition to covering control techniques, testing and maintenance procedures, this handbook covers the power transformer; control electrical power transformer; electrical power transformer; electrical theory transformer; used electrical transformer; down electrical step transformer; electrical manufacturer transformer; electrical picture transformer; electrical transformer work; electrical surplus transformer; current transformer; step down transformer; voltage transformer; step up transformer; isolation transformer; low voltage transformer; toroidal transformer; high voltage transformer; and control power transformer. The handbook includes articles from leading experts on overcurrent protection of transformers; ventilated dry-type transformers; metered load factors for low-voltage, and dry-type transformers in buildings. The maintenance of both dry-type or oil-filled transformers was discussed with reference to sealing, gaskets, oils, moisture and testing. The adoption of dynamic load practices was also discussed along with the reclamation or recycling of used lube oil, transformer dielectric fluids and aged solid insulation. A buyer's guide and directory of transformer manufacturers and suppliers was also included. refs., tabs., figs.

  3. Chain transitivity in hyperspaces

    International Nuclear Information System (INIS)

    Fernández, Leobardo; Good, Chris; Puljiz, Mate; Ramírez, Ártico

    2015-01-01

    Given a non-empty compact metric space X and a continuous function f: X → X, we study the dynamics of the induced maps on the hyperspace of non-empty compact subsets of X and on various other invariant subspaces thereof, in particular symmetric products. We show how some important dynamical properties transfer across induced systems. These amongst others include, chain transitivity, chain (weakly) mixing, chain recurrence, exactness by chains. From our main theorem we derive an ε-chain version of Furstenberg’s celebrated 2 implies n Theorem. We also show the implications our results have for dynamics on continua.

  4. Decisive Markov Chains

    OpenAIRE

    Abdulla, Parosh Aziz; Henda, Noomene Ben; Mayr, Richard

    2007-01-01

    We consider qualitative and quantitative verification problems for infinite-state Markov chains. We call a Markov chain decisive w.r.t. a given set of target states F if it almost certainly eventually reaches either F or a state from which F can no longer be reached. While all finite Markov chains are trivially decisive (for every set F), this also holds for many classes of infinite Markov chains. Infinite Markov chains which contain a finite attractor are decisive w.r.t. every set F. In part...

  5. Hamlet's Transformation.

    Science.gov (United States)

    Usher, P. D.

    1997-12-01

    William Shakespeare's Hamlet has much evidence to suggest that the Bard was aware of the cosmological models of his time, specifically the geocentric bounded Ptolemaic and Tychonic models, and the infinite Diggesian. Moreover, Shakespeare describes how the Ptolemaic model is to be transformed to the Diggesian. Hamlet's "transformation" is the reason that Claudius, who personifies the Ptolemaic model, summons Rosencrantz and Guildenstern, who personify the Tychonic. Pantometria, written by Leonard Digges and his son Thomas in 1571, contains the first technical use of the word "transformation." At age thirty, Thomas Digges went on to propose his Perfit Description, as alluded to in Act Five where Hamlet's age is given as thirty. In Act Five as well, the words "bore" and "arms" refer to Thomas' vocation as muster-master and his scientific interest in ballistics. England's leading astronomer was also the father of the poet whose encomium introduced the First Folio of 1623. His oldest child Dudley became a member of the Virginia Company and facilitated the writing of The Tempest. Taken as a whole, such manifold connections to Thomas Digges support Hotson's contention that Shakespeare knew the Digges family. Rosencrantz and Guildenstern in Hamlet bear Danish names because they personify the Danish model, while the king's name is latinized like that of Claudius Ptolemaeus. The reason Shakespeare anglicized "Amleth" to "Hamlet" was because he saw a parallel between Book Three of Saxo Grammaticus and the eventual triumph of the Diggesian model. But Shakespeare eschewed Book Four, creating this particular ending from an infinity of other possibilities because it "suited his purpose," viz. to celebrate the concept of a boundless universe of stars like the Sun.

  6. Waste dumps in local communities in developing countries and hidden danger to health.

    Science.gov (United States)

    Anetor, Gloria O

    2016-07-01

    The rapid industrialisation and urbanisation fuelled by a fast-growing population has led to the generation of a huge amount of waste in most communities in developing countries. The hidden disorders and health dangers in waste dumps are often ignored. The waste generated in local communities is usually of a mixed type consisting of domestic waste and waste from small-scale industrial activities. Among these wastes are toxic metals, lead (Pb), cadmium (Cd), arsenic (As), mercury (Hg), halogenated organic compounds, plastics, remnants of paints that are themselves mixtures of hazardous substances, hydrocarbons and petroleum product-contaminated devices. Therefore, there is the urgent need to create an awareness of the harmful health effect of toxic wastes in developing countries, especially Nigeria. This is a review aimed at creating awareness on the hidden dangers of waste dumps to health in local communities in developing countries. Many publications in standard outlets use the following keywords: cancer, chemical toxicity, modern environmental health hazards, waste management and waste speciation in PubMed, ISI, Toxbase environmental digest, related base journals, and some standard textbooks, as well as the observation of the researcher between 1959 and 2014. Studies revealed the preponderance of toxic chemicals such as Pb, Cd, As and Hg in dump sites that have the risk of entering food chain and groundwater supplies, and these can give rise to endemic malnutrition and may also increase susceptibility to mutagenic substances, thereby increasing the incidence of cancer in developing countries. Industrialisation and urbanisation have brought about a change in the waste that is generated in contemporary communities in developing countries. Therefore, there is the need to embrace speciation and sound management of waste, probably including bioremediation. The populations in the local communities need regulatory agencies who are health educators as positive change

  7. Incorporating teleconnection information into reservoir operating policies using Stochastic Dynamic Programming and a Hidden Markov Model

    Science.gov (United States)

    Turner, Sean; Galelli, Stefano; Wilcox, Karen

    2015-04-01

    Water reservoir systems are often affected by recurring large-scale ocean-atmospheric anomalies, known as teleconnections, that cause prolonged periods of climatological drought. Accurate forecasts of these events -- at lead times in the order of weeks and months -- may enable reservoir operators to take more effective release decisions to improve the performance of their systems. In practice this might mean a more reliable water supply system, a more profitable hydropower plant or a more sustainable environmental release policy. To this end, climate indices, which represent the oscillation of the ocean-atmospheric system, might be gainfully employed within reservoir operating models that adapt the reservoir operation as a function of the climate condition. This study develops a Stochastic Dynamic Programming (SDP) approach that can incorporate climate indices using a Hidden Markov Model. The model simulates the climatic regime as a hidden state following a Markov chain, with the state transitions driven by variation in climatic indices, such as the Southern Oscillation Index. Time series analysis of recorded streamflow data reveals the parameters of separate autoregressive models that describe the inflow to the reservoir under three representative climate states ("normal", "wet", "dry"). These models then define inflow transition probabilities for use in a classic SDP approach. The key advantage of the Hidden Markov Model is that it allows conditioning the operating policy not only on the reservoir storage and the antecedent inflow, but also on the climate condition, thus potentially allowing adaptability to a broader range of climate conditions. In practice, the reservoir operator would effect a water release tailored to a specific climate state based on available teleconnection data and forecasts. The approach is demonstrated on the operation of a realistic, stylised water reservoir with carry-over capacity in South-East Australia. Here teleconnections relating

  8. TRANSFORMER APPARATUS

    Science.gov (United States)

    Wolfgang, F.; Nicol, J.

    1962-11-01

    Transformer apparatus is designed for measuring the amount of a paramagnetic substance dissolved or suspended in a diamagnetic liquid. The apparatus consists of a cluster of tubes, some of which are closed and have sealed within the diamagnetic substance without any of the paramagnetic material. The remaining tubes are open to flow of the mix- ture. Primary and secondary conductors are wrapped around the tubes in such a way as to cancel noise components and also to produce a differential signal on the secondaries based upon variations of the content of the paramagnetic material. (AEC)

  9. Rotary Transformer

    Science.gov (United States)

    McLyman, Colonel Wm. T.

    1996-01-01

    None given. From first Par: Many spacecraft (S/C) and surface rovers require the transfer of signals and power across rotating interfaces. Science instruments, antennas and solar arrays are elements needing rotary power transfer for certain (S/C) configurations. Delivery of signal and power has mainly been done by using the simplest means, the slip ring approach. This approach, although simple, leaves debris generating noise over a period of time...The rotary transformer is a good alternative to slip rings for signal and power transfer.

  10. Hidden photons in beam dump experiments and in connection with dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-12-15

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  11. Hidden photons in beam dump experiments and in connection with dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah

    2012-12-01

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  12. Gushing metal chain

    Science.gov (United States)

    Belyaev, Alexander; Sukhanov, Alexander; Tsvetkov, Alexander

    2016-03-01

    This article addresses the problem in which a chain falls from a glass from some height. This phenomenon demonstrates a paradoxical rise of the chain over the glass. To explain this effect, an initial hypothesis and an appropriate theory are proposed for calculating the steady fall parameters of the chain. For this purpose, the modified Cayley's problem of falling chain given its rise due to the centrifugal force of upward inertia is solved. Results show that the lift caused by an increase in linear density at the part of chain where it is being bent (the upper part) is due to the convergence of the chain balls to one another. The experiments confirm the obtained estimates of the lifting chain.

  13. An impossibility theorem for parameter independent hidden variable theories

    Science.gov (United States)

    Leegwater, Gijs

    2016-05-01

    Recently, Roger Colbeck and Renato Renner (C&R) have claimed that '[n]o extension of quantum theory can have improved predictive power' (Colbeck & Renner, 2011, 2012b). If correct, this is a spectacular impossibility theorem for hidden variable theories, which is more general than the theorems of Bell (1964) and Leggett (2003). Also, C&R have used their claim in attempt to prove that a system's quantum-mechanical wave function is in a one-to-one correspondence with its 'ontic' state (Colbeck & Renner, 2012a). C&R's claim essentially means that in any hidden variable theory that is compatible with quantum-mechanical predictions, probabilities of measurement outcomes are independent of these hidden variables. This makes such variables otiose. On closer inspection, however, the generality and validity of the claim can be contested. First, it is based on an assumption called 'Freedom of Choice'. As the name suggests, this assumption involves the independence of an experimenter's choice of measurement settings. But in the way C&R define this assumption, a no-signalling condition is surreptitiously presupposed, making the assumption less innocent than it sounds. When using this definition, any hidden variable theory violating parameter independence, such as Bohmian Mechanics, is immediately shown to be incompatible with quantum-mechanical predictions. Also, the argument of C&R is hard to follow and their mathematical derivation contains several gaps, some of which cannot be closed in the way they suggest. We shall show that these gaps can be filled. The issue with the 'Freedom of Choice' assumption can be circumvented by explicitly assuming parameter independence. This makes the result less general, but better founded. We then obtain an impossibility theorem for hidden variable theories satisfying parameter independence only. As stated above, such hidden variable theories are impossible in the sense that any supplemental variables have no bearing on outcome probabilities

  14. Follow that fish: Uncovering the hidden blue economy in coral reef fisheries.

    Science.gov (United States)

    Grafeld, Shanna; Oleson, Kirsten L L; Teneva, Lida; Kittinger, John N

    2017-01-01

    Despite their importance for human well-being, nearshore fisheries are often data poor, undervalued, and underappreciated in policy and development programs. We assess the value chain for nearshore Hawaiian coral reef fisheries, mapping post-catch distribution and disposition, and quantifying associated monetary, food security, and cultural values. We estimate that the total annual value of the nearshore fishery in Hawai'i is $10.3-$16.4 million, composed of non-commercial ($7.2-$12.9 million) and commercial ($2.97 million licensed + $148,500-$445,500 unlicensed) catch. Hawaii's nearshore fisheries provide >7 million meals annually, with most (>5 million) from the non-commercial sector. Over a third (36%) of meals were planktivores, 26% piscivores, 21% primary consumers, and 18% secondary consumers. Only 62% of licensed commercial catch is accounted for in purchase reports, leaving 38% of landings unreported in sales. Value chains are complex, with major buyers for the commercial fishery including grocery stores (66%), retailers (19%), wholesalers (14%), and restaurants (sharing. A small amount (~37,000kg) of reef fish-the equivalent of 1.8% of local catch-is imported annually into Hawai'i, 23,000kg of which arrives as passenger luggage on commercial flights from Micronesia. Evidence of exports to the US mainland exists, but is unquantifiable given existing data. Hawaiian nearshore fisheries support fundamental cultural values including subsistence, activity, traditional knowledge, and social cohesion. These small-scale coral reef fisheries provide large-scale benefits to the economy, food security, and cultural practices of Hawai'i, underscoring the need for sustainable management. This research highlights the value of information on the value chain for small-scale production systems, making the hidden economy of these fisheries visible and illuminating a range of conservation interventions applicable to Hawai'i and beyond.

  15. Using Civilian Supply Chain Management Best Practices to Improve Army Supply Chain Management Procedures

    Science.gov (United States)

    2017-06-09

    System-Army IT Information Technology LMP Logistics Modernization Program PLL Prescribed Load List SCM Supply Chain Management SSA Supply Support...Civilian and Military SCM Future Trends Army future transformations are based around the Logistics Modernization Program (LMP). What began as a plan...

  16. Excitation Chains at the Glass Transition

    International Nuclear Information System (INIS)

    Langer, J. S.

    2006-01-01

    The excitation-chain theory of the glass transition, proposed in an earlier publication, predicts diverging, super-Arrhenius relaxation times and, via a similarly diverging length scale, suggests a way of understanding the relations between dynamic and thermodynamic properties of glass-forming liquids. I argue here that critically large excitation chains play a role roughly analogous to that played by critical clusters in the droplet model of vapor condensation. Unlike a first-order condensation point in a vapor, the glass transition is not a conventional phase transformation, and may not be a thermodynamic transition at all

  17. Achieving competitiveness through supply chain integration

    DEFF Research Database (Denmark)

    Arlbjørn, Jan Stentoft; Wong, Chee Yew; Seerup, Søren

    2007-01-01

    Supply chain development can take place in several steps, from functional optimisation, then internal integration, dyadic integration and last, integration in chains and networks. Before external integration gives true value, order in own house must be achieved. This paper presents a case study...... of a Danish manufacturer that has gone through a major transformation process, and the paper intends to discuss how such a Business Process Reengineering (BPR) project aimed to achieve internal integration. The paper demonstrates how improved competitiveness can be obtained through a synchronous...

  18. Power Transformer Differential Protection Based on Neural Network Principal Component Analysis, Harmonic Restraint and Park's Plots

    OpenAIRE

    Tripathy, Manoj

    2012-01-01

    This paper describes a new approach for power transformer differential protection which is based on the wave-shape recognition technique. An algorithm based on neural network principal component analysis (NNPCA) with back-propagation learning is proposed for digital differential protection of power transformer. The principal component analysis is used to preprocess the data from power system in order to eliminate redundant information and enhance hidden pattern of differential current to disc...

  19. Hidden symmetries and equilibrium properties of multiplicative white-noise stochastic processes

    Science.gov (United States)

    González Arenas, Zochil; Barci, Daniel G.

    2012-12-01

    Multiplicative white-noise stochastic processes continue to attract attention in a wide area of scientific research. The variety of prescriptions available for defining them makes the development of general tools for their characterization difficult. In this work, we study equilibrium properties of Markovian multiplicative white-noise processes. For this, we define the time reversal transformation for such processes, taking into account that the asymptotic stationary probability distribution depends on the prescription. Representing the stochastic process in a functional Grassmann formalism, we avoid the necessity of fixing a particular prescription. In this framework, we analyze equilibrium properties and study hidden symmetries of the process. We show that, using a careful definition of the equilibrium distribution and taking into account the appropriate time reversal transformation, usual equilibrium properties are satisfied for any prescription. Finally, we present a detailed deduction of a covariant supersymmetric formulation of a multiplicative Markovian white-noise process and study some of the constraints that it imposes on correlation functions using Ward-Takahashi identities.

  20. Hidden symmetries and equilibrium properties of multiplicative white-noise stochastic processes

    International Nuclear Information System (INIS)

    Arenas, Zochil González; Barci, Daniel G

    2012-01-01

    Multiplicative white-noise stochastic processes continue to attract attention in a wide area of scientific research. The variety of prescriptions available for defining them makes the development of general tools for their characterization difficult. In this work, we study equilibrium properties of Markovian multiplicative white-noise processes. For this, we define the time reversal transformation for such processes, taking into account that the asymptotic stationary probability distribution depends on the prescription. Representing the stochastic process in a functional Grassmann formalism, we avoid the necessity of fixing a particular prescription. In this framework, we analyze equilibrium properties and study hidden symmetries of the process. We show that, using a careful definition of the equilibrium distribution and taking into account the appropriate time reversal transformation, usual equilibrium properties are satisfied for any prescription. Finally, we present a detailed deduction of a covariant supersymmetric formulation of a multiplicative Markovian white-noise process and study some of the constraints that it imposes on correlation functions using Ward–Takahashi identities. (paper)

  1. Hidden foreign trade and corruption on customers

    Directory of Open Access Journals (Sweden)

    Богдан Миколайович Головкін

    2017-12-01

    migration through the customs border of amber and wood, the manipulation of exports of grain and other highly liquid products deserve. Summarizing, we draw the following conclusions. Customs corruption is based on providing shadow foreign trade and covering economic crime on a transnational or transboundary scale. It is in violation of customs legislation by both parties in customs matters for the purpose of illegal enrichment. In corruption practices, all bodies and services that provide state control over the movement of goods through the customs border of Ukraine and carry out law-enforcement activities in this area participate. The level of corruption in the sphere of foreign economic activity depends on the volume of illegal export-import operations with raw materials and highly liquid products, as well as the ratio of official taxes and the cost of corruption services to economic entities. It was clarified that in parallel with "centralized corruption" in customs authorities there is "competitive corruption" between regional customs and their structural divisions for providing corruption services at lower prices. Measures to prevent corruption and crime should be aimed at reducing the profitability of shadow foreign trade by liberalizing the tax burden at the same time while strengthening control over transfer pricing, including the customs service into an integrated security system throughout the supply chain, implementing common customs control, managing risky operations.

  2. Forestry transformation

    International Nuclear Information System (INIS)

    Beer, G.

    2003-01-01

    State forestry company Lesy, s.p., Banska Bystrica have chosen Austrian state forestry company to operate as their restructuring advisor. 20 million Sk (0.142 mn Euro) were assigned to transformation of Lesy SR from a state enterprise to a state-owned joint-stock company. The whole process should take two years. The joint-stock company should be established at the beginning of next year. 'What we have to do first is to define the objectives and perspectives of this restructuring,' claims new director, Karol Vins. The new boss recalled all directors of the 26 branches. They were given a lot of freedom to trade with wood. The new management wants to establish a profit-making company. At the moment the company has total claims of 600 million Sk (14.59 million Eur) it will have to provision for

  3. Transforming vulnerability.

    Science.gov (United States)

    Jones, Patricia S; Zhang, Xinwei Esther; Meleis, Afaf I

    2003-11-01

    Asian American immigrant women engaged in filial caregiving are at special risk for health problems due to complex contextual factors related to immigration, cultural traditions, and role transition. This study examines the experience of two groups of immigrant Asian American women who are caring for older parents. A total of 41 women (22 Chinese American and 19 Filipino American) were interviewed in a study based on Strauss and Corbin's grounded theory methodology. The women were determined to be loyal to their traditional culture, which included strong filial values, while adapting to a new culture. Through the struggle of meeting role expectations and coping with paradox, the women mobilized personal and family resources to transform vulnerability into strength and well-being.

  4. Radioactive transformations

    CERN Document Server

    Rutherford, Ernest

    2012-01-01

    Radioactive Transformations describes Ernest Rutherford's Nobel Prize-winning investigations into the mysteries of radioactive matter. In this historic work, Rutherford outlines the scientific investigations that led to and coincided with his own research--including the work of Wilhelm Rӧntgen, J. J. Thomson, and Marie Curie--and explains in detail the experiments that provided a glimpse at special relativity, quantum mechanics, and other concepts that would shape modern physics. This new edition features a comprehensive introduction by Nobel Laureate Frank Wilczek which engagingly explains how Rutherford's early research led to a better understanding of topics as diverse as the workings of the atom's nucleus, the age of our planet, and the fusion in stars.

  5. Heavy superpartners with less tuning from hidden sector renormalisation

    International Nuclear Information System (INIS)

    Hardy, Edward

    2014-01-01

    In supersymmetric extensions of the Standard Model, superpartner masses consistent with collider bounds typically introduce significant tuning of the electroweak scale. We show that hidden sector renormalisation can greatly reduce such a tuning if the supersymmetry breaking, or mediating, sector runs through a region of strong coupling not far from the weak scale. In the simplest models, only the tuning due to the gaugino masses is improved, and a weak scale gluino mass in the region of 5 TeV may be obtained with an associated tuning of only one part in ten. In models with more complex couplings between the visible and hidden sectors, the tuning with respect to sfermions can also be reduced. We give an example of a model, with low scale gauge mediation and superpartner masses allowed by current LHC bounds, that has an overall tuning of one part in twenty

  6. Hidden order and disorder effects in URu2Si2

    Science.gov (United States)

    Bernal, O. O.; Moroz, M. E.; Ishida, K.; Murakawa, H.; Reyes, A. P.; Kuhns, P. L.; MacLaughlin, D. E.; Mydosh, J. A.; Gortenmulder, T. J.

    2006-05-01

    NMR experiments at ambient pressure in URu 2Si 2 demonstrate a linewidth enhancement effect below the hidden order transition temperature T0. We present single-crystal 29Si NMR parameters for various temperatures and for an applied magnetic field perpendicular to the crystal c-axis. By comparing oriented-powder and single-crystal data, we observe that the size of the linewidth enhancement below T0 correlates with the size of the high- T broadening. We measure a 29Si up-field line shift below T0 which indicates the presence of an internal-field average for the entire crystal. This shift also correlates with the high-temperature width. The 101Ru NQR frequency as a function of temperature was also measured. No strong effect on the NQR frequency is observed at T0. Both NMR and NQR measurements suggest a connection between linewidth/disorder effects and the transition to hidden order.

  7. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De......_different are integrated. We experimentally validate our approach on the biologically motivated problem of global pairwise alignment.......A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference...

  8. Hidden Valley Higgs Decays in the ATLAS detector

    CERN Document Server

    Ciapetti, G

    2009-01-01

    A number of extensions of the Standard Model result in particles that are neutral, weakly-coupled and have macroscopic decay lengths that can be comparable with LHC detector dimensions. These particles represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS apparatus. For the purpose of exploring the challenges to the trigger posed by long-lived particles, the Hidden Valley scenario serves as an excellent setting. In this note we present the results of a first study of ATLAS detector performance for some Hidden Valley processes with long-lived, neutral states that decay throughout the detector volume to multi heavy-flavor jets, mainly b-bbar.

  9. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  10. Hidden magnetism in periodically modulated one dimensional dipolar fermions

    Science.gov (United States)

    Fazzini, S.; Montorsi, A.; Roncaglia, M.; Barbiero, L.

    2017-12-01

    The experimental realization of time-dependent ultracold lattice systems has paved the way towards the implementation of new Hubbard-like Hamiltonians. We show that in a one-dimensional two-components lattice dipolar Fermi gas the competition between long range repulsion and correlated hopping induced by periodically modulated on-site interaction allows for the formation of hidden magnetic phases, with degenerate protected edge modes. The magnetism, characterized solely by string-like nonlocal order parameters, manifests in the charge and/or in the spin degrees of freedom. Such behavior is enlighten by employing Luttinger liquid theory and numerical methods. The range of parameters for which hidden magnetism is present can be reached by means of the currently available experimental setups and probes.

  11. Editorial: Supply Chain Management

    Directory of Open Access Journals (Sweden)

    Dimitrios Aidonis

    2017-05-01

    Full Text Available This special issue has followed up the 3rd Olympus International Conference on Supply Chains held on Athens Metropolitan Expo, November 7 & 8 2015, Greece. The Conference was organized by the Department of Logistics Technological Educational Institute of Central Macedonia, in collaboration with the: a Laboratory of Quantitative Analysis, Logistics and Supply Chain Management of the Department of Mechanical Engineering, Aristotle University of Thessaloniki (AUTH, b Greek Association of Supply Chain Management (EEL of Northern Greece and the c Supply Chain & Logistics Journal. During the 2-Days Conference more than 60 research papers were presented covering the following thematic areas: (i Transportation, (ii Best Practices in Logistics, (iii Information and Communication Technologies in Supply Chain Management, (iv Food Logistics, (v New Trends in Business Logistics, and (vi Green Supply Chain Management. Three keynote invited speakers addressed interesting issues for the Operational Research, the Opportunities and Prospects of Greek Ports chaired Round Tables with other Greek and Foreign Scientists and Specialists.

  12. Supply Chain Management og Supply Chain costing

    DEFF Research Database (Denmark)

    Nielsen, Steen; Mortensen, Ole

    2002-01-01

    Formålet med denne artikel er at belyse de muligheder som ligger i at integrere virksomhedens økonomiske styring med begrebet Supply Chain Management (SCM). Dette søges belyst ved først at beskrive den teoretiske ramme, hvori SCM indgår. Herefter analyseres begrebet Supply Chain Costing (SCC) som...... Århus. Et resultat er, at via begrebet Supply Chain Costing skabes der mulighed for at måle logistikkædens aktiviteter i kr./øre. Anvendelsen af denne information har også strategisk betydning for at kunne vælge kunde og leverandør. Ved hjælp af integrationen skabes der også helt nye mulighed...

  13. What are the Hidden Quantum Processes Behind Newton's Laws?

    OpenAIRE

    Ostoma, Tom; Trushyk, Mike

    1999-01-01

    We investigate the hidden quantum processes that are responsible for Newton's laws of motion and Newton's universal law of gravity. We apply Electro-Magnetic Quantum Gravity or EMQG to investigate Newtonian classical physics. EQMG is a quantum gravity theory that is manifestly compatible with Cellular Automata (CA) theory, a new paradigm for physical reality. EMQG is also based on a theory of inertia proposed by R. Haisch, A. Rueda, and H. Puthoff, which we modified and called Quantum Inertia...

  14. Uncovering Hidden Mathematics of the Multiplication Table Using Spreadsheets

    Directory of Open Access Journals (Sweden)

    Sergei Abramovich

    2007-05-01

    Full Text Available This paper reveals a number of learning activities emerging from a spreadsheetgenerated multiplication table. These activities are made possible by using such features of the software as conditional formatting, circular referencing, calculation through iteration, scroll bars, and graphing. The paper is a reflection on a mathematics content course designed for prospective elementary teachers using the hidden mathematics curriculum framework. It is written in support of standards for teaching and recommendations for teachers in North America.

  15. Sterile neutrino, hidden dark matter and their cosmological signatures

    International Nuclear Information System (INIS)

    Das, Subinoy

    2012-01-01

    Though thermal dark matter has been the central idea behind the dark matter candidates, it is highly possible that dark matter of the universe is non-thermal in origin or it might be in thermal contact with some hidden or dark sector but not with standard model. Here we explore the cosmological bounds as well as the signatures on two types of non-thermal dark matter candidates. First we discuss a hidden dark matter with almost no interaction (or very feeble) with standard model particles so that it is not in thermal contact with visible sector but we assume it is thermalized with in a hidden sector due to some interaction. While encompassing the standard cold WIMP scenario, we do not require the freeze-out process to be non-relativistic. Rather, freeze-out may also occur when dark matter particles are semi-relativistic or relativistic. Especially we focus on the warm dark matter scenario in this set up and find the constraints on the warm dark matter mass, cross-section and hidden to visible sector temperature ratio which accounts for the observed dark-matter density, satisfies the Tremaine-Gunn bound on dark-matter phase space density and has a free-streaming length consistent with cosmological constraints on the matter power spectrum. Our method can also be applied to keV sterile neutrino dark matter which is not thermalized with standard model but is thermalized with in a dark sector. The second part of this proceeding focuses on an exotic dark matter candidate which arises from the existence of eV mass sterile neutrino through a late phase transition. Due to existence of a strong scalar force the light sterile states get trapped into stable degenerate micro nuggets. We find that its signature in matter power spectra is close to a warm dark matter candidate.

  16. Pendidikan Anti Korupsi melalui Hidden Curriculum dan Pendidikan Moral

    Directory of Open Access Journals (Sweden)

    Dewi Salistina

    2015-11-01

    Full Text Available This article is intended to elaborate strategies in incorporating anti corruption awareness through hidden curriculum and morality education. It is of necessity to increase such kind of awareness among students so that they can avoid any action related to corruption. In this case, some practices such as good behavior, discipline, and good relationship among students-teachers are fostered in the daily activities at school. The effect is the increase of students’ honesty, responsibility, and solidarity across level of education.

  17. Hidden Markov models: the best models for forager movements?

    Science.gov (United States)

    Joo, Rocio; Bertrand, Sophie; Tam, Jorge; Fablet, Ronan

    2013-01-01

    One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs). We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs). They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour), while their behavioural modes (fishing, searching and cruising) were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines) for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%), significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  18. Einstein-Bohr controversy and theory of hidden variables

    Czech Academy of Sciences Publication Activity Database

    Lokajíček, Miloš V.

    2010-01-01

    Roč. 8, č. 4 (2010), s. 638-645 ISSN 1303-5150 R&D Projects: GA MŠk LA08015 Institutional research plan: CEZ:AV0Z10100502 Keywords : Schroedinger equation * EPR paradox * hidden variables Subject RIV: BF - Elementary Particles and High Energy Physics Impact factor: 0.697, year: 2010 http://arxiv.org/abs/1004.3005

  19. MOBILE APP FOR HIDDEN DATA ANALYTICS OF ONLINE MARKETPLACE SYSTEMS

    OpenAIRE

    Aqle, Aboubakr

    2016-01-01

    In this project, an extensive analysis and evaluation of the existing e-marketplaces is performed. The aim of this analysis is to improve the experience of end-users through an Android application that is capable of summarizing multiple heterogeneous hidden data sources and unify received responses to one single, structured and homogenous source. The proposed Android application is based on the multi-level conceptual analysis and modeling strategy. In which, the data is analyzed in a way ...

  20. About hidden influence of predictor variables: Suppressor and mediator variables

    Directory of Open Access Journals (Sweden)

    Milovanović Boško

    2013-01-01

    Full Text Available In this paper procedure for researching hidden influence of predictor variables in regression models and depicting suppressor variables and mediator variables is shown. It is also shown that detection of suppressor variables and mediator variables could provide refined information about the research problem. As an example for applying this procedure, relation between Atlantic atmospheric centers and air temperature and precipitation amount in Serbia is chosen. [Projekat Ministarstva nauke Republike Srbije, br. 47007

  1. Hidden Markov models: the best models for forager movements?

    Directory of Open Access Journals (Sweden)

    Rocio Joo

    Full Text Available One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs. We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs. They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour, while their behavioural modes (fishing, searching and cruising were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%, significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  2. Hidden mission of the psyche in abuse and addiction.

    Science.gov (United States)

    Gostecnik, Christian; Repic, Tanja; Cvetek, Mateja; Cvetek, Robert

    2010-09-01

    Traumatic experiences can become the central mental content in our psychic structure and can deeply mark all our later perceptions and experiences of our surroundings. We can claim something similar also for addictions of all kinds. In this article, we will demonstrate that recurring traumatic experiences and abuse as well as addiction represent a hidden mission of psyche for resolution and a great cry of longing for salvation.

  3. A preon model with hidden electric and magnetic type charges

    International Nuclear Information System (INIS)

    Pati, J.C.; Strathdee, J.

    1980-11-01

    The U(1) x U(1) binding forces in an earlier preonic composite model of quarks and leptons are interpreted as arising from hidden electric and magnetic type charges. The preons may possess intrinsic spin zero; the half-integer spins of the composites being contributed by the force field. The quark-lepton gauge symmetry is interpreted as an effective low-energy symmetry arising at the composite level. Some remarks are made regarding the possible composite nature of the graviton. (author)

  4. Benefits of Enterprise Ontology in Governing Complex Enterprise Transformations

    NARCIS (Netherlands)

    Op 't Land, M.; Dietz, J.L.G.

    2012-01-01

    Enterprises increasingly execute complex transformations, such as mergers and splits, chain redesign, sharing and sourcing, and the rationalization of products, processes and applications. Its consequences are seldom sufficiently timely and completely discerned, while this is essential for governing

  5. Supply chain components

    OpenAIRE

    Vieraşu, T.; Bălăşescu, M.

    2011-01-01

    In this article I will go through three main logistics components, which are represented by: transportation, inventory and facilities, and the three secondary logistical components: information, production location, price and how they determine performance of any supply chain. I will discuss then how these components are used in the design, planning and operation of a supply chain. I will also talk about some obstacles a supply chain manager may encounter.

  6. Supply chain components

    Directory of Open Access Journals (Sweden)

    Vieraşu, T.

    2011-01-01

    Full Text Available In this article I will go through three main logistics components, which are represented by: transportation, inventory and facilities, and the three secondary logistical components: information, production location, price and how they determine performance of any supply chain. I will discuss then how these components are used in the design, planning and operation of a supply chain. I will also talk about some obstacles a supply chain manager may encounter.

  7. Markov Tail Chains

    OpenAIRE

    janssen, Anja; Segers, Johan

    2013-01-01

    The extremes of a univariate Markov chain with regularly varying stationary marginal distribution and asymptotically linear behavior are known to exhibit a multiplicative random walk structure called the tail chain. In this paper we extend this fact to Markov chains with multivariate regularly varying marginal distributions in Rd. We analyze both the forward and the backward tail process and show that they mutually determine each other through a kind of adjoint relation. In ...

  8. Economy, market and chain

    OpenAIRE

    Sukkel, W.; Hommes, M.

    2009-01-01

    In their pursuit of growth and professionalisation, the Dutch organic sector focuses primarily on market development. But how do you stimulate the market for organic foods? This is the subject of many research projects concerning market, consumer preferences and the supply chain. These projects focus specifically at consumer purchasing behaviour, product development, supply chain formation and minimising cost price. As a rule, this research takes place in close cooperation with chain actors

  9. Exploring inequality violations by classical hidden variables numerically

    International Nuclear Information System (INIS)

    Vongehr, Sascha

    2013-01-01

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability, and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs

  10. In Brief: Hidden environment and health costs of energy

    Science.gov (United States)

    Showstack, Randy

    2009-10-01

    The hidden costs of energy production and use in the United States amounted to an estimated $120 billion in 2005, according to a 19 October report by the U.S. National Research Council. The report, “Hidden Costs of Energy: Unpriced Consequences of Energy Production and Use,” examines hidden costs, including the cost of air pollution damage to human health, which are not reflected in market prices of energy sources, electricity, or gasoline. The report found that in 2005, the total annual external damages from sulfur dioxide, nitrogen oxides, and particulate matter created by coal-burning power plants that produced 95% of the nation's coal-generated electricity were about $62 billion, with nonclimate damages averaging about 3.2 cents for every kilowatt-hour of energy produced. It is estimated that by 2030, nonclimate damages will fall to 1.7 cents per kilowatt-hour. The 2030 figure assumes that new policies already slated for implementation are put in place.

  11. Quasiparticle scattering image in hidden order phases and chiral superconductors

    Energy Technology Data Exchange (ETDEWEB)

    Thalmeier, Peter [Max Planck Institute for Chemical Physics of Solids, 01187 Dresden (Germany); Akbari, Alireza, E-mail: alireza@apctp.org [Asia Pacific Center for Theoretical Physics, Pohang, Gyeongbuk 790-784 (Korea, Republic of); Department of Physics, and Max Planck POSTECH Center for Complex Phase Materials, POSTECH, Pohang 790-784 (Korea, Republic of)

    2016-02-15

    The technique of Bogoliubov quasiparticle interference (QPI) has been successfully used to investigate the symmetry of unconventional superconducting gaps, also in heavy fermion compounds. It was demonstrated that QPI can distinguish between the d-wave singlet candidates in CeCoIn{sub 5}. In URu{sub 2}Si{sub 2} presumably a chiral d-wave singlet superconducting (SC) state exists inside a multipolar hidden order (HO) phase. We show that hidden order leaves an imprint on the symmetry of QPI pattern that may be used to determine the essential question whether HO in URu{sub 2}Si{sub 2} breaks the in-plane rotational symmetry or not. We also demonstrate that the chiral d-wave SC gap leads to a crossover to a quasi-2D QPI spectrum below T{sub c} which sharpens the HO features. Furthermore we investigate the QPI image of chiral p-wave multigap superconductor Sr{sub 2}RuO{sub 4}. - Highlights: • The chiral multigap structure of Sr{sub 2}RuO{sub 4} leads to rotation of QPI spectrum with bias voltage. • 5f band reconstruction in hidden order phase of URu{sub 2}Si{sub 2} is obtained from two orbital model. • The chiral superconductivity in URu{sub 2}Si{sub 2} leads to quasi-2D quasiparticle interference (QPI).

  12. Mass spectra of hidden-charm molecular pentaquarks states

    International Nuclear Information System (INIS)

    Patel, Smruti; Vinodkumar, P.C.

    2016-01-01

    Very recently, the LHCb Collaboration has reported two hidden-charmed resonances P_c(4380) and P_c(4450) consistent with pentaquark states in the Λ_b"0 → K"-J/Ψp process with masses (widths) (4380 ±8 ± 29) MeV ((205 ±18 ± 86) MeV) and (4449.8 ±1.7 ± 2.5) MeV ((39 ±5 ±19) MeV), respectively. The observation of the P_c states has aroused the theorist's strong interest in the hidden-charm pentaquark states. They have been studied in various frameworks, such as the molecule-like pentaquark states, the diquark-diquark-antiquark type pentaquark states, the diquark-triquark type pentaquark states, re-scattering effects, etc. An identification of pentaquark states as exotic hadron has been one of the long standing problems in the physics of strong interaction and quantum chromodynamics (QCD). A decade ago lots of discussion were made about pentaquarks states but due to lack of further experimental evidences the study of pentaquarks have been almost gone in the darkness. But, recent remarkable observation of two resonances i.e. P_c(4380) and P_c(4450) with hidden charm and the minimal quark content cc-baruud provided new impact for studies of pentaquark states and opens a new window to study the exotic hadronic matter

  13. Searching for confining hidden valleys at LHCb, ATLAS, and CMS

    Science.gov (United States)

    Pierce, Aaron; Shakya, Bibhushan; Tsai, Yuhsin; Zhao, Yue

    2018-05-01

    We explore strategies for probing hidden valley scenarios exhibiting confinement. Such scenarios lead to a moderate multiplicity of light hidden hadrons for generic showering and hadronization similar to QCD. Their decays are typically soft and displaced, making them challenging to probe with traditional LHC searches. We show that the low trigger requirements and excellent track and vertex reconstruction at LHCb provide a favorable environment to search for such signals. We propose novel search strategies in both muonic and hadronic channels. We also study existing ATLAS and CMS searches and compare them with our proposals at LHCb. We find that the reach at LHCb is generically better in the parameter space we consider here, even with optimistic background estimations for ATLAS and CMS searches. We discuss potential modifications at ATLAS and CMS that might make these experiments competitive with the LHCb reach. Our proposed searches can be applied to general hidden valley models as well as exotic Higgs boson decays, such as in twin Higgs models.

  14. The selection and implementation of hidden line algorithms

    International Nuclear Information System (INIS)

    Schneider, A.

    1983-06-01

    One of the most challenging problems in the field of computer graphics is the elimination of hidden lines in images of nontransparent bodies. In the real world the nontransparent material hinders the light ray coming from hidden regions to the observer. In the computer based image formation process there is no automatic visibility regulation of this kind. So many lines are created which result in a poor quality of the spacial representation. Therefore a three-dimensional representation on the screen is only meaningfull if the hidden lines are eliminated. For this process many algorithms have been developed in the past. A common feature of these codes is the large amount of computer time needed. In the first generation of algorithms, which are commonly used today, the bodies are modeled by plane polygons. More recently, however, also algorithms are in use, which are able to treat curved surfaces without discretisation by plane surfaces. In this paper the first group of algorithms is reviewed, and the most important codes are described. The experience obtained during the implementation of two algorithms is presented. (orig.) [de

  15. Supply chain planning classification

    Science.gov (United States)

    Hvolby, Hans-Henrik; Trienekens, Jacques; Bonde, Hans

    2001-10-01

    Industry experience a need to shift in focus from internal production planning towards planning in the supply network. In this respect customer oriented thinking becomes almost a common good amongst companies in the supply network. An increase in the use of information technology is needed to enable companies to better tune their production planning with customers and suppliers. Information technology opportunities and supply chain planning systems facilitate companies to monitor and control their supplier network. In spite if these developments, most links in today's supply chains make individual plans, because the real demand information is not available throughout the chain. The current systems and processes of the supply chains are not designed to meet the requirements now placed upon them. For long term relationships with suppliers and customers, an integrated decision-making process is needed in order to obtain a satisfactory result for all parties. Especially when customized production and short lead-time is in focus. An effective value chain makes inventory available and visible among the value chain members, minimizes response time and optimizes total inventory value held throughout the chain. In this paper a supply chain planning classification grid is presented based current manufacturing classifications and supply chain planning initiatives.

  16. On spin chains and field theories

    International Nuclear Information System (INIS)

    Roiban, Radu

    2004-01-01

    We point out that the existence of global symmetries in a field theory is not an essential ingredient in its relation with an integrable model. We describe an obvious construction which, given an integrable spin chain, yields a field theory whose 1-loop scale transformations are generated by the spin chain hamiltonian. We also identify a necessary condition for a given field theory to be related to an integrable spin chain. As an example, we describe an anisotropic and parity-breaking generalization of the XXZ Heisenberg spin chain and its associated field theory. The system has no nonabelian global symmetries and generally does not admit a supersymmetric extension without the introduction of more propagating bosonic fields. For the case of a 2-state chain we find the spectrum and the eigenstates. For certain values of its coupling constants the field theory associated to this general type of chain is the bosonic sector of the q-deformation of N = 4 SYM theory. (author)

  17. Control Towers in Supply Chain Management - Past and Future

    Directory of Open Access Journals (Sweden)

    Anna Trzuskawska-Grzesińska

    2017-02-01

    Full Text Available The global economy requires global supply chain management which relies on visibility and responsiveness. Determinants such as: information technology tools, process knowledge, sales and operations planning experiences, etc., enable the formation of theory and practice for the supply chain control tower concept. The goal of the research paper is to identify business examples of different approaches to the supply chain control tower in the past and initiate a discussion on their future. This paper synthesizes past control tower practices and identifies possible future trends. The author performed: literature analysis, three selected companies' case studies and comparative analyses. As the control towers evolve, while supply chains are transforming continuous, update from the market is needed. The research findings showed the selected companies, in the future, perceived control tower's activities as a potential source of revenue not just solely a source of cost and time optimization as well as a source of value added to customer. The researched control towers were built and still they are developed. The business frequently changes and requires control towers to be adjusted, reengineered and adaptive. The researched control towers are needed to keep control over supply chain while it is transforming. There is a differentiation between the supply chain control towers, logistic services control towers and reverse supply chain control towers. An integration mechanism between the control towers would be necessary to assure entire supply chain visibility and orchestration. The research also shows the knowledge gap regarding the control towers in supply chain, specially their possible configurations and future.

  18. Supply Chain Management

    DEFF Research Database (Denmark)

    Wieland, Andreas; Handfield, Robert B.

    Supply chain management has made great strides in becoming a discipline with a standalone body of theories. As part of this evolution, researchers have sought to embed and integrate observed supply chain management phenomena into theoretical statements. In our review, we explore where we have been...

  19. Critical Chain Exercises

    Science.gov (United States)

    Doyle, John Kevin

    2010-01-01

    Critical Chains project management focuses on holding buffers at the project level vs. task level, and managing buffers as a project resource. A number of studies have shown that Critical Chain project management can significantly improve organizational schedule fidelity (i.e., improve the proportion of projects delivered on time) and reduce…

  20. Value Chain Engineering

    DEFF Research Database (Denmark)

    Wæhrens, Brian Vejrum; Slepniov, Dmitrij

    2015-01-01

    This workbook is recommended for the attention of students of and managers in Danish small and medium sized enterprises (SMEs). Danish SMEs are currently facing a number of key challenges related to their position in global value chains. This book provides an insight into value chain management t...

  1. Fields From Markov Chains

    DEFF Research Database (Denmark)

    Justesen, Jørn

    2005-01-01

    A simple construction of two-dimensional (2-D) fields is presented. Rows and columns are outcomes of the same Markov chain. The entropy can be calculated explicitly.......A simple construction of two-dimensional (2-D) fields is presented. Rows and columns are outcomes of the same Markov chain. The entropy can be calculated explicitly....

  2. The Transformation of African Smallholders into Customer Value Creating Businesses

    NARCIS (Netherlands)

    Teklehaimanot, Mebrahtu L.; Ingenbleek, Paul T.M.; Trijp, van Hans C.M.

    2017-01-01

    An increasing number of the 600 million African smallholders are becoming integrated into the supply chains of supermarkets, fast food chains, and exporters. This process gradually transforms the smallholders into profit-oriented businesses that can make important contributions to rural

  3. Integrated supply chain risk management

    OpenAIRE

    Riaan Bredell; Jackie Walters

    2007-01-01

    Integrated supply chain risk management (ISCRM) has become indispensable to the theory and practice of supply chain management. The economic and political realities of the modern world require not only a different approach to supply chain management, but also bold steps to secure supply chain performance and sustainable wealth creation. Integrated supply chain risk management provides supply chain organisations with a level of insight into their supply chains yet to be achieved. If correctly ...

  4. Transforming giants.

    Science.gov (United States)

    Kanter, Rosabeth Moss

    2008-01-01

    Large corporations have long been seen as lumbering, inflexible, bureaucratic--and clueless about global developments. But recently some multinationals seem to be transforming themselves: They're engaging employees, moving quickly, and introducing innovations that show true connection with the world. Harvard Business School's Kanter ventured with a research team inside a dozen global giants--including IBM, Procter & Gamble, Omron, CEMEX, Cisco, and Banco Real--to discover what has been driving the change. After conducting more than 350 interviews on five continents, she and her colleagues came away with a strong sense that we are witnessing the dawn of a new model of corporate power: The coordination of actions and decisions on the front lines now appears to stem from widely shared values and a sturdy platform of common processes and technology, not from top-down decrees. In particular, the values that engage the passions of far-flung workforces stress openness, inclusion, and making the world a better place. Through this shift in what might be called their guidance systems, the companies have become as creative and nimble as much smaller ones, even while taking on social and environmental challenges of a scale that only large enterprises could attempt. IBM, for instance, has created a nonprofit partnership, World Community Grid, through which any organization or individual can donate unused computing power to research projects and see what is being done with the donation in real time. IBM has gained an inspiring showcase for its new technology, helped business partners connect with the company in a positive way, and offered individuals all over the globe the chance to contribute to something big.

  5. Supply Chain Connectivity: Enhancing Participation in the Global Supply Chain

    OpenAIRE

    Patalinghug, Epictetus E.

    2015-01-01

    Supply chain connectivity is vital for the efficient flow of trade among APEC economies. This paper reviews the literature and supply chain management, describes the barriers to enhancing participation in global supply chain, analyzes the various measures of supply chain performance, and suggests steps for the Philippines to fully reap the benefits of the global value chain.

  6. SECURE VISUAL SECRET SHARING BASED ON DISCRETE WAVELET TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Jyothi Lekshmi

    2015-08-01

    Full Text Available Visual Cryptography Scheme (VCS is an encryption method to encode secret written materials. This method converts the secret written material into an image. Then encode this secret image into n shadow images called shares. For the recreation of the original secret, all or some selected subsets of shares are needed; individual shares are of no use on their own. The secret image can be recovered simply by selecting some subset of these n shares, makes transparencies of them and stacking on top of each other. Nowadays, the data security has an important role. The shares can be altered by an attacker. So providing security to the shares is important. This paper proposes a method of adding security to cryptographic shares. This method uses two dimensional discrete wavelet transform to hide visual secret shares. Then the hidden secrets are distributed among participants through the internet. All hidden shares are extracted to reconstruct the secret.

  7. The LHC Lead Injector Chain

    CERN Document Server

    Beuret, A; Blas, A; Burkhardt, H; Carli, Christian; Chanel, M; Fowler, A; Gourber-Pace, M; Hancock, S; Hourican, M; Hill, C E; Jowett, John M; Kahle, K; Küchler, D; Lombardi, A M; Mahner, E; Manglunki, Django; Martini, M; Maury, S; Pedersen, F; Raich, U; Rossi, C; Royer, J P; Schindl, Karlheinz; Scrivens, R; Sermeus, L; Shaposhnikova, Elena; Tranquille, G; Vretenar, Maurizio; Zickler, T

    2004-01-01

    A sizeable part of the LHC physics programme foresees lead-lead collisions with a design luminosity of 1027 cm-2 s-1. This will be achieved after an upgrade of the ion injector chain comprising Linac3, LEIR, PS and SPS machines [1,2]. Each LHC ring will be filled in 10 min by almost 600 bunches, each of 7×107 lead ions. Central to the scheme is the Low Energy Ion Ring (LEIR) [3,4], which transforms long pulses from Linac3 into high-brilliance bunches by means of multi-turn injection, electron cooling and accumulation. Major limitations along the chain, including space charge, intrabeam scattering, vacuum issues and emittance preservation are highlighted. The conversion from LEAR (Low Energy Antiproton Ring) to LEIR involves new magnets and power converters, high-current electron cooling, broadband RF cavities, and a UHV vacuum system with getter (NEG) coatings to achieve a few 10-12 mbar. Major hardware changes in Linac3 and the PS are also covered. An early ion scheme with fewer bunches (but each at nominal...

  8. O2O - Based Agricultural Products Supply Chain Process Integration Optimization Based on Internet +

    OpenAIRE

    Li Huijuan

    2017-01-01

    Traditional wholesale and retail, electricity supplier of agricultural products supply chain have many difficulties. The O2O supply chain of agricultural products of “Internet+”, committed to the integration of online and offline advantage process, has become the main direction of the agricultural products supply chain transformation. Practice operation results show that O2O supply chain can effectively play the advantages of online and offline process integration, but its further development...

  9. Invisible axion in the hidden sector of no-scale supergravity

    International Nuclear Information System (INIS)

    Sato, Hikaru

    1987-01-01

    We propose a new axion model which incorporates the U(1) PQ symmetry into a hidden sector, as well as an observable sector, of no-scale supergravity models. The axion is a spin-zero field in the hidden sector. The U(1) PQ symmetry is naturally embedded in the family symmetry of the no-scale models. Invisible axions live in the gravity hidden sector without conflict with the cosmological and astrophysical constraints. (orig.)

  10. A Hidden Markov Model Representing the Spatial and Temporal Correlation of Multiple Wind Farms

    DEFF Research Database (Denmark)

    Fang, Jiakun; Su, Chi; Hu, Weihao

    2015-01-01

    To accommodate the increasing wind energy with stochastic nature becomes a major issue on power system reliability. This paper proposes a methodology to characterize the spatiotemporal correlation of multiple wind farms. First, a hierarchical clustering method based on self-organizing maps is ado....... The proposed statistical modeling framework is compatible with the sequential power system reliability analysis. A case study on optimal sizing and location of fast-response regulation sources is presented.......To accommodate the increasing wind energy with stochastic nature becomes a major issue on power system reliability. This paper proposes a methodology to characterize the spatiotemporal correlation of multiple wind farms. First, a hierarchical clustering method based on self-organizing maps...... is adopted to categorize the similar output patterns of several wind farms into joint states. Then the hidden Markov model (HMM) is then designed to describe the temporal correlations among these joint states. Unlike the conventional Markov chain model, the accumulated wind power is taken into consideration...

  11. Hand Gesture Modeling and Recognition for Human and Robot Interactive Assembly Using Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Fei Chen

    2015-04-01

    Full Text Available Gesture recognition is essential for human and robot collaboration. Within an industrial hybrid assembly cell, the performance of such a system significantly affects the safety of human workers. This work presents an approach to recognizing hand gestures accurately during an assembly task while in collaboration with a robot co-worker. We have designed and developed a sensor system for measuring natural human-robot interactions. The position and rotation information of a human worker's hands and fingertips are tracked in 3D space while completing a task. A modified chain-code method is proposed to describe the motion trajectory of the measured hands and fingertips. The Hidden Markov Model (HMM method is adopted to recognize patterns via data streams and identify workers' gesture patterns and assembly intentions. The effectiveness of the proposed system is verified by experimental results. The outcome demonstrates that the proposed system is able to automatically segment the data streams and recognize the gesture patterns thus represented with a reasonable accuracy ratio.

  12. QRS complex detection based on continuous density hidden Markov models using univariate observations

    Science.gov (United States)

    Sotelo, S.; Arenas, W.; Altuve, M.

    2018-04-01

    In the electrocardiogram (ECG), the detection of QRS complexes is a fundamental step in the ECG signal processing chain since it allows the determination of other characteristics waves of the ECG and provides information about heart rate variability. In this work, an automatic QRS complex detector based on continuous density hidden Markov models (HMM) is proposed. HMM were trained using univariate observation sequences taken either from QRS complexes or their derivatives. The detection approach is based on the log-likelihood comparison of the observation sequence with a fixed threshold. A sliding window was used to obtain the observation sequence to be evaluated by the model. The threshold was optimized by receiver operating characteristic curves. Sensitivity (Sen), specificity (Spc) and F1 score were used to evaluate the detection performance. The approach was validated using ECG recordings from the MIT-BIH Arrhythmia database. A 6-fold cross-validation shows that the best detection performance was achieved with 2 states HMM trained with QRS complexes sequences (Sen = 0.668, Spc = 0.360 and F1 = 0.309). We concluded that these univariate sequences provide enough information to characterize the QRS complex dynamics from HMM. Future works are directed to the use of multivariate observations to increase the detection performance.

  13. Hidden Markov model approach for identifying the modular framework of the protein backbone.

    Science.gov (United States)

    Camproux, A C; Tuffery, P; Chevrolat, J P; Boisvieux, J F; Hazout, S

    1999-12-01

    The hidden Markov model (HMM) was used to identify recurrent short 3D structural building blocks (SBBs) describing protein backbones, independently of any a priori knowledge. Polypeptide chains are decomposed into a series of short segments defined by their inter-alpha-carbon distances. Basically, the model takes into account the sequentiality of the observed segments and assumes that each one corresponds to one of several possible SBBs. Fitting the model to a database of non-redundant proteins allowed us to decode proteins in terms of 12 distinct SBBs with different roles in protein structure. Some SBBs correspond to classical regular secondary structures. Others correspond to a significant subdivision of their bounding regions previously considered to be a single pattern. The major contribution of the HMM is that this model implicitly takes into account the sequential connections between SBBs and thus describes the most probable pathways by which the blocks are connected to form the framework of the protein structures. Validation of the SBBs code was performed by extracting SBB series repeated in recoding proteins and examining their structural similarities. Preliminary results on the sequence specificity of SBBs suggest promising perspectives for the prediction of SBBs or series of SBBs from the protein sequences.

  14. Understanding the supply chain

    Directory of Open Access Journals (Sweden)

    Aćimović Slobodan

    2006-01-01

    Full Text Available Supply chain management represents new business philosophy and includes strategically positioned and much wider scope of activity in comparison with its "older brother" - management of logistics. Philosophy of the concept of supply chain is directed to more coordination of key business functions of every link in distribution chain in the process of organization of the flow of both goods and information, while logistic managing instruments are focused on internal optimum of flows of goods and information within one company. Applying the concept of integrated supply chain among several companies makes the importance of operative logistics activity even greater on the level of one company, thus advancing processes of optimum and coordination within and between different companies and confirms the importance of logistics performances for the company’s profitability. Besides the fact that the borders between companies are being deleted, this concept of supply chain in one distribution channel influences increasing of importance of functional, i.e. traditional business managing approaches but instead it points out the importance of process managing approaches. Although the author is aware that "there is nothing harder, more dangerous and with uncertain success, but to find a way for introducing some novelties (Machiavelli, it would be even his additional stimulation for trying to bring closer the concept and goals of supply chain implementation that are identified in key, relevant, modern, theoretical and consulting approaches in order to achieve better understanding of the subject and faster implementation of the concept of supply chain management by domestic companies.

  15. Learning and inference in a nonequilibrium Ising model with hidden nodes.

    Science.gov (United States)

    Dunn, Benjamin; Roudi, Yasser

    2013-02-01

    We study inference and reconstruction of couplings in a partially observed kinetic Ising model. With hidden spins, calculating the likelihood of a sequence of observed spin configurations requires performing a trace over the configurations of the hidden ones. This, as we show, can be represented as a path integral. Using this representation, we demonstrate that systematic approximate inference and learning rules can be derived using dynamical mean-field theory. Although naive mean-field theory leads to an unstable learning rule, taking into account Gaussian corrections allows learning the couplings involving hidden nodes. It also improves learning of the couplings between the observed nodes compared to when hidden nodes are ignored.

  16. Complicated basins and the phenomenon of amplitude death in coupled hidden attractors

    Energy Technology Data Exchange (ETDEWEB)

    Chaudhuri, Ushnish [Department of Physics, Sri Venkateswara College, University of Delhi, New Delhi 110021 (India); Department of Physics, National University of Singapore, Singapore 117551 (Singapore); Prasad, Awadhesh, E-mail: awadhesh@physics.du.ac.in [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India)

    2014-02-07

    Understanding hidden attractors, whose basins of attraction do not contain the neighborhood of equilibrium of the system, are important in many physical applications. We observe riddled-like complicated basins of coexisting hidden attractors both in coupled and uncoupled systems. Amplitude death is observed in coupled hidden attractors with no fixed point using nonlinear interaction. A new route to amplitude death is observed in time-delay coupled hidden attractors. Numerical results are presented for systems with no or one stable fixed point. The applications are highlighted.

  17. Incremental discovery of hidden structure: Applications in theory of elementary particles

    International Nuclear Information System (INIS)

    Zytkow, J.M.; Fischer, P.J.

    1996-01-01

    Discovering hidden structure is a challenging, universal research task in Physics, Chemistry, Biology, and other disciplines. Not only must the elements of hidden structure be postulated by the discoverer, but they can only be verified by indirect evidence, at the level of observable objects. In this paper we describe a framework for hidden structure discovery, built on a constructive definition of hidden structure. This definition leads to operators that build models of hidden structure step by step, postulating hidden objects, their combinations and properties, reactions described in terms of hidden objects, and mapping between the hidden and the observed structure. We introduce the operator dependency diagram, which shows the order of operator application and model evaluation. Different observational knowledge supports different evaluation criteria, which lead to different search systems with verifiable sequences of operator applications. Isomorph-free structure generation is another issue critical for efficiency of search. We apply our framework in the system GELL-MANN, that hypothesizes hidden structure for elementary particles and we present the results of a large scale search for quark models

  18. Hidden role of Maxwell superalgebras in the free differential algebras of D = 4 and D = 11 supergravity

    Science.gov (United States)

    Ravera, Lucrezia

    2018-03-01

    The purpose of this paper is to show that the so-called Maxwell superalgebra in four dimensions, which naturally involves the presence of a nilpotent fermionic generator, can be interpreted as a hidden superalgebra underlying N=1, {D}=4 supergravity extended to include a 2-form gauge potential associated to a 2-index antisymmetric tensor. In this scenario, the theory is appropriately discussed in the context of Free Differential Algebras (an extension of the Maurer-Cartan equations to involve higher-degree differential forms). The study is then extended to the Free Differential Algebra describing D = 11 supergravity, showing that, also in this case, there exists a super-Maxwell algebra underlying the theory. The same extra spinors dual to the nilpotent fermionic generators whose presence is crucial for writing a supersymmetric extension of the Maxwell algebras, both in the D = 4 and in the D = 11 case, turn out to be fundamental ingredients also to reproduce the D = 4 and D = 11 Free Differential Algebras on ordinary superspace, whose basis is given by the supervielbein. The analysis of the gauge structure of the supersymmetric Free Differential Algebras is carried on taking into account the gauge transformations from the hidden supergroup-manifold associated with the Maxwell superalgebras.

  19. Plastic value chains

    DEFF Research Database (Denmark)

    Baxter, John; Wahlstrom, Margareta; Zu Castell-Rüdenhausen, Malin

    2014-01-01

    Optimizing plastic value chains is regarded as an important measure in order to increase recycling of plastics in an efficient way. This can also lead to improved awareness of the hazardous substances contained in plastic waste, and how to avoid that these substances are recycled. As an example......, plastics from WEEE is chosen as a Nordic case study. The project aims to propose a number of improvements for this value chain together with representatives from Nordic stakeholders. Based on the experiences made, a guide for other plastic value chains shall be developed....

  20. Project Decision Chain

    DEFF Research Database (Denmark)

    Rolstadås, Asbjørn; Pinto, Jeffrey K.; Falster, Peter

    2015-01-01

    To add value to project performance and help obtain project success, a new framework for decision making in projects is defined. It introduces the project decision chain inspired by the supply chain thinking in the manufacturing sector and uses three types of decisions: authorization, selection......, and plan decision. A primitive decision element is defined where all the three decision types can be accommodated. Each task in the primitive element can in itself contain subtasks that in turn will comprise new primitive elements. The primitive elements are nested together in a project decision chain....

  1. Discriminative training of self-structuring hidden control neural models

    DEFF Research Database (Denmark)

    Sørensen, Helge Bjarup Dissing; Hartmann, Uwe; Hunnerup, Preben

    1995-01-01

    This paper presents a new training algorithm for self-structuring hidden control neural (SHC) models. The SHC models were trained non-discriminatively for speech recognition applications. Better recognition performance can generally be achieved, if discriminative training is applied instead. Thus...... we developed a discriminative training algorithm for SHC models, where each SHC model for a specific speech pattern is trained with utterances of the pattern to be recognized and with other utterances. The discriminative training of SHC neural models has been tested on the TIDIGITS database...

  2. The "Hidden Homeless" in Japan’s Contemporary Mobile Culture

    Directory of Open Access Journals (Sweden)

    Miya Yoshida

    2014-04-01

    Full Text Available Mobile telephony and all it ensues has frequently gained incredible attention due to the massive impacts, which has had on the organization of daily life as well as on popular and youth cultures. This has been widely discussed in recent years as one significant aspect of the changes brought by the device; however that is not all. Attributed to capitalism, there are other, very contemporary socio-political issues at stake around the mobile telephone, especially among the younger people. In my article, I will focus on one specific phenomenon in Japanese society where the media have taken to speaking of so-called "hidden homeless".

  3. Everyday calculus discovering the hidden math all around us

    CERN Document Server

    Fernandez, Oscar E

    2014-01-01

    Calculus. For some of us, the word conjures up memories of ten-pound textbooks and visions of tedious abstract equations. And yet, in reality, calculus is fun, accessible, and surrounds us everywhere we go. In Everyday Calculus, Oscar Fernandez shows us how to see the math in our coffee, on the highway, and even in the night sky. Fernandez uses our everyday experiences to skillfully reveal the hidden calculus behind a typical day's events. He guides us through how math naturally emerges from simple observations-how hot coffee cools down, for example-and in discussions of over fifty familia

  4. Overcoming the Law of the Hidden in Cyberinfrastructures.

    Science.gov (United States)

    Bucksch, Alexander; Das, Abhiram; Schneider, Hannah; Merchant, Nirav; Weitz, Joshua S

    2017-02-01

    Cyberinfrastructure projects (CIPs) are complex, integrated systems that require interaction and organization amongst user, developer, hardware, technical infrastructure, and funding resources. Nevertheless, CIP usability, functionality, and growth do not scale with the sum of these resources. Instead, growth and efficient usage of CIPs require access to 'hidden' resources. These include technical resources within CIPs as well as social and functional interactions among stakeholders. We identify approaches to overcome resource limitations following the conceptual basis of Liebig's Law of the Minimum. In so doing, we recommend practical steps towards efficient and scaleable resource use, taking the iPlant/CyVerse CIP as an example. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Hidden symmetries in one-dimensional quantum Hamiltonians

    International Nuclear Information System (INIS)

    Curado, E.M.F.; Rego-Monteiro, M.A.; Nazareno, H.N.

    2000-11-01

    We construct a Heisenberg-like algebra for the one dimensional infinite square-well potential in quantum mechanics. The number-type and ladder operators are realized in terms of physical operators of the system as in the harmonic oscillator algebra. These physical operators are obtained with the help of variables used in a recently developed non commutative differential calculus. This square-well algebra is an example of an algebra in large class of generalized Heisenberg algebras recently constructed. This class of algebras also contains q-oscillators as a particular case. We also show here how this general algebra can address hidden symmetries present in several quantum systems. (author)

  6. New ALPS results on hidden-sector lightweights

    Energy Technology Data Exchange (ETDEWEB)

    Ehret, Klaus [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Frede, Maik [Laser Zentrum Hannover e.V., Hollerithallee 8, D-30419 Hannover (Germany); Ghazaryan, Samvel [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Hildebrandt, Matthias [Laser Zentrum Hannover e.V., Hollerithallee 8, D-30419 Hannover (Germany); Knabbe, Ernst-Axel [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Kracht, Dietmar [Laser Zentrum Hannover e.V., Hollerithallee 8, D-30419 Hannover (Germany); Lindner, Axel, E-mail: axel.lindner@desy.d [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); List, Jenny [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Meier, Tobias [Max-Planck-Institute for Gravitational Physics, Albert-Einstein-Institute, Institut fuer Gravitationsphysik, Leibniz Universitaet, Hannover, Callinstrasse 38, D-30167 Hannover (Germany); Meyer, Niels; Notz, Dieter; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Wiedemann, Guenter [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany); Willke, Benno [Max-Planck-Institute for Gravitational Physics, Albert-Einstein-Institute, Institut fuer Gravitationsphysik, Leibniz Universitaet, Hannover, Callinstrasse 38, D-30167 Hannover (Germany)

    2010-05-31

    The ALPS Collaboration runs a 'Light Shining through a Wall' (LSW) experiment to search for photon oscillations into 'Weakly Interacting Sub-eV Particles' (WISPs) often predicted by extensions of the Standard Model. The experiment is set up around a superconducting HERA dipole magnet at the site of DESY. Due to several upgrades of the experiment we are able to place limits on the probability of photon-WISP-photon conversions of a fewx10{sup -25}. These limits result in today's most stringent laboratory constraints on the existence of low mass axion-like particles, hidden photons and minicharged particles.

  7. Hidden vortex lattices in a thermally paired superfluid

    International Nuclear Information System (INIS)

    Dahl, E. K.; Sudboe, A.; Babaev, E.

    2008-01-01

    We study the evolution of rotational response of a statistical mechanical model of two-component superfluid with a nondissipative drag interaction as the system undergoes a transition into a paired superfluid phase at finite temperature. The transition manifests itself in a change of (i) vortex-lattice symmetry and (ii) nature of the vortex state. Instead of a vortex lattice, the system forms a highly disordered tangle which constantly undergoes merger and reconnecting processes involving different types of vortices with a 'hidden' breakdown of translation symmetry

  8. Abdominal candidiasis is a hidden reservoir of echinocandin resistance.

    Science.gov (United States)

    Shields, Ryan K; Nguyen, M Hong; Press, Ellen G; Clancy, Cornelius J

    2014-12-01

    FKS mutant Candida isolates were recovered from 24% (6/25) of abdominal candidiasis patients exposed to echinocandin. Candida glabrata (29%) and Candida albicans (14%) mutants were identified. Multidrug-resistant bacteria were recovered from 83% of FKS mutant infections. Mutations were associated with prolonged echinocandin exposure (P = 0.01), breakthrough infections (P = 0.03), and therapeutic failures despite source control interventions (100%). Abdominal candidiasis is a hidden reservoir for the emergence of echinocandin-resistant Candida. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  9. Hidden Markov processes theory and applications to biology

    CERN Document Server

    Vidyasagar, M

    2014-01-01

    This book explores important aspects of Markov and hidden Markov processes and the applications of these ideas to various problems in computational biology. The book starts from first principles, so that no previous knowledge of probability is necessary. However, the work is rigorous and mathematical, making it useful to engineers and mathematicians, even those not interested in biological applications. A range of exercises is provided, including drills to familiarize the reader with concepts and more advanced problems that require deep thinking about the theory. Biological applications are t

  10. Hidden long evolutionary memory in a model biochemical network

    Science.gov (United States)

    Ali, Md. Zulfikar; Wingreen, Ned S.; Mukhopadhyay, Ranjan

    2018-04-01

    We introduce a minimal model for the evolution of functional protein-interaction networks using a sequence-based mutational algorithm, and apply the model to study neutral drift in networks that yield oscillatory dynamics. Starting with a functional core module, random evolutionary drift increases network complexity even in the absence of specific selective pressures. Surprisingly, we uncover a hidden order in sequence space that gives rise to long-term evolutionary memory, implying strong constraints on network evolution due to the topology of accessible sequence space.

  11. Quantum interference of probabilities and hidden variable theories

    International Nuclear Information System (INIS)

    Srinivas, M.D.

    1984-01-01

    One of the fundamental contributions of Louis de Broglie, which does not get cited often, has been his analysis of the basic difference between the calculus of the probabilities as predicted by quantum theory and the usual calculus of probabilities - the one employed by most mathematicians, in its standard axiomatised version due to Kolmogorov. This paper is basically devoted to a discussion of the 'quantum interference of probabilities', discovered by de Broglie. In particular, it is shown that it is this feature of the quantum theoretic probabilities which leads to some serious constraints on the possible 'hidden-variable formulations' of quantum mechanics, including the celebrated theorem of Bell. (Auth.)

  12. Dark matter and dark forces from a supersymmetric hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, S.; Goodsell, M.D.; Ringwald, A.

    2011-09-15

    We show that supersymmetric ''Dark Force'' models with gravity mediation are viable. To this end, we analyse a simple supersymmetric hidden sector model that interacts with the visible sector via kinetic mixing of a light Abelian gauge boson with the hypercharge. We include all induced interactions with the visible sector such as neutralino mass mixing and the Higgs portal term. We perform a detailed parameter space scan comparing the produced dark matter relic abundance and direct detection cross-sections to current experiments. (orig.)

  13. Uncovering the Hidden Transaction Costs of Market Power

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai J.; Klein, Peter G.

    2018-01-01

    A central construct in competitive strategy research is market power, the ability to raise price above marginal cost. Positioning research focuses on attempts to build, protect, and exercise market power. However, this approach contains hidden assumptions about transaction costs. Parties made worse...... off by the exercise of market power can negotiate, bargain, form coalitions, and otherwise contract around the focal firm's attempts to appropriate monopoly profits—depending on transaction costs. We build on property rights economics to explain how transaction costs affect positioning and offer...

  14. Characterization of prokaryotic and eukaryotic promoters using hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Anders Gorm; Baldi, P.; Chauvin, Y.

    1996-01-01

    In this paper we utilize hidden Markov models (HMMs) and information theory to analyze prokaryotic and eukaryotic promoters. We perform this analysis with special emphasis on the fact that promoters are divided into a number of different classes, depending on which polymerase-associated factors...... that bind to them. We find that HMMs trained on such subclasses of Escherichia coli promoters (specifically, the so-called sigma 70 and sigma 54 classes) give an excellent classification of unknown promoters with respect to sigma-class. HMMs trained on eukaryotic sequences from human genes also model nicely...

  15. Scaling dimensions in hidden Kerr/CFT correspondence

    International Nuclear Information System (INIS)

    Lowe, David A.; Messamah, Ilies; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  16. Hidden-Markov-Model Analysis Of Telemanipulator Data

    Science.gov (United States)

    Hannaford, Blake; Lee, Paul

    1991-01-01

    Mathematical model and procedure based on hidden-Markov-model concept undergoing development for use in analysis and prediction of outputs of force and torque sensors of telerobotic manipulators. In model, overall task broken down into subgoals, and transition probabilities encode ease with which operator completes each subgoal. Process portion of model encodes task-sequence/subgoal structure, and probability-density functions for forces and torques associated with each state of manipulation encode sensor signals that one expects to observe at subgoal. Parameters of model constructed from engineering knowledge of task.

  17. New ALPS results on hidden-sector lightweights

    International Nuclear Information System (INIS)

    Ehret, Klaus; Ghazaryan, Samvel; Frede, Maik

    2010-01-01

    The ALPS collaboration runs a ''Light Shining through a Wall'' (LSW) experiment to search for photon oscillations into ''Weakly Interacting Sub-eV Particles'' (WISPs) often predicted by extensions of the Standard Model. The experiment is set up around a superconducting HERA dipole magnet at the site of DESY. Due to several upgrades of the experiment we are able to place limits on the probability of photon-WISP-photon conversions of a few x 10 -25 . These limits result in today's most stringent laboratory constraints on the existence of low mass axion-like particles, hidden photons and minicharged particles. (orig.)

  18. Hidden attraction the history and mystery of magnetism

    CERN Document Server

    Verschuur, Gerrit L

    1993-01-01

    Long one of nature's most fascinating phenomena, magnetism was once the subject of many superstitions. Magnets were thought useful to thieves, effective as a love potion or as a cure for gout or spasms. They could remove sorcery from women and put demons to flight and even reconcile married couples. It was said that a lodestone pickled in the salt of sucking fish had the power to attract gold. Today, these beliefs have been put aside, but magnetism is no less remarkable for our modern understanding of it. In Hidden Attraction, Gerrit L. Verschuur, a noted astronomer and National Book Award nom

  19. Hidden Symmetries for Thermodynamics and Emergence of Relativity

    International Nuclear Information System (INIS)

    Zhao Liu

    2010-01-01

    Erik Verlinde recently proposed an idea about the thermodynamic origin of gravity. Though this is a beautiful idea, which may resolve many long standing problems in the theories of gravity, it also raises many other problems. In this article I will comment on some of the problems of Verlinde's proposal with special emphasis on the thermodynamical origin of the principle of relativity. It is found that there is a large group of hidden symmetries of thermodynamics, which contains the Poincare group of the spacetime for which space is emergent. This explains the thermodynamic origin of the principle of relativity. (general)

  20. Hidden Markov models for the activity profile of terrorist groups

    OpenAIRE

    Raghavan, Vasanthan; Galstyan, Aram; Tartakovsky, Alexander G.

    2012-01-01

    The main focus of this work is on developing models for the activity profile of a terrorist group, detecting sudden spurts and downfalls in this profile, and, in general, tracking it over a period of time. Toward this goal, a $d$-state hidden Markov model (HMM) that captures the latent states underlying the dynamics of the group and thus its activity profile is developed. The simplest setting of $d=2$ corresponds to the case where the dynamics are coarsely quantized as Active and Inactive, re...