WorldWideScience

Sample records for hidden treasures competition

  1. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  2. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  3. Bryozoans, the remedy hidden treasures of oceans: secondary metabolites

    Directory of Open Access Journals (Sweden)

    Gholamhosean Mohebbi

    2016-01-01

    Full Text Available Bryozoans, commonly known as “moss animals”, are typically aquatic, filter feeding, sessile, colonial marine animals. Although, they are a rich resource of new bioactive secondary metabolites, but studies on their secondary metabolite have been neglected. Although over 8000 species are known, the lowest numbers of novel compounds were isolated from the phylum Bryozoa. In addition, presently nothing is recognized regarding the origin of the bioactive compounds isolated by bryozoans. At present nothing is known regarding the origin of the natural products isolated by bryozoans. The most famous of compounds obtained from these organisms are macrolide lactones of Bryostatins. They are potent modulators of protein kinase C. The amazing compounds such as Flustramines, Hinckdentine, Convolutamines, Kororamides, Chatellines, Chartellamides, Convolutamines, Convolutamidines, euthyroideone, amathaspiramide, lutamides, Volutamides, tambjamines, Phidolopins, and dozens of other compounds with different biological properties have been obtained. Very few studies have been done on these treasures in the sea depth, and more studies need to be done on them for access to their secondary metabolites.

  4. Hidden Treasure

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    There are many times I feel close to going crazy in Beijing.The overhooting horns and the dangerous driving of local drivers are slowly driving us cyclists to extinction,here in the bicyclecapital of the world.

  5. Hidden Treasure.

    Science.gov (United States)

    Clayton, Pamela; Euscher, Gisela

    2001-01-01

    Over 100 women immigrants were interviewed in the United Kingdom, Denmark, Czech Republic, and Germany. Two-thirds had participated in higher education in their home countries, one-third had degrees, some had owned businesses, and over half had good English skills. Despite their qualifications, only five were currently not underemployed. (SK)

  6. Subject description of non-fiction literature for adults: expert-theoretical basis for the realisation of the »Hidden Treasure« research project

    OpenAIRE

    Andrej Pogorelec; Alenka Šauperl; Milojka Miklavčič; Darja Šesek; Savina Zwitter

    2004-01-01

    Library users searching through non-fiction library material by subject in online OPACs, expect to be able to search fiction by subject as well. The research project Skriti zaklad (Hidden Treasure) was launched in 2002 and was aimed at improving the current subject description of non-juvenile literary works in Slovenian libraries. An overview of the current practice of fiction subject description in Slovenian libraries revealed that Universal Decimal Classification class numbers are usually a...

  7. Wildlife: a hidden treasure of green places in urbanized societies? : A study into whether and how wildlife contributes to a bond with green places among lay people in the Netherlands

    NARCIS (Netherlands)

    Folmer, Akke

    2016-01-01

    Wildlife: a hidden treasure of green places in urbanized societies In my thesis, I investigate how wildlife contributes to a bond with green places on different spatial scales among lay people in the Netherlands. The results show that wildlife matters in the bond with green places both near home, an

  8. Subject description of non-fiction literature for adults: expert-theoretical basis for the realisation of the »Hidden Treasure« research project

    Directory of Open Access Journals (Sweden)

    Andrej Pogorelec

    2004-01-01

    Full Text Available Library users searching through non-fiction library material by subject in online OPACs, expect to be able to search fiction by subject as well. The research project Skriti zaklad (Hidden Treasure was launched in 2002 and was aimed at improving the current subject description of non-juvenile literary works in Slovenian libraries. An overview of the current practice of fiction subject description in Slovenian libraries revealed that Universal Decimal Classification class numbers are usually assigned, while subject headings or abstracts are scarce. The article presents a model designed for subject description of fiction, with special emphasis on subject headings, for the Bežigrad High School Library and the Bežigrad Public Library (both in Ljubljana.

  9. TREASURE HUNT

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A Chinese NGO aims to develop a model for recovering Chinese cultural treasures overseas On May 9, the first group of Chinese collectors taking part in an "Overseas Treasure Hunting Activity" arrived back in Beijing after a one-week trip to Japan. On their visit to Tokyo, Yokohama, Nagoya, Kyoto and Osaka, they found about 20 rare Chinese cultural relics of significant value. Since the Opium War in 1840, large quantities of Chinese treasures have been taken abroad. According to statistics from the China ...

  10. Detection of hidden hazelnut protein in food by IgY-based indirect competitive enzyme-immunoassay

    NARCIS (Netherlands)

    Baumgartner, S.; Bremer, M.G.E.G.; Kemmers - Voncken, A.E.M.; Smits, N.G.E.; Haasnoot, W.; Banks, J.; Reece, P.; Danks, C.; Tomkies, V.; Immer, U.; Schmitt, K.; Krska, R.

    2004-01-01

    The development of an indirect competitive enzyme-immunoassay for the detection of hidden hazelnut protein in complex food matrices is described. A sensitive and selective polyclonal antibody was raised by immunisation of laying hens with protein extracts from roasted hazelnuts. In contrast to tradi

  11. Geochemical Treasure Hunt for Primary School Children

    Science.gov (United States)

    Tesmer, Maja; Frick, Daniel; Gerrits, Ruben; des GFZ-GeoWunderWerkstatt, Schülerlabor

    2017-04-01

    How can you inspire school children for geochemistry, and scientific exploratory urge? The key is to raise their curiosity and make learning new things a hands-on experience. The Fellows of the European Marie Curie Initial Training Network IsoNose designed and established a "Geochemical Treasure Hunt" to excite children for scientific investigations. This workshop explains primary school children the research and scientific methods of isotopic geochemistry, and their use to understand processes on the Earth's surface. From obtaining 'samples', performing various experiments, the school children gather clues leading them to the hidden treasure on the Telegrafenberg (campus of the GFZ Potsdam). The course was designed for school children to learn hands-on the meaning of elements, atoms and isotopes. In small groups the children conduct experiments of simplified methods being indispensable to any isotope geochemist. However, prior to working in any laboratory environment, a security briefing is necessary. For the course, two stages were implemented; firstly the use of harmful substances and dangerous equipment was minimised, and secondly children were equipped with size-matched personal protective equipment (lab coats, gloves, and safety googles). The purification of elements prior to isotopic analysis was visualised using colour chromatography. However, instead of using delicate mass spectrometers for the isotope ratio measurements, the pupils applied flame spectroscopy to analyse their dissolved and purified mineral solutions. Depending on the specific element present, a different colour was observed in the flame. The children plotted their colours of the flame spectroscopy onto a map and by interpreting the emerging colour patterns they localized the treasure on the map. In small teams they swarmed out on the Telegrafenberg to recover the hidden treasure. The project leading to this outreach activity has received funding from the People Programme (Marie Curie

  12. Light-Emitting Diodes: A Hidden Treasure

    Science.gov (United States)

    Planinšic, Gorazd; Etkina, Eugenia

    2014-01-01

    LEDs, or light-emitting diodes, are cheap, easy to purchase, and thus commonly used in physics instruction as indicators of electric current or as sources of light (Fig. 1). In our opinion LEDs represent a unique piece of equipment that can be used to collect experimental evidence, and construct and test new ideas in almost every unit of a general…

  13. Light-Emitting Diodes: A Hidden Treasure

    Science.gov (United States)

    Planinšic, Gorazd; Etkina, Eugenia

    2014-01-01

    LEDs, or light-emitting diodes, are cheap, easy to purchase, and thus commonly used in physics instruction as indicators of electric current or as sources of light (Fig. 1). In our opinion LEDs represent a unique piece of equipment that can be used to collect experimental evidence, and construct and test new ideas in almost every unit of a general…

  14. Treasures of the Southern Sky

    CERN Document Server

    Gendler, Robert; Malin, David

    2011-01-01

    In these pages, the reader can follow the engaging saga of astronomical exploration in the southern hemisphere, in a modern merger of aesthetics, science, and a story of human endeavor. This book is truly a celebration of southern skies.  Jerry Bonnell, Editor - Astronomy Picture of the Day The southern sky became accessible to scientific scrutiny only a few centuries ago, after the first European explorers ventured south of the equator. Modern observing and imaging techniques have since revealed what seems like a new Universe, previously hidden below the horizon, a fresh astronomical bounty of beauty and knowledge uniquely different from the northern sky. The authors have crafted a book that brings this hidden Universe to all, regardless of location or latitude. Treasures of the Southern Sky celebrates the remarkable beauty and richness of the southern sky in words and with world-class imagery. In part, a photographic anthology of deep sky wonders south of the celestial equator, this book also celebrates th...

  15. Competition

    CERN Multimedia

    Staff Association

    2017-01-01

    Get ready for the Easter Egg Hunt! The Staff Association is organising a competition from 10 to 21 April 2017. There are several Go Sport gift vouchers to win, with a value of 50 € each. Try your luck! Count the number of different eggs that we have hidden on our website. Then indicate your answer in the online form. To participate, you just need to be a member of the Staff Association. Winners will be randomly drawn among the correct answers.

  16. Newsweek Trash or Treasure

    Institute of Scientific and Technical Information of China (English)

    忘了

    2004-01-01

    Reading Newsweek has been a baffling experience for me. For years it had remained my coffee-table magazine constantly admired, occasionally touched, and never opened. When I finally mustered my courage to launch an adventurous and arduous journey into it, I was awed, fascinated, and then bored. My resolution to find out what was beneath the surface glitter turned into confusion--is Newsweek a treasure whose value I am unable to determine?

  17. Treasures on Show

    Institute of Scientific and Technical Information of China (English)

    YIN PUMIN

    2010-01-01

    @@ An exhibition of important relics and contemporary art pieces of China was held in Beijing on October 21-24,idisplaying the country's rich culture and its boundless charm. As the largest Chinese antique art fair,the Second Beijing China Art International Fair (BCAIF) offered a good opportunity for people to enjoy hundreds of the best and rare Chinese art treasures, said Yu Ping,Deputy Director of the Beijing Municipal Administration of Cultural Heritage, one of the sponsors of the fair.

  18. Takarajima: A Treasured Island

    Directory of Open Access Journals (Sweden)

    Philip Hayward

    2014-06-01

    Full Text Available This article examines the manner in which local identity can be constructed on small islands from the selective prioritisation and elaboration of exogenous elements that become localised by this process and can subsequently function as a brand within contemporary tourism markets. The particular analysis of identity motifs on Takarajima island that we expound examines aspects of the relationships between folklore and contemporary media and references contemporary debates concerning archaeology’s interface with folklore and popular culture in the context of (non-scientific ‘treasure hunting’.

  19. Bilgi Çağında Yeni Hazine: Entelektüel Sermaye ile Rekabeti Yakalamak / The New Treasure: Becoming more Competitive with Intellectual Capital

    Directory of Open Access Journals (Sweden)

    A. Semih İşevi

    2005-10-01

    Full Text Available The competitive superiority of companies in today’s so-called “knowledge era” depends on how they manage their “intellectual capital” rather than their financial and material sources. During the industrial age, which started with the invention of steam engine, the importance was attributed to the existence of factors labour and capital. Capital was composed of the machines, real estates etc. and the stocks and bonds that would be used to buy these. The products like cars that are real objects were being produced by the actual sources like land, raw materials, machines and tools. The main affluent sources were basing upon materialistic concepts, and consequently main strategies were being focused on the productivity

  20. George's cosmic treasure hunt

    CERN Document Server

    Hawking, Lucy; Parsons, Gary

    2009-01-01

    George and Annie explore the galaxy in this cosmic adventure from Stephen Hawking and Lucy Hawking, complete with essays from Professor Hawking about the latest in space travel. George is heartbroken when he learns that his friend Annie and her father are moving to the US. Eric has a new job working for the space program, looking for signs of life in the Universe. Eric leaves George with a gift—a book called The User’s Guide to the Universe. But Annie and Eric haven’t been gone for very long when Annie believes that she is being contacted by aliens, who have a terrible warning for her. George joins her in the US to help her with her quest—and before he knows it, he, Annie, Cosmos, and Annie’s annoying cousin Emmett have been swept up in a cosmic treasure hunt, spanning the whole galaxy and beyond. Lucy Hawking's own experiences in zero-gravity flight and interviews with astronauts at Cape Kennedy and the Johnson Space Center lend the book a sense of realism and excitement that is sure to fire up ima...

  1. Hidden Rules in Sports Competitions and the Governance%体育竞赛中的潜规则及其治理

    Institute of Scientific and Technical Information of China (English)

    韩新君; 吕玉萍; 谢伦立

    2014-01-01

    Hidden rules are the challenges to the credibility of sports competitions and they affect the stability of sports order. This study puts forward the concept of hidden rules in sports competitions, and lists the four typical sports competition rules - the home (host) tendency, power-money trade, fake match, corporal punishment. It further analy-zes from the following aspects: the tolerance of hidden rules, the extensiveness of the subject, the diversity of type, the complexity and difficulty of governance. It is suggested in the paper that hidden rules can be governed by strengthening the censorship of the competition rules, revising the defect rules, improving the transparency of sports organizations, in-troducing media involvement in the governess, speeding up the democratic process of sports organizations and introducing law procedures into the governess process.%潜规则是对体育竞赛公信力的挑战,影响体育秩序的稳定。研究提出了体育竞赛中潜规则的概念,列举了裁判主场(东道主)倾向、权钱交易、假赛、体罚四条典型的体育竞赛潜规则,并对潜规则的容忍度、主体的广泛性、类型的多元性以及治理的复杂性和艰巨性等特征进行了分析。建议通过加大体育竞赛显规则的审查力度,及时修订规则缺陷、增加体育组织的透明度,引入媒体参与治理、加快国际体育组织的民主进程、积极引入法律的治理四条途径,实现对体育竞赛中潜规则的有效治理。

  2. Treasure Along the Parker River.

    Science.gov (United States)

    Fitzpatrick, Ann-Marie; And Others

    Designed so that 100 to 125 heterogeneously grouped 7th and 8th grade students and a team of 5 core teachers might experience and discover the natural and historical "treasure" in the Parker River area of Massachusetts, this interdisciplinary unit centers on a hike to Parker River (6.7 miles) and visits to a cemetery, a monument, and Old Town…

  3. Competition

    NARCIS (Netherlands)

    Boone, J.

    2000-01-01

    Competition has been modelled in the literature in a number of ways.What do these different parametrizations of competition have in common?For instance, it turns out that it is not always the case that a rise in competition reduces price cost margins, industry wide profits or concentration.All param

  4. Papua New Guinea and China, Collaborating to Develope Hidden Treasures

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ Papua New Guiea(PNG)is and archipelago of some 600 islands,atolls and reefs in the South-west Pacific and lies Within the tropics south of the Equator.PNG is the largest timber exporter in the region of South Pacific and one of the five biggest fisheries in the world with abundant tuna in its maritime space.

  5. Stem cells-the hidden treasure: A strategic review

    Directory of Open Access Journals (Sweden)

    Hitesh Chopra

    2013-01-01

    Full Text Available In today′s scenario, medical and dental professionals face a mammoth task while treating perplexing medical situations like organ failure or tissue loss. Though, different strategies exist to replace them, but ideal one is the same natural tissue or organ. In this aspect, stem cells have emerged in a promising way to provide an ideal replacement. There are different types of stem cells starting from the embryonic stage referred to as human embryonic stem cells to adult stem cells. Though in dentistry stem cell research is lagging as compared to the medical field but still a lot progress has been achieved in recent years. The stem cells have been isolated from dental pulp, human exfoliated deciduous teeth, and apical papilla and so on. These stem cells have provided exciting results like dentin-pulp regeneration, periodontal regeneration but ambiguity still prevails. As a result, much has to be further researched before its clinical application becomes a reality. Hence, these stem cells opened a new avenue in the field of regenerative dentistry.

  6. Transforming governance or reinforcing hierarchies and competition: examining the public and hidden transcripts of the Global Fund and HIV in India.

    Science.gov (United States)

    Kapilashrami, Anuj; McPake, Barbara

    2013-09-01

    Global health initiatives (GHIs) have gained prominence as innovative and effective policy mechanisms to tackle global health priorities. More recent literature reveals governance-related challenges and their unintended health system effects. Much less attention is received by the relationship between these mechanisms, the ideas that underpin them and the country-level practices they generate. The Global Fund has leveraged significant funding and taken a lead in harmonizing disparate efforts to control HIV/AIDS. Its growing influence in recipient countries makes it a useful case to examine this relationship and evaluate the extent to which the dominant public discourse on Global Fund departs from the hidden resistances and conflicts in its operation. Drawing on insights from ethnographic fieldwork and 70 interviews with multiple stakeholders, this article aims to better understand and reveal the public and the hidden transcript of the Global Fund and its activities in India. We argue that while its public transcript abdicates its role in country-level operations, a critical ethnographic examination of the organization and governance of the Fund in India reveals a contrasting scenario. Its organizing principles prompt diverse actors with conflicting agendas to come together in response to the availability of funds. Multiple and discrete projects emerge, each leveraging control and resources and acting as conduits of power. We examine how management of HIV is punctuated with conflicts of power and interests in a competitive environment set off by the Fund protocol and discuss its system-wide effects. The findings also underscore the need for similar ethnographic research on the financing and policy-making architecture of GHIs.

  7. Competition.

    Science.gov (United States)

    Chambers, D W

    1997-01-01

    Our ambivalence toward competition can be traced to an unspoken preference for certain types of competition which give us an advantage over the types we value less. Four types are defined (a) pure (same rules, same objectives), (b) collaborative (same rules, shared objective), (c) market share (different rules, same objectives), and (d) market growth (different rules, value added orientation). The defining characteristics of the four types of competition are respectively: needing a referee, arguing over the spoils, differentiation and substitutability, and customer focus. Dentistry has features of all four types of competition, thus making it difficult to have a meaningful discussion or frame a coherent policy on this topic.

  8. Competition

    NARCIS (Netherlands)

    F. Bridoux

    2014-01-01

    Competition traditionally refers to the actions that firms take in a product market to outperform rivals in attracting customers and generating revenues. Yet, competition extends beyond product markets to other arenas such as factor markets, where firms compete for resources, and the political arena

  9. Competition

    Institute of Scientific and Technical Information of China (English)

    吕思思

    2007-01-01

    <正> The term competition reminds me of asoul-stirring fight between a mother monkeyand a crocodile,The crocodile caught her babywhen the baby was drinking water in a pool,Inthe end,the mother got her baby,but herbaby’s body only,She lost her child forever,just for a mouthful of water.Such is competition,cruel and merciless,But if we see the other side of the coin,we’ll

  10. Competition

    CERN Multimedia

    Staff Association

    2016-01-01

      The Staff Association is organising a competition from 13 to 21 December 2016. There are several Go Sport vouchers to win with a value of 50 € each. Try your luck! To participate, you just have to be a member of the Staff Association and take the online quiz: https://ap-vote.web.cern.ch/content/jeu-concours-de-noel. The winners will be drawn among the correct answers.

  11. Competition

    CERN Multimedia

    Staff Association

    2016-01-01

      The Staff Association is organising a competition from April 11 to 20. There are several Go Sport gift vouchers with a value of 50 € each to win. Try your luck! To participate, you just have to be a member of the Staff Association and take the online quiz: https://ap-vote.web.cern.ch/content/jeu-concours. The winners will be drawn among the correct answers.

  12. 76 FR 66965 - Treasure Coast Specialty Pharmacy Decision and Order

    Science.gov (United States)

    2011-10-28

    ... Enforcement Administration Treasure Coast Specialty Pharmacy Decision and Order On September 14, 2011... Registration, BT9856002, issued to Treasure Coast Specialty Pharmacy, be, and it hereby is, revoked. I further order that any pending application of Treasure Coast Specialty Pharmacy, to renew or modify his...

  13. TREASURES AT THE SHENYANG PALACE MUSEUM

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    Shenyang Palace Museum was established in 1926,and became a museum of history and art based on the former imperial palace.It houses treasures,palace articles and historical and cultural artifacts originally collected by the Qing Court.These include Ming

  14. Florida's Trails to History's Treasures : Vol.1

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is a history book for treasure hunters. During the 1700's, pirates are believed to have had a camp on St. Vincent Island. It is reported that there are several...

  15. Treasure Valley Health Manpower and Education Profile.

    Science.gov (United States)

    Callen, John; And Others

    The profile is a concise description of the demographic and economic characteristics, existing health manpower employed, and health education programs for the Treasure Valley area of Idaho, one of seven surveyed in the Mountain States region (Idaho, Montana, Wyoming, and Nevada). The first section of the profile provides general population…

  16. The hidden dimensions of the competition effect: basal cortisol and basal testosterone jointly predict changes in salivary testosterone after social victory in men.

    Science.gov (United States)

    Zilioli, Samuele; Watson, Neil V

    2012-11-01

    Dominance struggles appear to affect hormone concentrations in many mammalian species, such that higher concentrations of testosterone are seen in winners of competitions, compared to losers. This so-called, "competition effect" has received inconsistent empirical support, suggesting that additional psychological (e.g., mood), situational (i.e., nature of the competition) and physiological (e.g., cortisol) variables might intervene in modulating testosterone fluctuations after social contests. We investigated possible interactions between the hypothalamic-pituitary-gonadal (HPG) axis and the hypothalamic-pituitary-adrenal (HPA) stress axis in predicting transient changes in testosterone after social victory or defeat on a familiar competitive task. In particular, the present study examined the dual-hormone hypothesis - proposing that baseline cortisol potently modulates the competition effect (Mehta and Josephs, 2010) - in a sample of healthy young men engaged in head-to-head competition on a widely played commercial videogame, Tetris. We found a significant interaction between HPG and HPA axes status and the competition effect on testosterone in the randomly assigned videogame winners, such that winners with a pre-competition combination of high baseline testosterone and low baseline cortisol exhibited significantly greater post-competition testosterone concentrations. The randomly assigned videogame losers showed significantly decreased post-competition levels of testosterone. Possible biological and evolutionary mechanisms underlying this phenomenon are discussed.

  17. DIGITAL TECHNOLOGY IN PRESERVATION OF BUDDIST MONASTERY TREASURES

    Directory of Open Access Journals (Sweden)

    A. Shaftel

    2017-08-01

    Full Text Available Treasure Caretaker Training (Digital Monastery Project, teaches Buddhist monks, nuns and community cultural caretakers to protect and preserve their own monastery sacred art treasures. Participants learn to create digital inventories by use of their own mobile phones. Included in this documentation is the video interview of elders who hold the oral history of many of the treasures. Risk assessment and disaster mitigation are taught.

  18. TIME RUNNING OUT FOR NATIONAL TREASURES

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Along with UNESCO proclaimed intangible cultural heritage, China has a national list of intangible cultural heritage with 518 entries.These intangi- ble national treasures are facing their toughest challenge to date in the ongo- ing fight against the unrelenting drive of urbanization and globalization. Without urgent attention many of these aspects of China’s rich history could be lost forever.Here we bring you a brief introduction of six art forms that, among many others,need protection.

  19. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  20. Geocaching: Finding Mathematics in a Global Treasure Hunt

    Science.gov (United States)

    Bragg, Leicha A.

    2014-01-01

    If you love taking mathematics lessons outdoors, then you will love this article. Leicha Bragg describes geocaching, which combines technology, treasure hunting and mathematics, and results in purposeful, authentic and engaging mathematics.

  1. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  2. ["Treasure Hunt"--a cognitive-behavioural computer game].

    Science.gov (United States)

    Brezinka, Veronika

    2011-01-01

    The development of video games promoting health related behaviour is increasing. This holds not only for chronic diseases like asthma and diabetes, but also for the field of child psychotherapy. At the Department of Child and Adolescent Psychiatry of Zürich University, the video game Treasure Hunt was developed to support psychotherapeutic treatment of children between eight and thirteen years of age. Treasure Hunt does not replace the therapist but supports treatment by offering attractive electronic work assignments. The scope of this article is an overview on health games for children and a description of Treasure Hunt. After the explanation of its therapeutic potentials, an evaluation based on questionnaires for therapists and children will be presented. 124 therapists answered a questionnaire on their impression of the game three months after download. 41 therapists were willing to participate in the further evaluation and sent questionnaires of 200 children with whom Treasure Hunt had been used. A limitation of these data is that a positive bias can not be excluded, as therapists with a positive attitude towards psychotherapeutic computer games were more likely to answer the questionnaire. 118 therapists (95.2%) considered Treasure Hunt a useful tool in child psychotherapy. 197 children (98.5%) report being satisfied with the use of the game during treatment. Treasure Hunt was predominantly used for the age group it is designed for and both, by very experienced and by young therapists. Eleven diagnostic categories reflect a broader range of indications than expected.

  3. 78 FR 28274 - Culturally Significant Objects Imported for Exhibition Determinations: “Medieval Treasures from...

    Science.gov (United States)

    2013-05-14

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Medieval Treasures from Hildesheim... determine that the objects to be included in the exhibition ``Medieval Treasures from Hildesheim,''...

  4. Tapping the oceans' mineral treasure

    Energy Technology Data Exchange (ETDEWEB)

    1974-06-01

    This report on ocean resources is the second of an energy-impact series, a collection of in depth articles aimed at adding perspective to an increasingly energy- conscious era. Governments and companies are rushing to cash in on the treasure trove beneath the sea: oil and gas, manganese, nickel, copper, and a wide range of other minerals. Large-scale exploitation of the oceans' natural resources is becoming a reality. Before these riches can be tapped, several questions must be answered: How far out does a nation's jurisdiction over its coastal resources extend. Should there be a uniform worldwide territorial limit. Who owns deep-ocean minerals lying far from any coast. What are the rights of passage of one country's ships through territorial waters of another. What are the limits of scientific research on the high seas. How can the vast wealth of the oceans be brought up with minimum impact on the environment. In an effort to answer these and other questions, delegates from 150 nations will assemble the week of June 20, 1974, in Caracas, Venez., for the United Nations Law of the Sea (LOS) conference. There, they will try to work out an international treaty to work some semblance of order into the existing patchwork of laws and regulations.

  5. THE KEY TO THE TREASURE IS THE TREASURE: BARTH’S METAFICTION IN CHIMERA

    Directory of Open Access Journals (Sweden)

    Katarina Drzajic

    2014-11-01

    Full Text Available John Barth, one of the most prominent postmodern authors, is famous for his creative literary games: while his favorite tool, metafiction, is at times hard to comprehend, he is almost always both the writer and a character of his stories. “Everyone is necessarily the hero of his own life story,” he said, thus confirming the quite loose difference between reality and fiction in post-modernism. Bearing in mind that the story within a story is a common characteristic of his work, in this paper we shall analyze the most interesting points at which we encounter this phenomenon an d discover what actually represents the treasure in one of his most perplexing, yet incredibly captivating novels, Chimera.

  6. Pirate Image:A Boy in the Novel Treasure Island

    Institute of Scientific and Technical Information of China (English)

    李美冬

    2014-01-01

    Literature related to the pirate theme had a strong foundation in British Empire.This study is to analyze a boy pirate image in the adventure novel Treasure Island written by Robert Stevenson,who created Jim Hawkins as a vivid pirate,combining both romanticism and realism.

  7. Pirate Image: A Boy in the Novel Treasure Island

    Institute of Scientific and Technical Information of China (English)

    李美冬

    2014-01-01

    Literature related to the pirate theme had a strong foundation in British Empire.This study is to analyze a boy pirate image in the adventure novel Treasure Island written by Robert Stevenson,who created Jim Hawkins as a vivid pirate,combining both romanticism and realism.

  8. Metaphors in "Treasures of Tutankhamen": Implications for Aesthetic Education.

    Science.gov (United States)

    Foss, Sonja K.; Radich, Anthony J.

    1984-01-01

    Art educators often have difficulty communicating because of assumptions people hold about art. Six metaphors identified in discussions about the Treasures of Tutankhamen exhibit--dealing with the themes of art as entertainment, wealth, volume, antiquity, superlative, and technique--are discussed in hopes that teachers will consider carefully each…

  9. Faster Treasure Hunt and Better Strongly Universal Exploration Sequences

    CERN Document Server

    Xin, Qin

    2012-01-01

    In this paper, we investigate the explicit deterministic treasure hunt problem in a $n$-vertex network. This problem was firstly introduced by Ta-Shma and Zwick in \\cite{TZ07} [SODA'07]. Note also it is a variant of the well known rendezvous problem in which one of the robot (the treasure) is always stationary. In this paper, we propose an $O(n^{c(1+\\frac{1}{\\lambda})})$-time algorithm for the treasure hunt problem, which significantly improves the currently best known result of running time $O(n^{2c})$ in \\cite{TZ07}, where $c$ is a constant induced from the construction of an universal exploration sequence in \\cite{R05,TZ07}, and $\\lambda \\gg 1$ is an arbitrary large, but fixed, integer constant. The treasure hunt problem also motivates the study of strongly universal exploration sequences. In this paper, we also propose a much better explicit construction for strongly universal exploration sequences compared to the one in \\cite{TZ07}.

  10. Reservoir potential of thin-bedded sandstone in continental mudrock successions - The search for hidden treasures

    NARCIS (Netherlands)

    Donselaar, M.E.; Bouman, L.; Noordijk, N.; Van Toorenenburg, K.A.; Weltje, G.J.

    2015-01-01

    The subsurface of the West European gas province contains up to several hundred meters thick continuous Upper Rotliegend and Lower Triassic mud rock sequences which have to date been labelled as nonreservoir ‘waste zone’. The mud rock formed as fluvial floodplain deposits in a semi-arid climate. The

  11. Hidden Treasure; Parents Search for Quality in Programs for Infants and Toddlers.

    Science.gov (United States)

    Mazyck, Aurelia; And Others

    The things that one can see in a child care program that identify it as a good program for babies and their families are described. The two main questions that are answered are: What is quality in an arrangement for infant care? and How is a parent to recognize it when it is found. The topics discussed are: (1) Involvement with Parents, Home, and…

  12. SNP and mutation data on the web - hidden treasures for uncovering.

    Science.gov (United States)

    Barnes, Michael R

    2002-01-01

    SNP data has grown exponentially over the last two years, SNP database evolution has matched this growth, as initial development of several independent SNP databases has given way to one central SNP database, dbSNP. Other SNP databases have instead evolved to complement this central database by providing gene specific focus and an increased level of curation and analysis on subsets of data, derived from the central data set. By contrast, human mutation data, which has been collected over many years, is still stored in disparate sources, although moves are afoot to move to a similar central database. These developments are timely, human mutation and polymorphism data both hold complementary keys to a better understanding of how genes function and malfunction in disease. The impending availability of a complete human genome presents us with an ideal framework to integrate both these forms of data, as our understanding of the mechanisms of disease increase, the full genomic context of variation may become increasingly significant.

  13. Finding hidden treasure: a 28-year case study for optimizing experimental designs

    Science.gov (United States)

    Field-based agronomic and genetic research is a decision-based process. Many decisions are required to design, conduct, analyze, and complete any field experiment. While these decisions are critical to the success of any research program, their importance is magnified for research on perennial crops...

  14. Fish oil replacement in current aquaculture feed: is cholesterol a hidden treasure for fish nutrition?

    Science.gov (United States)

    Norambuena, Fernando; Lewis, Michael; Hamid, Noor Khalidah Abdul; Hermon, Karen; Donald, John A; Turchini, Giovanni M

    2013-01-01

    Teleost fish, as with all vertebrates, are capable of synthesizing cholesterol and as such have no dietary requirement for it. Thus, limited research has addressed the potential effects of dietary cholesterol in fish, even if fish meal and fish oil are increasingly replaced by vegetable alternatives in modern aquafeeds, resulting in progressively reduced dietary cholesterol content. The objective of this study was to determine if dietary cholesterol fortification in a vegetable oil-based diet can manifest any effects on growth and feed utilization performance in the salmonid fish, the rainbow trout. In addition, given a series of studies in mammals have shown that dietary cholesterol can directly affect the fatty acid metabolism, the apparent in vivo fatty acid metabolism of fish fed the experimental diets was assessed. Triplicate groups of juvenile fish were fed one of two identical vegetable oil-based diets, with additional cholesterol fortification (high cholesterol; H-Chol) or without (low cholesterol; L-Chol), for 12 weeks. No effects were observed on growth and feed efficiency, however, in fish fed H-Col no biosynthesis of cholesterol, and a remarkably decreased apparent in vivo fatty acid β-oxidation were recorded, whilst in L-Chol fed fish, cholesterol was abundantly biosynthesised and an increased apparent in vivo fatty acid β-oxidation was observed. Only minor effects were observed on the activity of stearyl-CoA desaturase, but a significant increase was observed for both the transcription rate in liver and the apparent in vivo activity of the fatty acid Δ-6 desaturase and elongase, with increasing dietary cholesterol. This study showed that the possible effects of reduced dietary cholesterol in current aquafeeds can be significant and warrant future investigations.

  15. LM potencies: one of the hidden treasures of the sixth edition of the Organon.

    Science.gov (United States)

    De Schepper, L

    1999-07-01

    50 millesimal (LM) potencies have great advantages for all patients, not just those who are hypersensitive because of their great power to heal without major aggravations. Before discussing their advantages this paper describes what LM potencies are, and how they are administered, then addresses two questions: why do we want to avoid aggravations if most homeopaths look for aggravation to know if the remedy is working? And if LM potencies are indeed superior, why are they still relatively unknown and unused?

  16. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  17. Three Cultural and Art Treasure Houses in Tibet

    Institute of Scientific and Technical Information of China (English)

    1996-01-01

    THE Tibetan ethnic group,as a member of the family of the Chinese nation,has lived and worked on the Tibetan Plateau from ancient times.They have created a rich and colorful culture.Sakya Monastery, derge Press and Potala Palace,theree cultural and art treasure houses in Tibet,have completely preserved the culture and art of ancient Tibet,adding a glittering page to the culture and art of the motherland.

  18. The Papiamento – a linguistic treasure

    Directory of Open Access Journals (Sweden)

    Maya Choghari

    2015-12-01

    Full Text Available Papiamento, a creole language spoken by approximately 200.000 people on three Caribbean islands, Aruba, Bonaire and Curacao, has recently acquired official status and has been recognized as an official language, besides the Dutch in the Kingdom of The Netherlands. However, the privilege, which it enjoys today, is a result of many centuries of generations speaking it clandestinely and Papiamento had always been forced to subsist in the shadows of the languages spoken by its colonizers, mostly Spanish and Dutch.       Overall, this particular language contains traces of ancestral Arawak people, its native population, African influences brought to the island of Curacao, which was one of the biggest slave ports during centuries, as well as the influence of Portuguese and French but mostly of Dutch and Spanish.      In this great melting pot, people created this language in order to communicate with each other but it always had a secondary role, with its literature, its culture hidden until recently. However, what used to be just a pidgin at first turned into a mother tongue of a nation, conferring on Papiamento the status of a creole language.   The main objective of this article is to expose the history, the evolutions and the different influences, that contributed to the formation of this creole, which despite some controversies, is a Hispanic creole language. Seven stories have been selected to be analyzed in order to show the different influences in the Papiamento’s vocabulary and to reaffirm that Papiamento is a Hispanic creole language.

  19. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  20. The visigothic treasure of Torredonjimeno (Jaen, Spain): A study with IBA techniques

    Energy Technology Data Exchange (ETDEWEB)

    Perea, A. [Dpto. Prehistoria, Instituto de Historia, CSIC. C/ Serrano, 13. 28001 Madrid (Spain)]. E-mail: perea@ceh.csic.es; Climent-Font, A. [Dpto. Fisica Aplicada C-12, Universidad Autonoma Madrid, 28049 Madrid (Spain) and Centro de Micro-Analisis de Materiales, Universidad Autonoma Madrid, Campus de Cantoblanco, Edif. 22, Faraday 3, E-28049 Madrid (Spain)]. E-mail: acf@uam.em; Fernandez-Jimenez, M. [Centro de Micro-Analisis de Materiales, Universidad Autonoma Madrid, Campus de Cantoblanco, Edif. 22, Faraday 3, E-28049 Madrid (Spain); Parque Cientifico de Madrid, Campus de Cantoblanco - Pabellon C, 28049 Madrid (Spain); Enguita, O. [Centro de Micro-Analisis de Materiales, Universidad Autonoma Madrid, Campus de Cantoblanco, Edif. 22, Faraday 3, E-28049 Madrid (Spain); Gutierrez, P.C. [Centro de Micro-Analisis de Materiales, Universidad Autonoma Madrid, Campus de Cantoblanco, Edif. 22, Faraday 3, E-28049 Madrid (Spain); Calusi, S. [Centro de Micro-Analisis de Materiales, Universidad Autonoma Madrid, Campus de Cantoblanco, Edif. 22, Faraday 3, E-28049 Madrid (Spain); Dipartimento di Fisica dell' Universita di Firenze, Via Sansone 1, 50019 Sesto Fiorentino (Italy); Migliori, A. [Centro de Micro-Analisis de Materiales, Universidad Autonoma Madrid, Campus de Cantoblanco, Edif. 22, Faraday 3, E-28049 Madrid (Spain); Dipartimento di Fisica dell' Universita di Firenze, Via Sansone 1, 50019 Sesto Fiorentino (Italy); Montero, I. [Dpto. Prehistoria, Instituto de Historia, CSIC. C/ Serrano, 13. 28001 Madrid (Spain)

    2006-08-15

    The visigothic treasure of Torredonjimeno (Jaen, Spain) was found by chance in the year 1926 buried in an olive grove. The finding consisted of some hundreds fragments of gold objects and gems coming from several votive crowns and crosses, some of them belonging to an unidentified visigothic king. The treasure may belong chronologically to the same period as the Guarrazar treasure or, possibly, to a somewhat later time, but the pieces are fragmented and of less technological workmanship than the latter. This is the reason why the Torredonjimeno treasure has not attracted as much attention from archeologists and art historians as that from Guarrazar. On the occasion of an exhibition showing together all the objects of the treasure, it is normally kept in three different museums in Barcelona, Cordoba and Madrid, a number of pieces were analyzed, using PIXE, PIGE and RBS, at the external microbeam facility installed at the Center for Micro-Analysis of Materials.

  1. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  2. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  3. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  4. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  5. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  6. Nature’s treasurer: plants acting on colon cancer

    Directory of Open Access Journals (Sweden)

    Akhil Gupta

    2011-12-01

    Full Text Available Nowadays, neoplastic disease, especially colorectal cancer has been emerged as a major challenge for mankind. For treatment of colorectal cancer some drugs available in market (e.g. Capecitabine, Cetuximab, Trinotecan, etc. and many are under investigation. Tremendous possibilities are reviewed and collected from the herbal source (natural treasure for the successful management of colorectal cancer. Intensive research had been done worldwide on the plant source that increases possibilities for providing great opportunities to improve the management of the colorectal cancer. Many researchers had concluded that herbal source can be useful for the successful management of colon cancer. This review provides a brief account on various plants that can be used for therapeutic purposes. Author suggests developing a chemical base moiety for clinical researchers to run clinical trials and future research on such capable plants.

  7. 77 FR 53248 - Culturally Significant Objects Imported for Exhibition Determinations: “Swiss Treasures: From...

    Science.gov (United States)

    2012-08-31

    ... Papyrus and Parchment to Erasmus, Zwingli, Calvin, and Barth'' SUMMARY: Notice is hereby given of the... exhibition ``Swiss Treasures: From Biblical Papyrus and Parchment to Erasmus, Zwingli, Calvin, and...

  8. Listening to the whispers of matter through Arabic hermeticism: new studies on The Book of the Treasure of Alexander.

    Science.gov (United States)

    Alfonso-Goldfarb, Ana Maria; Jubran, Safa Abou Chahla

    2008-07-01

    The Jabirian Corpus refers to the K. Thahirat Al-'Iskandar, "The Book of the Treasure of Alexander" (hereafter BTA), as one of several forgeries suggesting that alchemical secrets were hidden in inscriptions in various places. The book was neglected until 1926, when Julius Ruska discussed it in his work on the Emerald Tablet, placing the BTA within the literature related to the development of Arabic alchemy. His preliminary study became an essential reference and encouraged many scholars to work on the BTA in the following decades. Some years ago, we completed the first translation of the BTA into a Western language. The work was based on the acephalous Escorial manuscript, which we identified as a fourteenth-century copy of the BTA. This manuscript is peculiar, as part of it is encoded. After finishing our translation, we started to establish the text of the BTA. At present, the text is in process of fixation--to be followed by textual criticism--and has been the main focus of a thorough study of ours on medieval hermeticism and alchemy. A sample of the work currently in progress is presented in this paper: an analysis of the variations between different manuscripts along with a study and English translation of its alchemical chapter.

  9. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  10. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  11. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  12. Position paper for health authorities: archived clinical pathology data-treasure to revalue and appropriate.

    Science.gov (United States)

    Nwose, E U; Richards, R S; Butkowski, E; Cann, Nathan

    2010-12-01

    Archived clinical pathology data (ACPD) is recognized as useful for research. Given our privileged de-identified ACPD from South West Pathology Service (SWPS), attempt is made to estimate what it would cost any researcher without such privilege to generate the same data. The Ethics Committee of the Area Health Service approved a request for Dr. Uba Nwose to use de-identified ACPD acquired by the SWPS for clinical laboratory-based translational biomedical science research. 10-years (1999-2008) have been pooled to constitute the database. Data include blood sugar, cholesterol, D-dime, ESR, glucose tolerance, haematocrit, HbA 1 c, homocysteine, serum creatinine, total protein and vitamins [C & E] amongst others. For this report, the bulk-billed-cost of tests were estimated based on number and unit price of each test performed. AU$ 17,507,136.85 is the cost paid by Medicare in the period. This amount is a conservative estimate that could be spent to generate such 10-years data in the absence of ACPD. The health/pathology service has not given any financial research grant. However, the support-in-kind is worth more than celebrated competitive research grants. It calls for revaluatrion by academic, research and scientific institutions the use ofACPD. For the countries where such provision is non-existent, this report provides a 'Position Paper' to present to the directorates or institutes of health authorities to appropriate the value of ACPD and approve of their use as a research treasure and resource management tool.

  13. Buried treasure in the sand of the QCD vacuum

    CERN Document Server

    Moran, P J

    2008-01-01

    The short-range structure of the 2+1 flavour QCD vacuum is studied through visualisations of the topological charge density. Of particular interest is a new Gaussian weighted smearing algorithm which is applied to the rough topological charge density to disclose underlying long range structure. The results provide support for the view of the QCD vacuum as a sandwich of sign-alternating sheets of charge, with a long-range structure hidden beneath.

  14. The Hidden Treasure in Apical Papilla: The Potential Role in Pulp/Dentin Regeneration and BioRoot Engineering

    Science.gov (United States)

    Huang, George T.-J.; Sonoyama, Wataru; Liu, Yi; Liu, He; Wang, Songlin; Shi, Songtao

    2009-01-01

    Some clinical case reports have shown that immature permanent teeth with periradicular periodontitis or abscess can undergo apexogenesis after conservative endodontic treatment. A call for a paradigm shift and new protocol for the clinical management of these cases has been brought to attention. Concomitantly, a new population of mesenchymal stem cells residing in the apical papilla of permanent immature teeth recently has been discovered and was termed stem cells from the apical papilla (SCAP). These stem cells appear to be the source of odontoblasts that are responsible for the formation of root dentin. Conservation of these stem cells when treating immature teeth may allow continuous formation of the root to completion. This article reviews current findings on the isolation and characterization of these stem cells. The potential role of these stem cells in the following respects will be discussed: (1) their contribution in continued root maturation in endodontically treated immature teeth with periradicular periodontitis or abscess and (2) their potential utilization for pulp/dentin regeneration and bioroot engineering. PMID:18498881

  15. Hidden Treasures in Theological Education: The Writing Tutor, the Spiritual Director, and Practices of Academic and Spiritual Mentoring

    Science.gov (United States)

    Yaghjian, Lucretia B.

    2013-01-01

    Mentoring is an important but often overlooked resource in theological education and students' academic and spiritual formation. This essay profiles the mentoring practices and postures of the writing tutor and the spiritual director as exemplars of academic and spiritual mentoring. An extended probe of this analogy affirms the integration of…

  16. Digging for Treasure - Unique Fate and Transport Study

    Energy Technology Data Exchange (ETDEWEB)

    Larry Zirker; M. K. Adler-Flitton; G. A. Beitel

    2003-02-01

    In 1970, scientists at the National Bureau of Standards (NBS), now called the National Institute of Standards and Testing (NIST), implemented the most ambitious and comprehensive long-term corrosion behavior test for stainless steels in soil environments. This study had historic significance since the NBS 1957 landmark corrosion textbook compiled by Romanoff did not include stainless steels, and this 1970 research set forth to complete the missing body of knowledge. To conduct the test, NIST scientists buried 6,324 coupons from stainless steel types, specialty alloys, composite configurations, multiple material forms, and treatment conditions at six distinctive soil-type sites throughout the country. Between 1971 and 1980, four sets of coupons were removed from the six sites to establish 1-year, 2-year, 4-year, and 8- year corrosion rates data sets for different soil environments. The fifth and last set of coupons (approximately 200 at each site) remains undisturbed after 32-years, providing a virtual buried treasure of material and subsurface scientific data. These buried coupons and the surrounding soils represent an analog to the condition of buried waste and containers. Heretofore, the samples were simply pulled from the soil, measured for mass loss and the corrosion rate determined while the subsurface/fate and transport information was not considered nor gathered. Funded through an Environmental Management Science Program (EMSP) proposal, the Idaho National Engineering and Environmental Laboratory (INEEL) operated for the U.S. Department of Energy by Bechtel-BWXT Idaho, LLC (BBWI), is chartered to restart this corrosion test and concurrently capture the available subsurface/fate and transport information. Since the work of retrieving the buried metal coupons is still in the planning stage, this paper outlines the interdisciplinary team of scientists and engineers and defines the benefits of this research to long-term stewardship, subsurface science, and

  17. Digging for Treasure - Unique Fate and Transport Study

    Energy Technology Data Exchange (ETDEWEB)

    Zirker, L.R.; Adler-Flitton, M.K.; Beitel, G.A.

    2003-02-24

    In 1970, scientists at the National Bureau of Standards (NBS), now called the National Institute of Standards and Testing (NIST), implemented the most ambitious and comprehensive long-term corrosion behavior test for stainless steels in soil environments. This study had historic significance since the NBS 1957 landmark corrosion textbook compiled by Romanoff did not include stainless steels, and this 1970 research set forth to complete the missing body of knowledge. To conduct the test, NIST scientists buried 6,324 coupons from stainless steel types, specialty alloys, composite configurations, multiple material forms, and treatment conditions at six distinctive soil-type sites throughout the country. Between 1971 and 1980, four sets of coupons were removed from six sites to establish 1-year, 2-year, 4-year, and 8-year corrosion rates data sets for different soil environments. The fifth and last set of coupons (approximately 200 at each site) remains undisturbed after 32-years, providing a virtual buried treasure of material and subsurface scientific data. These buried coupons and the surrounding soils represent an analog to the condition of buried waste and containers. Heretofore, the samples were simply pulled from the soil, measured for mass loss and the corrosion rate determined while the subsurface/fate and transport information was not considered nor gathered. Funded through an Environmental Management Science Program (EMSP) proposal, the Idaho National Engineering and Environmental Laboratory (INEEL) operated for the U.S. Department of Energy by Bechtel-BWXT Idaho, LLC (BBWI), is chartered to restart this corrosion test and concurrently capture the available subsurface/fate and transport information. Since the work of retrieving the buried metal coupons is still in the planning stage, this paper outlines the interdisciplinary team of scientists and engineers and defines the benefits of this research to long-term stewardship, subsurface science, and

  18. How to secretly share the treasure map of the captain?

    Science.gov (United States)

    Islam, N.; Puech, W.; Brouzet, R.

    2010-01-01

    In this paper we present a new approach for sharing a secret image between l users exploiting additive homomorphic property of Paillier algorithm. With a traditional approach, when a dealer wants to share an image between l players, the secret image must be sequentially encrypted l + 1 times using l + 1 keys (secret or public keys). When the dealer and the l players want to extract the secret image, they must decrypt sequentially, keeping the same order of the encryption step, by using l + 1 keys (secret or private). With the proposed approach, during the encryption step, each player encrypts his own secret image using the same public key given by the dealer, the dealer encrypts the secret image to be shared with the same key and then the l secret encrypted images plus the encrypted image to be shared are multiplied between them to get a scrambled image. After this step, the dealer can securely use the private key to decrypt this scrambled image to get a new scrambled image which corresponds to the addition of the l + 1 original images because of the additive homomorphic property of Paillier algorithm. When the l players want to extract the secret image, they do not need the dealer and to use keys. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own secret image from the scrambled image. In this paper we illustrate our approach with an example of a captain who wants to share a secret treasure map between l pirates. Experimental results and security analysis show the effectiveness of the proposed scheme.

  19. Barley grain for ruminants: A global treasure or tragedy

    Directory of Open Access Journals (Sweden)

    Nikkhah Akbar

    2012-07-01

    Full Text Available Abstract Barley grain (Hordeum vulgare L. is characterized by a thick fibrous coat, a high level of ß-glucans and simply-arranged starch granules. World production of barley is about 30 % of that of corn. In comparison with corn, barley has more protein, methionine, lysine, cysteine and tryptophan. For ruminants, barley is the third most readily degradable cereal behind oats and wheat. Due to its more rapid starch fermentation rate compared with corn, barley also provides a more synchronous release of energy and nitrogen, thereby improving microbial nutrient assimilation. As a result, feeding barley can reduce the need for feeding protected protein sources. However, this benefit is only realized if rumen acidity is maintained within an optimal range (e.g., > 5.8 to 6.0; below this range, microbial maintenance requirements and wastage increase. With a low pH, microbial endotoxines cause pro-inflammatory responses that can weaken immunity and shorten animal longevity. Thus, mismanagement in barley processing and feeding may make a tragedy from this treasure or pearl of cereal grains. Steam-rolling of barley may improve feed efficiency and post-rumen starch digestion. However, it is doubtful if such processing can improve milk production and feed intake. Due to the need to process barley less extensively than other cereals (as long as the pericarp is broken, consistent and global standards for feeding and processing barley could be feasibly established. In high-starch diets, barley feeding reduces the need for capacious small intestinal starch assimilation, subsequently reducing hindgut starch use and fecal nutrient loss. With its nutritional exclusivities underlined, barley use will be a factual art that can either matchlessly profit or harm rumen microbes, cattle production, farm economics and the environment.

  20. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  1. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  2. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  3. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  4. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  5. The Hidden Subgroup Problem

    CERN Document Server

    Wang, Frédéric

    2010-01-01

    We give an overview of the Hidden Subgroup Problem (HSP) as of July 2010, including new results discovered since the survey of arXiv:quant-ph/0411037v1. We recall how the problem provides a framework for efficient quantum algorithms and present the standard methods based on coset sampling. We study the Dihedral and Symmetric HSPs and how they relate to hard problems on lattices and graphs. Finally, we conclude with the known solutions and techniques, describe connections with efficient algorithms as well as miscellaneous variants of HSP. We also bring various contributions to the topic. We show that in theory, we can solve HSP over a given group inductively: the base case is solving HSP over its simple factor groups and the inductive step is building efficient oracles over a normal subgroup N and over the factor group G/N. We apply this analysis to the Dedekindian HSP to get an alternative abelian HSP algorithm based on a change of the underlying group. We also propose a quotient reduction by the normal group...

  6. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group.......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  7. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of offshor...... of our study is to suggest how hidden costs of offshoring can be mitigated through an explicit orientation towards improving organizational processes and structures as well as experience with offshoring.......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  8. Three-year old boys treasure pirate memories : Gender and episodic memory in preschoolers

    NARCIS (Netherlands)

    Wessel, Ineke; Rutten, Vera; Ruiter, Selma

    2014-01-01

    Recently, Scarf and colleagues (2013) proposed that 3-year olds fail to retain episodic memories for longer than 15 minutes. In their study, children found a locked pirate’s treasure chest in a sandbox. After a delay in which the child was elsewhere, the experimenter announced that they would return

  9. Molecular characterization of Histoplasma capsulatum isolated from an outbreak in treasure hunters Histoplasma capsulatum in treasure hunters

    Directory of Open Access Journals (Sweden)

    Muñoz Bertha

    2010-09-01

    Full Text Available Abstract Background In Mexico, primary pulmonary histoplasmosis is the most relevant clinical form of the disease. The geographical distribution of specific strains of Histoplasma capsulatum circulating in Mexico has not been fully established. Outbreaks must be reported in order to have current, updated information on this disease, identifying new endemic areas, manner of exposure to the fungi, and molecular characterization of the causative agents. We report a recent outbreak of histoplasmosis in treasure hunters and the molecular characterization of two isolates obtained from these patients. Methods Six patients admitted to the National Institute of Respiratory Diseases (INER in Mexico City presented severe respiratory symptoms suggestive of histoplasmosis. They acquired the infection in the Veracruz (VZ endemic zone. Diagnosis was made by X-ray and Computed tomography (CT, liver function, immunological techniques, and culture. Identification of H. capsulatum isolates was confirmed by using Polymerase chain reaction (PCR was conducted with a probe from the M antigen, and the isolates were characterized by means of Random amplification of polymorphic DNA (RAPD-PCR employed the 1253 oligonucleotide and a mixture of oligonucleotides 1281 and 1283. These were compared to eight reference strain isolates from neighboring areas. Results X-ray and CT revealed disseminated micronodular images throughout lung parenchyma, as well as bilateral retrocaval, prevascular, subcarinal, and hilar adenopathies, hepatosplenomegaly, and altered liver function tests. Five of the six patients developed disseminated histoplasmosis. Two H. capsulatum strains were isolated. The same band profile was detected in both strains, indicating that both isolates corresponded to the sole H. capsulatum strain. Molecular characterization of the isolates was similar in 100% with the EH-53 Hidalgo human (HG strain (reference strain integrated into the LAm A clade described for

  10. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  11. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  12. Competitive Intelligence.

    Science.gov (United States)

    Bergeron, Pierrette; Hiller, Christine A.

    2002-01-01

    Reviews the evolution of competitive intelligence since 1994, including terminology and definitions and analytical techniques. Addresses the issue of ethics; explores how information technology supports the competitive intelligence process; and discusses education and training opportunities for competitive intelligence, including core competencies…

  13. The hidden dragons.

    Science.gov (United States)

    Zeng, Ming; Williamson, Peter J

    2003-10-01

    Most multinational corporations are fascinated with China. Carried away by the number of potential customers and the relatively cheap labor, firms seeking a presence in China have traditionally focused on selling products, setting up manufacturing facilities, or both. But they've ignored an important development: the emergence of Chinese firms as powerful rivals--in China and also in the global market. In this article, Ming Zeng and Peter Williamson describe how Chinese companies like Haier, Legend, and Pearl River Piano have quietly managed to grab market share from older, bigger, and financially stronger rivals in Asia, Europe, and the United States. Global managers tend to offer the usual explanations for why Chinese companies don't pose a threat: They aren't big enough or profitable enough to compete overseas, the managers say, and these primarily state-owned companies are ill-financed and ill-equipped for global competition. As the government's policies about the private ownership of companies changed from forbidding the practice to encouraging it, a new breed of Chinese companies evolved. The authors outline the four types of hybrid Chinese companies that are simultaneously tackling the global market. China's national champions are using their advantages as domestic leaders to build global brands. The dedicated exporters are entering foreign markets on the strength of their economies of scale. The competitive networks have taken on world markets by bringing together small, specialized companies that operate in close proximity. And the technology upstarts are using innovations developed by China's government-owned research institutes to enter emerging sectors such as biotechnology. Zeng and Williamson identify these budding multinationals, analyze their strategies, and evaluate their weaknesses.

  14. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  15. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  16. The Library Treasure Hunt: Reach for the Stars. Introducing First Year Students to the Landscape of Scientific Information

    Science.gov (United States)

    Enestarre, C.; Jurlander, E.; Andersson, C.; Verdozzi, K. H.; Reistad, N.

    2015-04-01

    One important task for the librarians at Physics and Astronomy Library at Lund University is to teach the students about the library and its resources. The traditional lectures and tours of the library just weren't working. The library competes with many other introductory activities, such as general orientation, and social events. The aim of the Treasure Hunt is to present the library in a useful and amusing way for new students at the start of their studies. Divided into small groups, the students carry out various tasks at stations in the participating libraries. The hunt takes about two hours and a treasure (a goody bag) waits for them at the end. The evaluations show that the treasure hunt is highly appreciated by the students. They become familiar with the librarians and get to know essential aspects of the library resources. The treasure hunt is important in the students' later studies as it paves the way for further development of their information retrieval skills. A crucial factor to success of the Treasure Hunt is the cooperation of committed teachers. A challenge for the future is to have the Treasure Hunt integrated in all courses as a compulsory element.

  17. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  18. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  19. Hard-bottom succession of subtidal epibenthic communities colonizing hidden and exposed surfaces off northern Chile

    Directory of Open Access Journals (Sweden)

    Aldo S. Pacheco

    2010-03-01

    Full Text Available The biodiversity of hard-bottom substrata comprises species growing on exposed rock and in hidden microhabitats, such as cracks and crevices. This study examines the succession of epibenthic organisms colonizing an artificial substratum with one surface exposed and one surface hidden on a vertical wall off northern Chile. On each sampling date species coverage of three replicate panels on both surfaces was assessed. The hidden surface was dominated in terms of coverage by the bryozoans Membranipora isabelleana and Lagenicella variabilis, while algae were absent. In contrast, the exposed surface was dominated by encrusting red corallines and the red alga Rhodymenia corallina. At the end of the experimental period both surfaces were dominated by colonial suspension feeders, but showed a different community structure and successional pattern. On the exposed surface, competitive exclusion was identified as an important aspect of succession, whereas on the hidden surface this pattern was not observed. These findings have implications for overall biodiversity, because pioneer species that are not able to survive long periods on exposed surfaces become restricted to hidden surfaces, from where they spread laterally. Thus, hidden microhabitats provide refuges for certain species, and may play an important role in the overall succession on rock faces. We conclude that examination of hidden microhabitats is necessary in order to fully understand succession in hard-bottom habitats.

  20. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  1. The Tourist Gaze and ‘Family Treasure Trails’ in Museums

    DEFF Research Database (Denmark)

    Larsen, Jonas; Svabo, Connie

    2014-01-01

    Museums are largely neglected in the tourist research literature. This is even more striking given that they are arguably designed for gazing. There is little doubt that “graying” of the Western population adds to the number and range of museums. And yet, even in adult museums......, there will be children who are “dragged along.” Museums are increasingly aware of such conflicts and dilemmas. Many museums offer printed booklets with “treasure trails.” They afford a trail through the museum that forms a treasure hunt for specific objects and correct answers to questions related to the objects....... This article draws attention to this overlooked, mundane technology and gives it its deserved share of the limelight. We are concerned with exploring ethnographically how trails are designed and especially used by young families in museums for gazing. The article gives insight into how children, broadly...

  2. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  3. Pentaquark states with hidden charm

    Science.gov (United States)

    Bijker, Roelof

    2017-07-01

    I develop an extension of the usual three-flavor quark model to four flavors (u, d, s and c), and discuss the classification of pentaquark states with hidden charm. This work is motivated by the recent observation of such states by the LHCb Collatoration at CERN.

  4. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  5. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  6. Buried Treasure: Evolutionary Perspectives on Microbial Iron Piracy.

    Science.gov (United States)

    Barber, Matthew F; Elde, Nels C

    2015-11-01

    Host-pathogen interactions provide valuable systems for the study of evolutionary genetics and natural selection. The sequestration of essential iron has emerged as a crucial innate defense system termed nutritional immunity, leading pathogens to evolve mechanisms of 'iron piracy' to scavenge this metal from host proteins. This battle for iron carries numerous consequences not only for host-pathogen evolution but also microbial community interactions. Here we highlight recent and potential future areas of investigation on the evolutionary implications of microbial iron piracy in relation to molecular arms races, host range, competition, and virulence. Applying evolutionary genetic approaches to the study of microbial iron acquisition could also provide new inroads for understanding and combating infectious disease.

  7. Friendly competition.

    Science.gov (United States)

    Chambers, David W

    2006-01-01

    Competition that is characterized by rules, often informal, agreed among mutually accepted participants, and that gives the competitors a special, advantageous status with others is called friendly competition. Dentists have engaged in it deeply and it is good for the profession. Friendly competition offers the advantages of spillover of commonly useful information and technologies, stimulation of innovation, a united and convenient face to customers and suppliers, and standards that promote growth. Friendly competition increases the size of the pie, regardless of market share. Paradoxically, this is even true for the little guy in the shadow of the giant. If carried to extremes, unfriendly competition leads to destroying competitors, the confusion of multiple rules, and encouragement of disruptive change.

  8. Quantifying the National Significance of Local Areas for Regional Conservation Planning: North Carolina’s Mountain Treasures

    Directory of Open Access Journals (Sweden)

    R. Travis Belote

    2017-05-01

    Full Text Available Conservation scientists recognize that additional protected areas are needed to maintain biological diversity and ecological processes. As regional conservation planners embark on recommending additional areas for protection in formal ecological reserves, it is important to evaluate candidate lands for their role in building a resilient protected areas system of the future. Here, we evaluate North Carolina’s Mountain Treasures with respect to their (1 ecological integrity, (2 role in connecting existing core protected areas, (3 potential to diversify the ecosystem representation of reserves, and (4 role in maintaining hotspots of biologically-rich areas that are not well protected. Mountain Treasures represent a citizen inventory of roadless areas and serve as candidates for elevated levels of conservation protection on U.S. federal lands. We compared Mountain Treasures to other candidate lands throughout the country to evaluate their potential national significance. While the Mountain Treasures tended to be more impacted by human modifications than other roadless areas, they are as important as other roadless areas with respect to their role in connecting existing protected areas and diversifying representation of ecosystems in conservation reserves. However, Mountain Treasures tended to have a much higher biodiversity priority index than other roadless areas leading to an overall higher composite score compared to other roadless areas. Our analysis serves as an example of how using broad-scale datasets can help conservation planners assess the national significance of local areas.

  9. On quantum algorithms for noncommutative hidden subgroups

    Energy Technology Data Exchange (ETDEWEB)

    Ettinger, M. [Los Alamos National Lab., NM (United States); Hoeyer, P. [Odense Univ. (Denmark)

    1998-12-01

    Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. The authors present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of calls to the input function. They also explore the difficulties of developing an algorithm to process the data to explicitly calculate a generating set for the subgroup. A general framework for the noncommutative hidden subgroup problem is discussed and they indicate future research directions.

  10. A groundwater-flow model for the Treasure Valley and surrounding area, southwestern Idaho

    Science.gov (United States)

    Bartolino, James R.; Vincent, Sean

    2017-04-17

    The U.S. Geological Survey (USGS), in partnership with the Idaho Department of Water Resources (IDWR) and Idaho Water Resource Board (IWRB), will construct a numerical groundwater-flow model of the Treasure Valley and surrounding area. Resource managers will use the model to simulate potential anthropogenic and climatic effects on groundwater for water-supply planning and management. As part of model construction, the hydrogeologic understanding of the aquifer system will be updated with information collected during the last two decades, as well as new data collected for the study.

  11. Cursed sites and cursed practices, treasure hunting at haunted places: A case study from Greece

    Directory of Open Access Journals (Sweden)

    Koumarianou Maria

    2007-01-01

    Full Text Available The aim of this paper is to explain why such a widespread practice as treasure hunting is related to narratives of cursed and haunted places. The reasons are many: a the intermingling of official and folk religious elements in Orthodox Christian tradition that also serves the Greek nationalistic idea of continuity from Antiquity, b the existence of evil spirits gives sufficient justification to despair, failure and ill health, by aligning otherness with misfortune, c such narratives constitute patterns of behaviour, as they offer the terms for comprehensive oral dialogue between notions of good and evil, religious beliefs and skepticism.

  12. [Neurological aspects described in The treasure of medicines for all illnesses by Gregorio López].

    Science.gov (United States)

    Carod-Artal, F J; Vázquez-Cabrera, C B

    Latin American medicine in the 16th century produced the first collections of herbs with native plants from the New World. Treatises on popular therapies appeared, which included gallenic remedies as well as incorporating autochthonous plants. We review the main neurological diseases and their treatments described in The Treasure of Medicines for All Illnesses by Gregorio Lopez (1542-1596). Some critics claim that his work was an enumeration of empirical prescriptions, sometimes with a magico-religious influence, which was extended in successive reprints. Yet, this manuscript is probably the first treatise on therapeutics written by a European in the New World to describe the native remedies employed in the treatment of diseases. In the section entitled Remedies in alphabetical order the following neurological ailments and appropriate remedies to treat them are described: abscess, apoplexy, brain, chilling, cramp, gota coral or epilepsy, headache, melancholy, memory, migraine, nerves, palsy, paralysis, sciatica, stupor and vertigo. The list of diseases is very complete and includes syndromes ranging from fevers, colics and bruises to phthisis, scabs or burns. The copy of the manuscript in the Vatican contains a final section on Indian medicines, which includes a list of medicinal plants used at that time, with the names given in Nahuatl language. Headaches, epilepsy and conditions affecting the peripheral nerves were the neurological pathologies that were described at greatest length in The Treasure of Medicines for All Illnesses, and for which a greater number of natural prescriptions were compiled.

  13. Treasure hunt of mineral resources: a serious game in a virtual world

    Science.gov (United States)

    Boniello, Annalisa

    2015-04-01

    This posterdescribes a geoscience activities on mineral resources for students of 14-18 years old. The activities are created as a treasure hunt of mineral resources, students must pass test and solve questions, search mineral in different environments: near a volcanos, in the river, in a lake, in a cave, under the sea and on a mountain. The activity is created using a virtual environment a virtual world built with a software, Opensim, a opensource software. In this virtual world every student as avatar, a virtual rapresentation of himself, search information, objects, mineral as in a serious game, a digital serious game. In the serious game buit as a treasure hunt, students interact with environment in a learning by doing, and they interact with other students in a cooperative learning and a collaborative environment. In the hunt there is a challenge that student must overcome: understanding what is a mineral resource collecting data on mineral analyzing environments where they are created so the students can improve motivation and learn, and improve scientific skills.

  14. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  15. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  16. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  17. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  18. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  19. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  20. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  1. Case competitions

    DEFF Research Database (Denmark)

    Schjoldager, Anne Gram

    2009-01-01

    The paper presents and discusses a teaching project with case competitions for MA students of specialised translation at the Aarhus School of Business, Aarhus University. Drawing on a series of online questionnaires, the paper ascertains how the project was evaluated by the participating students...

  2. Case competitions

    DEFF Research Database (Denmark)

    Schjoldager, Anne Gram

    2009-01-01

    The paper presents and discusses a teaching project with case competitions for MA students of specialised translation at the Aarhus School of Business, Aarhus University. Drawing on a series of online questionnaires, the paper ascertains how the project was evaluated by the participating students...

  3. EDITORIAL: Physics competitions Physics competitions

    Science.gov (United States)

    Jordens, H.; Mathelitsch, L.

    2009-11-01

    1. Physics competitions: aims and realizations One aim of physics competitions is to increase the interest of young students, primarily at upper secondary level, to physics and natural sciences in general. A competition has motivational aspects known usually from sports events or games—comparing one's own ability with others, of course with the desire to be better and to win. If competitions reach nationwide and even international levels, additional stimulation is created. Competitions provide greatest attraction to possible winners, to the group of gifted people in a particular field. This implies that science contests are excellent tools for the promotion of talented students. Traditional teaching has been shown to have problems in supporting this group of students. Very often teachers are overstretched with the demands of teaching both low- and high-level students. Extracurricular activities are therefore a good chance to relieve the teacher, and to give talented students the opportunity for appropriate training and challenge. The competitions, however, have a broader impact and address more young people than one might guess from the statements above. Training courses and selection at school level give a larger group of students extra and, to some extent, complimentary education in physics. The degree of complexity of the tasks corresponds very often to the standards of the next level of education in the school system. Interestingly, many physics competitions have their origin in countries beyond the former Iron Curtain. They started as regional and national tournaments, were joined by neighbouring countries and have grown, in some cases, to events with participants from more than 80 countries. Although the features mentioned above are common to the different competitions, there are distinct differences between them [1]. The International Physics Olympiad (IPhO) is the oldest international physics competition for students at upper secondary level [2]. It dates

  4. Analysis on the Investment Groups of the Balance of Treasure%余额宝投资群体分析

    Institute of Scientific and Technical Information of China (English)

    刘雨薇; 刘铮

    2015-01-01

    随着互联网技术向金融领域的不断延伸,以阿里巴巴推出的余额宝为代表的互联网金融业务尤为引人注目。以问卷调查的方式,阐述了余额宝适用人群的调查信息,分析了余额宝适用人群的特点,为余额宝及互联网金融业的发展提供参考。%ABSTRACT:Along with the continuous extension of the Internet technology into the financial sector, the balance of treasure launched by Alibaba, being as the representative of the Internet financial services, particularly attract people's attention. In the form of questionnaire survey, this paper expounds the survey information of the applicable groups of the balance of treasure, and analyzes the features of the applicable groups of the balance of treasure, providing the reference for the development of the balance of treasure and the Internet banking industry.

  5. U.S. DOE’s Energy Treasure Hunt Exchange In-Plant Trainings – DOE Resources, Early Results and Lessons Learned

    Energy Technology Data Exchange (ETDEWEB)

    Lung, Bruce [U.S. Department of Energy (DOE); Brockway, Walter F. [ORNL; Nimbalkar, Sachin U. [ORNL; Wenning, Thomas J. [ORNL; Thirumaran, Kiran [ORNL

    2017-06-01

    The primary objective of the Department of Energy’s (DOE) Energy Treasure Hunt In-Plant Training (INPLT) is to train Better Plants partner employees to lead and conduct future energy efficiency Treasure Hunts within their facilities without DOE assistance. By taking a “learning-by-doing” approach, this INPLT, like other DOE INPLT trainings, has the added benefit of uncovering real energy and cost-saving opportunities. This INPLT leverages DOE and Better Plants technical staff, resources and tools and the EPA “Energy Treasure Hunt Guide: Simple Steps to Finding Energy Savings” process. While Treasure Hunts are a relatively well-known approach to identifying energy-savings in manufacturing plants, DOE is adding several additional elements in its Treasure Hunt Exchanges. The first element is technical assistance and methodology. DOE provides high-quality technical resources, such as energy efficiency calculators, fact sheets, source books etc., to facilitate the Treasure Hunt process and teaches four fundamentals: 1) how to profile equipment, 2) how to collect data, and 3), data & ROI calculation methodologies. Another element is the “train the trainer” approach wherein the training facilitator will train at least one partner employee to facilitate future treasure hunts. Another element is that DOE provides energy diagnostic equipment and teaches the participants how to use them. Finally, DOE also offers partners the opportunity to exchange teams of employees either within a partners’ enterprise or with other partners to conduct the treasure hunt in each other’s facilities. This exchange of teams is important because each team can bring different insights and uncover energy-saving opportunities that would otherwise be missed. This paper will discuss DOE methodology and the early results and lessons learned from DOE’S Energy Treasure Hunt In-Plant Trainings at Better Plants Partner facilities.

  6. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  7. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  8. EDITORIAL: Physics competitions Physics competitions

    Science.gov (United States)

    Jordens, H.; Mathelitsch, L.

    2010-07-01

    This editorial opens the second special section on physics competitions in European Journal of Physics. In the first section last year, we asked for feedback on the idea of such a section and on the content of the articles. We received no answer whatsoever, which can be interpreted in two ways: the section is not interesting enough to raise motivation for feedback, or the reader is satisfied. Having no indication which scenario is the correct one, we are optimistic and favour the second. The section at hand contains three articles. Again, as last year, the organizer of the annual Olympiad reports on tasks and outcomes of this competition. The Olympiad took place in Merida, Mexico, and was by far the largest event with 316 contestants from 68 countries. Again, the predominance of Asian/Chinese students was manifest, showing how serious the training is taken by both their authorities and students. Unfortunately, the winners of the last International Young Physicists' Tournament (IYPT), the team from Korea, did not accept the offer to report on their prize-winning contribution. We are thankful that two students from Austria, who achieved second place with their team, took over and reported on the task which they presented in the finals of the competition. It connects the fields of sport and physics and explains a special move in skateboarding. The third contribution introduces a different competition, 'International Conference of Young Scientists'. On one hand, as in the Olympiad, it addresses individuals, not teams. On the other, as in the IYPT, students have several months to prepare and also the quality of the presentation is an important element of the judgment. In fact, this competition comes closer to real scientific research compared to the other events. Finally and again, we hope that this section will serve several purposes: To show the competitions as a very important tool in the support of gifted students. To raise awareness amongst university teachers, and

  9. Optimal Competition : A Benchmark for Competition Policy

    NARCIS (Netherlands)

    Boone, J.

    2003-01-01

    This paper introduces optimal competition: the best form of competition in an industry that a competition authority can achieve under the information constraint that it cannot observe firms' effciency levels.We show that the optimal competition outcome in an industry becomes more competitive as more

  10. Strategy and Culture: Hidden Secrets and Soft Skills in Supply Chain Best Practices from Africa

    OpenAIRE

    Esther Kibuka-Sebitosi

    2015-01-01

    The paper identifies strategy and cultural hidden secrets and soft skills pertaining to supply chain management in African contexts that are pertinent to supply chain and operations management. Africa is increasingly becoming attractive for not only multi-nationals but supply chain businesses that either want to diversify or expand their foot print. The market is complex, turbulent and highly competitive (Porter, 1986) and requires significant knowledge and understanding of the lo...

  11. Logo competition

    CERN Multimedia

    Staff Association

    2013-01-01

    Award of the prizes The price ceremony for the Staff Association’s new logo competition which took place on Friday 1st March at 5 p.m. was a big success. The first prize, an Ezee Suisse electric bike, was won by Paulo Rios, from Portugal. In his absence, the bike was handed to his brother Vitor. The other five winners of the competition also received their prize: Go Sport vouchers. A peize draw was then organized to award 22 other participants with prizes offered by our commercial partners (Aquaparc, BCGE, L’Occitane, Passeport Gourmand, Sephora, Theater La Comédie de Genève), whom we would like to warmly thank. After all prices were distributed the evening continued with discussions around a friendly drink.

  12. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  13. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  14. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  15. National Treasures

    Institute of Scientific and Technical Information of China (English)

    ZHANG ZHIPING

    2010-01-01

    @@ Five thousand years of history have endowed China with abundant cultural relics. In the past two centuries, a consider-able number have been either looted by or sold to other countries because of wars and various other reasons. According to figures from the UN Educational, Scientific and Cultural Organization, 200-plus museums in 47 countries house more than 1.6 million Chinese artifacts, while the number in private collections in those countries is more than 10 times than those museums' holdings. That means China's cultural artifacts and pieces of art in foreign countries surpass 10 million.

  16. Treasures Abroad

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ Nowadays,more and more Chinese people are able to afford travel overseas.During their journeys,museums are a must-see,where they not only appreciate foreign art,but also find numerous Chinese cultural relics that they have never seen in China.What has astonished them very often is that so many Chinese cultural relics are well collected in these foreign museums.

  17. Treasures Abroad

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Nowadays, more and more Chinese people are able to afford travel overseas. During their journeys, museums are a must-see, where they not only appreciate foreign art, but also find numerous Chinese cultural relics that they have never seen in China. What has astonished them very often is that so many Chinese cultural relics are well collected in these foreign museums.Beijing Review reporters Chen Wen and Zan Jifang recently interviewed staff at the Art Institute of Chicago, the Harvard Art Museum and the Museum of Fine Arts (MFA) Boston, to get a general picture what has happened to China’s cultural relics overseas. Here are excerpts from the interviews:

  18. Talisman Treasures

    Science.gov (United States)

    Surrena, Michelle

    2010-01-01

    Junk is an art teacher's best friend. Everyone has junk, but it takes a special eye to see beyond such unwanted items and give them new purpose. In this article, the author describes a lesson completed with her jewelry/metals class. Inspired by the artwork of Barbara Lenart Kazmer, who incorporates found objects into one-of-a-kind pieces, students…

  19. National Treasures

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Five thousand years of history have endowed China with abundant cultural relics. In the past two centuries, a considerable number have been either looted by or sold to other countries because of wars and various other reasons. According to figures

  20. Fishes in paleochannels of the Lower Mississippi River alluvial valley: A national treasure

    Science.gov (United States)

    Miranda, Leandro E.

    2016-01-01

    Fluvial geomorphology of the alluvial valley of the Lower Mississippi River reveals a fascinating history. A prominent occupant of the valley was the Ohio River, estimated to have flowed 25,000 years ago over western Tennessee and Mississippi to join the Mississippi River north of Baton Rouge, Louisiana, 750–800 km south of the present confluence. Over time, shifts in the Mississippi and Ohio rivers toward their contemporary positions have left a legacy of abandoned paleochannels supportive of unique fish assemblages. Relative to channels abandoned in the last 500 years, paleochannels exhibit harsher environmental conditions characteristic of hypereutrophic lakes and support tolerant fish assemblages. Considering their ecological, geological, and historical importance, coupled with their primordial scenery, the hundreds of paleochannels in the valley represent a national treasure. Altogether, these waterscapes are endangered by human activities and would benefit from the conservation attention afforded to our national parks and wildlife refuges.

  1. A microstructural study of gold treasure from monte alban's Tomb 7

    Science.gov (United States)

    Camacho-Bragado, G. Alejandra; José-Yacaman, Miguel; Ortega-Aviles, Mayahuel; Velasco, Manuel A.; José-Yacaman, Miguel

    2005-07-01

    This article presents a microstructural study of a set of samples from the treasure of tomb 7 of Monte Alban, Oaxaca, in southeast Mexico. The purpose of this work was to elucidate the manufacturing methods used by the pre-Columbian artisans of the Oaxaca valley. An additional goal was to establish a point of comparison between Mesoamerican cultures and cultures in some other regions of the Americas. Ten gilt samples were analyzed corresponding to the post-classic period (700 1300A.D.). The microstructure and elemental composition of the samples were determined using optical, scanning, and transmission-electron microscopies and electron-energy-dispersive spectroscopy. The samples were classified by the method of manufacture. A predominant use of gold alloys was found, rather than the gilt copper commonly used by some cultures in South America.

  2. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  3. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  4. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  5. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  6. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  7. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  8. EMOTIONAL INTELLIGENCE AND ORGANIZATIONAL COMPETITIVENESS: MANAGEMENT MODEL APPROACH

    Directory of Open Access Journals (Sweden)

    John N. N. Ugoani

    2016-09-01

    Full Text Available Modern organization theory considers emotional intelligence as the index of competencies that help organizations to develop a vision for competitiveness. It also allows organizational leaders to enthusiastically commit to the vision, and energize organizational members to achieve the vision. To maximize competiveness organizations use models to simplify and clarify thinking, to identify important aspects, to suggest explanations and to predict consequences, and explore other performance areas that would otherwise be hidden in an excess of words. The survey research design was used to explore the relationship between emotional intelligence and organizational competitiveness. The study found that emotional intelligence has strong positive relationship with organizational competitiveness

  9. The future of competitions

    DEFF Research Database (Denmark)

    Bates, Gary; Jensen, Boris Brorman; Miessen, Markus

    2010-01-01

    We wanted to explore the potential of the competition. The question we asked ourselves was if the competition can generate new, relevant and critical ideas within architecture? We organized an idea competition about the architectural competition....

  10. EDITORIAL: Physics competitions Physics competitions

    Science.gov (United States)

    Jordens, H.; Mathelitsch, L.

    2011-07-01

    International tests on competences, such as TIMSS or PISA, and knowledge of young students have revealed low average scores in many countries, often unexpectedly. One effective measure to increase the average standard of a population is to bring the last third of the group to a higher level. Therefore, many nations put some effort into this activity. This brings the danger that not enough attention is paid to students at the other end, those who are talented. Indeed, it is a very difficult task for a teacher to support the less able and at the same time challenge the gifted students, to lead them to the limits of their abilities and provide for a smooth transition to university study. Physics competitions have been proven to fulfil these last demands to a large degree, and therefore are an important additional and, to some extent, complementary tool for the promotion of talented students. This third special section on physics competitions in European Journal of Physics contains three papers, each dealing with a different form of science contest. The first continues the series of presentations of tasks performed at the International Young Physicists' Tournament, which was held in Vienna in 2011. First place went to the team from Singapore, and they have put their investigation on vertical oscillations of coupled magnets into written form (not required by the tournament, where an oral presentation and a defence and discussion are the central aspects). Their paper shows how rich in physics this problem is, and what level of solutions high-school students can already achieve. Sadly, those responsible for the organization of last year's International Physics Olympiad did not provide us with a report on this competition. This is unfortunate, since the Olympiad in Zagreb was very successful and, in particular, the experimental tasks were creative and demanding. Very similar to the aims and the execution of the Physics Olympiad is the International Olympiad on Astronomy

  11. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  12. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  13. Hidden local symmetry and beyond

    Science.gov (United States)

    Yamawaki, Koichi

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here, I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H = SU(2)L × SU(2)R/SU(2)V with additional symmetry, the nonlinearly-realized scale symmetry. Then, the SM does have a dynamical gauge boson of the SU(2)V HLS, "SM ρ meson", in addition to the Higgs as a pseudo-dilaton as well as the NG bosons to be absorbed in to the W and Z. Based on the recent work done with Matsuzaki and Ohki, I discuss a novel possibility that the SM ρ meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "dark SM skyrmion (DSMS)".

  14. Constraining solar hidden photons using HPGe detector

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, R.; Kekez, D., E-mail: Dalibor.Kekez@irb.hr; Krčmar, M.; Krečak, Z.; Ljubičić, A.

    2013-04-25

    In this Letter we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory. With our experimental setup we observe the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, entails both photon into hidden state oscillations and a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in Sun's interior as well as in the detector. We exclude hidden photons with kinetic couplings χ>(2.2×10{sup −13}–3×10{sup −7}) in the mass region 0.2 eV≲m{sub γ{sup ′}}≲30 keV. Our constraints on the mixing parameter χ in the mass region from 20 eV up to 15 keV prove even slightly better then those obtained recently by using data from the CAST experiment, albeit still somewhat weaker than those obtained from solar and HB stars lifetime arguments.

  15. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  16. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  17. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  18. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  19. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  20. First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB

    Energy Technology Data Exchange (ETDEWEB)

    Aguilar-Arevalo, A.; Amidei, D.; Bertou, X.; Butner, M.; Cancelo, G.; Castañeda Vázquez, A.; Cervantes Vergara, B. A.; Chavarria, A. E.; Chavez, C. R.; de Mello Neto, J. R. T.; D’Olivo, J. C.; Estrada, J.; Fernandez Moroni, G.; Gaïor, R.; Guardincerri, Y.; Hernández Torres, K. P.; Izraelevitch, F.; Kavner, A.; Kilminster, B.; Lawson, I.; Letessier-Selvon, A.; Liao, J.; Matalon, A.; Mello, V. B. B.; Molina, J.; Privitera, P.; Ramanathan, K.; Sarkis, Y.; Schwarz, T.; Settimo, M.; Sofo Haro, M.; Thomas, R.; Tiffenberg, J.; Tiouchichine, E.; Torres Machado, D.; Trillaud, F.; You, X.; Zhou, J.

    2017-04-05

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30 eV$c^{-2}$ with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter $\\kappa$ is competitive with constraints from solar emission, reaching a minimum value of 2.2$\\times$$10^{-14}$ at 17 eV$c^{-2}$. These results are the most stringent direct detection constraints on hidden-photon dark matter with masses 3-12 eV$c^{-2}$ and the first demonstration of direct experimental sensitivity to ionization signals $<$12 eV from dark matter interactions.

  1. Search for Hidden Knowledge in Collective Intelligence dealing Indeterminacy Ontology of Folksonomy with Linguistic Pragmatics and Quantum Logic

    CERN Document Server

    Mas, Massimiliano Dal

    2011-01-01

    Information retrieval is not only the most frequent application executed on the Web but it is also the base of different types of applications. Considering collective intelligence of groups of individuals as a framework for evaluating and incorporating new experiences and information we often cannot retrieve such knowledge being tacit. Tacit knowledge underlies many competitive capabilities and it is hard to articulate on discrete ontology structure. It is unstructured or unorganized, and therefore remains hidden. Developing generic solutions that can find the hidden knowledge is extremely complex. Moreover this will be a great challenge for the developers of semantic technologies. This work aims to explore ways to make explicit and available the tacit knowledge hidden in the collective intelligence of a collaborative environment within organizations. The environment was defined by folksonomies supported by a faceted semantic search. Vector space model which incorporates an analogy with the mathematical appar...

  2. First direct detection constraints on eV-scale hidden-photon dark matter with DAMIC at SNOLAB

    CERN Document Server

    Aguilar-Arevalo, A; Bertou, X; Butner, M; Cancelo, G; Vázquez, A Castañeda; Vergara, B A Cervantes; Chavarria, A E; Chavez, C R; Neto, J R T de Mello; D'Olivo, J C; Estrada, J; Moroni, G Fernandez; Gaïor, R; Guardincerri, Y; Torres, K P Hernández; Izraelevitch, F; Kavner, A; Kilminster, B; Lawson, I; Letessier-Selvon, A; Liao, J; Matalon, A; Mello, V B B; Molina, J; Privitera, P; Ramanathan, K; Sarkis, Y; Schwarz, T; Settimo, M; Haro, M Sofo; Thomas, R; Tiffenberg, J; Tiouchichine, E; Machado, D Torres; Trillaud, F; You, X; Zhou, J

    2016-01-01

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30 eV$c^{-2}$ with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter $\\kappa$ is competitive with constraints from solar emission, reaching a minimum value of 2.2$\\times$$10^{-14}$ at 17 eV$c^{-2}$. These results are the most stringent direct detection constraints on hidden-photon dark matter with masses 3-12 eV$c^{-2}$ and the first demonstration of direct experimental sensitivity to ionization signals $<$12 eV from dark matter interactions.

  3. Lunabotics Mining Competition

    Science.gov (United States)

    Mueller, Rob; Murphy, Gloria

    2010-01-01

    This slide presentation describes a competition to design a lunar robot (lunabot) that can be controlled either remotely or autonomously, isolated from the operator, and is designed to mine a lunar aggregate simulant. The competition is part of a systems engineering curriculum. The 2010 competition winners in five areas of the competition were acknowledged, and the 2011 competition was announced.

  4. Multinationals and Institutional Competitiveness

    DEFF Research Database (Denmark)

    Hull Kristensen, Peer; Morgan, Glenn

    This article discusses how institutional competitiveness and multinationals are mutually enriching concepts. Seen from the perspective of Multinationals, institutional competitiveness becomes expressed at two levels. At the level of corporate HQs institutional competitiveness proves itself...... competitiveness of Liberal Market Economies and Coordinated Markets Economies under the current competitive regime....

  5. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  6. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  7. Hidden simplicity of gauge theory amplitudes

    Science.gov (United States)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  8. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  9. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  10. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  11. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  12. Competitive spirit

    Science.gov (United States)

    2000-01-01

    Leicester University will host the 65 international teams of students who will assemble in July for this year's International Physics Olympiad . The last time the Olympiad came to the UK was in 1986 in London, and it was the notable enthusiasm of the Leicester Physics and Astronomy department which persuaded the Olympiad Committee to give them the chance of organizing the prestigious event. The students taking part from all over the world are studying physics at A-level or an equivalent standard and they will take part in an intellectual marathon of theoretical and practical examinations. Each national team comprises five students selected from three rounds of competition and the teams will receive an official welcome from the city, as well as opportunities to visit some of the important educational and cultural centres of the surrounding region. The finalists will also be able to test their skills and initiative at the Challenger Learning Centre, which forms part of Leicester's new National Space Science Centre. Specific information on the event can be found on the Olympiad-2000 website at www.star.le.ac.uk/IphO-2000 . The Rudolf Ortvay problem solving contest in physics, which takes place in November, is a tradition of Eötvös University in Budapest, Hungary. The competition was first opened to international participants in 1998, enabling students from universities around the world to show their knowledge, ingenuity, problem-solving skills and physical insight into problems that are far beyond routine level. The problems (30 - 35 each year) are chosen from different branches of theoretical as well as applied physics. They have varying levels of difficulty, and every contestant can send solutions for ten problems. The focus is not on school-level problem-solving routines but rather on the `physical' way of thinking, recognition of the heart of the problem and an appropriate choice of mathematics. The majority of the assigned problems are original, few having

  13. A Convergent Differential Evolution Algorithm with Hidden Adaptation Selection for Engineering Optimization

    Directory of Open Access Journals (Sweden)

    Zhongbo Hu

    2014-01-01

    Full Text Available Many improved differential Evolution (DE algorithms have emerged as a very competitive class of evolutionary computation more than a decade ago. However, few improved DE algorithms guarantee global convergence in theory. This paper developed a convergent DE algorithm in theory, which employs a self-adaptation scheme for the parameters and two operators, that is, uniform mutation and hidden adaptation selection (haS operators. The parameter self-adaptation and uniform mutation operator enhance the diversity of populations and guarantee ergodicity. The haS can automatically remove some inferior individuals in the process of the enhancing population diversity. The haS controls the proposed algorithm to break the loop of current generation with a small probability. The breaking probability is a hidden adaptation and proportional to the changes of the number of inferior individuals. The proposed algorithm is tested on ten engineering optimization problems taken from IEEE CEC2011.

  14. Non-destructive measurement of soil liquefaction density change by crosshole radar tomography, Treasure Island, California

    Science.gov (United States)

    Kayen, Robert E.; Barnhardt, Walter A.; Ashford, Scott; Rollins, Kyle

    2000-01-01

    A ground penetrating radar (GPR) experiment at the Treasure Island Test Site [TILT] was performed to non-destructively image the soil column for changes in density prior to, and following, a liquefaction event. The intervening liquefaction was achieved by controlled blasting. A geotechnical borehole radar technique was used to acquire high-resolution 2-D radar velocity data. This method of non-destructive site characterization uses radar trans-illumination surveys through the soil column and tomographic data manipulation techniques to construct radar velocity tomograms, from which averaged void ratios can be derived at 0.25 - 0.5m pixel footprints. Tomograms of void ratio were constructed through the relation between soil porosity and dielectric constant. Both pre- and post-blast tomograms were collected and indicate that liquefaction related densification occurred at the site. Volumetric strains estimated from the tomograms correlate well with the observed settlement at the site. The 2-D imagery of void ratio can serve as high-resolution data layers for numerical site response analysis.

  15. Treasure Hunt - a serious game to support psychotherapeutic treatment of children.

    Science.gov (United States)

    Brezinka, Veronika

    2008-01-01

    Computer and video games for children have gained negative publicity due to reported associations between intensive gaming and aggressive behaviour, school failure, and overweight. While most studies centre upon negative consequences of video games, their innovative potentials tend to be overlooked. One field for the innovative use of computer games is child psychotherapy. By including therapeutic concepts into a video game, children can be offered attractive electronic homework assignments that enable them to rehearse and repeat basic psychoeducational concepts they have learned during therapy sessions. Moreover, therapeutic games can help therapists to structure therapy sessions. Psychotherapeutic computer games translated into foreign languages could form a useful tool in the treatment of migrant children. 'Treasure Hunt' is the first serious game based on principles of cognitive behaviour modification. It is developed for eight to twelve year old children who are in cognitive-behavioural treatment for various disorders. Reactions of children and therapists to experimental versions of the game are positive. Serious games might prove a useful tool to support psychotherapeutic treatment of children.

  16. Treasure Na-ion anode from trash coke by adept electrolyte selection

    Science.gov (United States)

    Cabello, Marta; Chyrka, Taras; Klee, Rafael; Aragón, María J.; Bai, Xue; Lavela, Pedro; Vasylchenko, Gennadiy M.; Alcántara, Ricardo; Tirado, José L.; Ortiz, Gregorio F.

    2017-04-01

    Converting 'trash' waste residua to active functional materials 'treasure' with high added value is being regarded as a promising way to achieve the sustainable energy demands. Carbonaceous materials cannot insert sodium except when graphite co-intercalates solvents such as diglyme. Here, we show that petroleum coke and shale coke annealed at different temperatures can also insert sodium by reversible intercalation phenomena in a diglyme-based electrolyte. The structural and morphological studies will reveal significant differences justifying their distinct electrochemical behavior. Galvanostatic tests exhibit a flat plateau at about 0.7 V ascribable to the reversible reaction. At the end of the discharge, a Stage-I ternary intercalation compound is detected. Two diglyme molecules are co-intercalated per alkali ion, as evidenced by 1-D Patterson diagrams, FTIR and TGA analyses. The full sodium-ion cell made with P-2500/NaPF6(diglyme)/Na3V2(PO4)3 delivered an initial reversible capacity of 75 mA h g-1 at C rate and an average potential of 2.7 V. Thus, the full cell provides an energy density of 202 W h kg-1. This sodium-ion system can be considered a promising power source that encourages the potential use of low-cost energy storage systems.

  17. Sacred groves of north Malabar: treasure trove of endemic and rare medicinal plants

    Directory of Open Access Journals (Sweden)

    K. Subrahmanya Prasad

    2011-01-01

    Sacred groves are one of the finest examples of traditional in situ conservation practices and act as treasure house of endemic, endangered and rare plants. Endemic species of any geographical region, throw light on the biogeography of the area, areas of extinction and evolution of the flora. Twelve famous sacred groves of north Malabar region of Kerala were selected for study. Studies were aimed at the documentation of floristic diversity with special reference to endemic as well as RET medicinal plants and to know threats to them. Present inventory accounted for a total of 99 endemic angiosperms, of which 28 qualified for RET categories. Their role in germplasm conservation is evident from the fact that not a single plant is common to the groves studied and restriction of 47 endemic plants to any one of the grove. There are 59 endemic plants, of which 18 belong to RET category are in high demand due to their medicinal properties. Medicinal plant diversity varies from a minimum of 65% to a maximum of 91% while that of endemic plants ranges from 11% in Andallur to 18% in Edayilakkad. Present study revealed the endemic plant diversity of these groves and also their role in the conserving germplasms of wild yam, figs, pepper, mango and a variety of endemic medicinal plants. Like other groves of Kerala, these are also facing the threat of extinction from increasing anthropogenic activities and there is an urgent need of complete protection and public awareness for the existence of these near-climax communities.

  18. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  19. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  20. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  1. Non-destructive micro-analytical system for the study of the manufacturing processes of a group of gold jewels from "El Carambolo" treasure

    Science.gov (United States)

    Scrivano, S.; Ortega-Feliu, I.; Gómez-Tubío, B.; Ager, F. J.; de la Bandera, M. L.; Respaldiza, M. A.; Ontalba-Salamanca, M. A.

    2017-01-01

    The impressive gold treasure of El Carambolo, representative of the Tartesic culture and dated from the 8th to 6th century BCE, constitutes a typological and stylistic unity unparalleled in the archeological field. Due to the importance of this treasure and the interest in studying it in depth, a new micro X-ray fluorescence (micro-XRF) portable system has been developed at the Centro Nacional de Aceleradores (Sevilla, Spain). Eleven jewels of El Carambolo treasure have been analyzed in order to characterize the composition of the employed alloys, to identify the manufacturing processes and to discuss hypothesis about the production workshop of the treasure. Besides, the application of the new micro-XRF instrumentation allowed the analysis of small details like decoration elements and joining areas. This study permits the characterization of the joining methods and manufacturing procedures, thus, the construction stages of these highly complex jewels can be inferred. Many archeological and historical studies of the treasure have been performed during the last years but very few analytical results have been published. Furthermore, the results demonstrate the capability of the new developed portable micro-XRF setup to substitute satisfactorily other micro-analytical techniques, such as micro-PIXE (Particle Induced X-ray Emission), when the sample cannot be brought to a laboratory.

  2. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  3. Productive and Unproductive Competition

    DEFF Research Database (Denmark)

    Guerra, Alice; Luppi, Barbara; Parisi, Francesco

    Conventional theories of competition classify contests as being either “productive,” when the competitive efforts generate a surplus for society, or “unproductive,” when competition generates no social surplus and merely distributes already existing resources. These two discrete categories...... of competition create a division of real-world situations into analytical categories that fails to recognize the entire spectrum of competitive activities. Taking the existing models of productive and unproductive competition as benchmark idealizations, this paper explores the relationship between the privately...... and socially optimal levels of competition in the full range of intermediate cases, as well as in the extremum cases of destructive and super-productive competition....

  4. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, Maja; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  5. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  6. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements

  7. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  8. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  9. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  10. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  11. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  12. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  13. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  14. Cooperation and Competition, Strategic Alliances, and the Cambrian Explosion

    Science.gov (United States)

    López-Gómez, JuliÁn; Molina-Meyer, Marcela

    Ecology, Economy and Management require a huge interdisciplinary effort to ascertain the hidden mechanisms driving the evolution of communities and firm networks. This article shows that strategic alliances in competitive environments provoke an explosive increment of productivity and stability through a feedback mechanism promoted by cooperation, while competition causes segregation within cooperative profiles. Some further speciation and radiation mechanisms enhancing innovation, facilitated by environmental heterogeneities and specific market regulations, might explain the biodiversity of life and the high complexity of industrial and financial markets. Extinctions occur by the lack of adaptation of strongest competitors to sudden environmental stress.

  15. From dust to treasure: building a proper self-image through astronomy course

    Science.gov (United States)

    Pang, Xiaoying

    2015-08-01

    Self-image is how we perceive ourselves. It is the impression built up over time from how we see ourselves and how the others see ourselves. As a teacher in a small college in China since 2013, I have found that most of my undergraduate students’ self-image is not “so healthy”, even some of them “de-valuate” themselves. After I got my PhD degree in astronomy, I have taught the astronomy introduction course in my college for three semesters. Since last semester, I decide not only to aim to warm up my students’ enthusiasm for astronomy, but also to try to help them build a proper self-image through astronomical teaching. In the course, solar system, planet formation, habitable planet, life on the planet are first few lectures to make students understand what a low probability that a habitable planet supporting life is formed. In a following lecture: from dust to treasure, I illustrate how precious each of us on earth, which are results of several billion years of evolution. At the same time, psychological survey and discussion are carried out during the course, helping students better understand themselves. Students are divided into groups to finish assignments via discussion and team work. In the final exam, each group present what they have learnt in a 10-15 min show, such as drama, musical, debate, crosstalk, dance etc.. I will present the structure of my course, the technique I use to teach, the most recent results of a survey of students’ self-image, and the students’ thought of the course in this meeting.

  16. IBA investigations of loose garnets from Pietroasa, Apahida and Cluj-Someşeni treasures (5th century AD)

    Energy Technology Data Exchange (ETDEWEB)

    Bugoi, R., E-mail: bugoi@nipne.ro [Horia Hulubei National Institute for Nuclear Physics and Engineering, Măgurele 077125 (Romania); Oanţă-Marghitu, R., E-mail: rodicamarghitu@yahoo.com [Muzeul Naţional de Istorie a României, Bucureşti 030026 (Romania); Calligaro, T., E-mail: thomas.calligaro@culture.gouv.fr [Centre de Recherche et de Restauration des Musées de France, C2RMF, Palais du Louvre – Porte des Lions, 75001 Paris (France); PSL Research University, Chimie ParisTech – CNRS, Institut de Recherche Chimie Paris, UMR8247, 75005 Paris (France)

    2016-03-15

    This paper reports the archaeometric investigations of 418 loose garnets from Pietroasa and Cluj-Someşeni treasures and Apahida II and III princely grave inventories (5th century AD). The chemical composition of the gems was determined by external beam micro-PIXE technique at the AGLAE accelerator of C2RMF, Paris, France. Complementary observations made by Optical Microscopy revealed details on the gemstones cutting and polishing and permitted to identify certain mineral inclusions. The compositional results evidenced several types of garnets from the pyralspite series, suggesting distinct provenances for these Early Medieval gems.

  17. The earrings of Pancas treasure: Analytical study by X-ray based techniques – A first approach

    Energy Technology Data Exchange (ETDEWEB)

    Tissot, I., E-mail: isabel.tissot@archeofactu.pt [Archeofactu – Rua do Cerrado das Oliveiras, No. 14, 2°Dto., 2610-035 Alfragide (Portugal); Tissot, M., E-mail: matthias.tissot@archeofactu.pt [Archeofactu – Rua do Cerrado das Oliveiras, No. 14, 2°Dto., 2610-035 Alfragide (Portugal); Museu Nacional de Arqueologia – Praça do Império, 1400-206 Lisboa (Portugal); Manso, M., E-mail: marta974@gmail.com [Centro de Física Atómica da Universidade de Lisboa, Av., Prof. Gama Pinto 2, 1649-003 Lisboa (Portugal); Alves, L.C., E-mail: luisa@cii.fc.ul.pt [IST/ITN, Univ. Técnica de Lisboa, E.N. 10, UFA-LFI, 2686-953 Sacavém (Portugal); Barreiros, M.A., E-mail: alexandra.barreiros@lneg.pt [LNEG, I.P., Estrada do Paço do Lumiar 22, 1649-038 Lisboa (Portugal); Marcelo, T., E-mail: teresa.marcelo@lneg.pt [LNEG, I.P., Estrada do Paço do Lumiar 22, 1649-038 Lisboa (Portugal); Carvalho, M.L., E-mail: lcalves@itn.pt [Centro de Física Atómica da Universidade de Lisboa, Av., Prof. Gama Pinto 2, 1649-003 Lisboa (Portugal); Corregidor, V., E-mail: vicky.corregidor@itn.pt [IST/ITN, Univ. Técnica de Lisboa, E.N. 10, UFA-LFI, 2686-953 Sacavém (Portugal); Guerra, M.F., E-mail: maria.guerra@culture.gouv.fr [Centre de Recherche et de Restauration des Musées de France and UMR8220 CNRS - 14, quai François Mitterrand, 75001 Paris (France)

    2013-07-01

    The development of new metallurgical technologies in the Iberian Peninsula during the Iron Age is well represented by the 10 gold earrings from the treasure of Pancas. This work presents a first approach to the analytical study of these earrings and contributes to the construction of a typological evolution of the Iberian earrings. The manufacture techniques and the alloys composition were studied with three complementary X-ray spectroscopy techniques: portable EDXRF, μ-PIXE and SEM–EDS. The results were compared with earrings from the same and previous periods.

  18. IBA investigations of loose garnets from Pietroasa, Apahida and Cluj-Someşeni treasures (5th century AD)

    Science.gov (United States)

    Bugoi, R.; Oanţă-Marghitu, R.; Calligaro, T.

    2016-03-01

    This paper reports the archaeometric investigations of 418 loose garnets from Pietroasa and Cluj-Someşeni treasures and Apahida II and III princely grave inventories (5th century AD). The chemical composition of the gems was determined by external beam micro-PIXE technique at the AGLAE accelerator of C2RMF, Paris, France. Complementary observations made by Optical Microscopy revealed details on the gemstones cutting and polishing and permitted to identify certain mineral inclusions. The compositional results evidenced several types of garnets from the pyralspite series, suggesting distinct provenances for these Early Medieval gems.

  19. A Hidden Portrait by Edgar Degas

    Science.gov (United States)

    Thurrowgood, David; Paterson, David; de Jonge, Martin D.; Kirkham, Robin; Thurrowgood, Saul; Howard, Daryl L.

    2016-08-01

    The preservation and understanding of cultural heritage depends increasingly on in-depth chemical studies. Rapid technological advances are forging connections between scientists and arts communities, enabling revolutionary new techniques for non-invasive technical study of culturally significant, highly prized artworks. We have applied a non-invasive, rapid, high definition X-ray fluorescence (XRF) elemental mapping technique to a French Impressionist painting using a synchrotron radiation source, and show how this technology can advance scholarly art interpretation and preservation. We have obtained detailed technical understanding of a painting which could not be resolved by conventional techniques. Here we show 31.6 megapixel scanning XRF derived elemental maps and report a novel image processing methodology utilising these maps to produce a false colour representation of a “hidden” portrait by Edgar Degas. This work provides a cohesive methodology for both imaging and understanding the chemical composition of artworks, and enables scholarly understandings of cultural heritage, many of which have eluded conventional technologies. We anticipate that the outcome from this work will encourage the reassessment of some of the world’s great art treasures.

  20. COMPETITIVENESS AND SUPPORTING THE BUSINESS COMPETITIVENESS

    Directory of Open Access Journals (Sweden)

    Mester Liana-Eugenia

    2014-12-01

    Full Text Available Competitiveness designates efficiency, productivity, success, adaptability, quality products, optimum costs. Competitiveness is a complex concept which defines the ability of a firm or country to cope with actual or potential competition companies or countries on a particular market, on the world market respectively and it is synonymous with economic efficiency; competitiveness reflects a certain state of the economic activity arising from a certain resource consumption in order to achieve economic goods. Supporting the national competitiveness and flexibility is aimed at a sustained increase in productivity relying on the diversification and the innovation of the domestic industrial base. The Global Competitiveness Report 2011-2012 ranks Romania as the 77th out of 142 assessed economies. Romania has access to a large market and free trade area, which makes it attractive for many foreign companies, but Romania needs a coherent economic policy that changes the approach used today - from the traditionalist design of restructuring following the resources and, therefore, related to the comparative advantage to finding solutions that stimulate the activities based on knowledge and information so that they allow the emphasis of the competitive advantages. This paper aims to identify the factors and reasons that gave rise to the level of competitiveness for some activities or fields of activities from the economy of Romania during the reporting period, as well as the possibilities that would lead to increasing and supporting the competitiveness of the national economy.

  1. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  2. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  3. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  4. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  5. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  6. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  7. Finite State Transducers Approximating Hidden Markov Models

    CERN Document Server

    Kempe, A

    1999-01-01

    This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is especially advantageous for part-of-speech tagging because the resulting transducer can be composed with other transducers that encode correction rules for the most frequent tagging errors. The speed of tagging is also improved. The described methods have been implemented and successfully tested on six languages.

  8. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  9. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  10. Killing and letting die: hidden value assumptions.

    Science.gov (United States)

    Atkinson, G

    1983-01-01

    In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.

  11. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  12. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  13. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  14. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  15. Physics Competitions in Hungary

    Science.gov (United States)

    Lugosi, ErzséBet SzéP, Jenö

    The following sections are included: * Description of Physics Competitions in Hungary * Training of the Hungarian Team before the International Physics Olympiad * Few Problems for the Hungarian National Physics Competition for 15 - 16 Year Old students * Problems for the Hungarian National Physics Competition in 1989 for 17 - 18 Year Old Students * Experimental Problems for the Competition of KöMAL for 15 - 18 Year Old Students * Problems for the Hungarian National Physics Competition in 1989 for 17 - 18 Year Old Students * solving this equation we obtain m = 18kg * The work done is 427 joule - 80 joule 347 joule * Experimental Problems for the Competition of KöMAL for 15 - 18 Pear Old Students

  16. The Glinka Memorial Soil Monolith Collection: a treasure of Soil Science

    Science.gov (United States)

    Muggler, C. C.; Spaargaren, O.; Hartemink, A. E.

    2012-04-01

    years of great environmental change. The Glinka Memorial Collection is a special collection of the World Soil Museum, a scientific and historical treasure that offers possibilities to dig into the history of soil science and the history of the soils themselves.

  17. The mineral treasure that almost got away: Re-evaluating yesterday's mine waste

    Science.gov (United States)

    Högdahl, K.; Jonsson, E.; Troll, V.; Majka, J.

    2012-04-01

    treasures". A conservative estimate based on SGU databases is that in this province alone, there are over 6500 mineralisations/deposits. A majority of these have associated mine dumps and in the case of more recently mined deposits, different types of tailings. Initial results highlight the high average contents of REÉs and identify their mineralogical and textural distribution in apatite-iron oxide ore present in both dumps and tailings. In addition, we report the occurrence of previously undetected mineralisation of indium and tungsten in different mine dumps in the western part of the province.

  18. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  19. Diversifying evolution of competitiveness.

    Science.gov (United States)

    Baldauf, Sebastian A; Engqvist, Leif; Weissing, Franz J

    2014-10-29

    In many species, individuals express phenotypic characteristics that enhance their competitiveness, that is, the ability to acquire resources in competition with others. Moreover, the degree of competitiveness varies considerably across individuals and in time. By means of an evolutionary model, we provide an explanation for this finding. We make the assumption that investment into competitiveness enhances the probability to acquire a high-quality resource, but at the same time reduces the ability of exploiting acquired resources with maximal efficiency. The model reveals that under a broad range of conditions competitiveness either converges to a polymorphic state, where individuals differing in competitive ability stably coexist, or is subject to perpetual transitions between periods of high and low competitiveness. The dynamics becomes even more complex if females can evolve preferences for (or against) competitive males. In extreme cases, such preferences can even drive the population to extinction.

  20. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  1. Ireland's Competitiveness Challenge 2011

    OpenAIRE

    2012-01-01

    The NCC publishes two annual competitiveness reports. Ireland's Competitiveness Challenge focuses on the national competitiveness issues of most importance to the enterprise sector and identifies policy recommendations required to address these issues. The report focuses on pursuing policies to improve competitiveness, particularly those to reduce the cost base for enterprise, to enhance the performance of the entire education system, and to deliver meaningful public sector reform. Ireland's ...

  2. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  3. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  4. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  5. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  6. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  7. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  8. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  9. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  10. Supplementing managed competition.

    Science.gov (United States)

    Higgins, W

    President Clinton's proposal for health care reform calls for managed competition within global expenditure targets. However, it is unlikely that health plans will have sufficient leverage with providers to negotiate arrangements consistent with expenditure targets in nonurban areas. This paper describes a reimbursement system based on competitive prospective payment and capitation (CPPC) which can supplement managed competition in less populous areas or replace managed competition should that strategy prove unsuccessful. The CPPC system is capable of enforcing an expenditure target while encouraging the formation of capitated networks and creating strong incentives for efficiency. It is generally compatible with the Clinton administration's version of managed competition.

  11. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  12. Error statistics of hidden Markov model and hidden Boltzmann model results

    Science.gov (United States)

    Newberg, Lee A

    2009-01-01

    Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results. PMID:19589158

  13. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  14. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  15. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  16. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  17. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  18. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  19. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  20. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  1. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  2. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  3. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  4. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  5. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The locations of the breaks are subsequently obtained by assigning states to data points according to the Maximum Posterior Mode (MPM) algorithm. The Integrated Classification Likelihood-Bayesian Information Criterion (ICL-BIC) allows for the determination of the number of regimes by taking into account...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule....

  6. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  7. Gender and Competition in Adolescence

    DEFF Research Database (Denmark)

    Dreber, Anna; Essen, Emma von; Ranehill, Eva

    2013-01-01

    We look at gender differences among adolescents in Sweden in preferences for competition, altruism and risk. For competitiveness, we explore two different tasks that differ in associated stereotypes. We find no gender difference in competitiveness when comparing performance under competition...

  8. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  9. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  10. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  11. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  12. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  13. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  14. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  15. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  16. Bayesian structural inference for hidden processes.

    Science.gov (United States)

    Strelioff, Christopher C; Crutchfield, James P

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ε-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ε-machines, irrespective of estimated transition probabilities. Properties of ε-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  17. TREASURE mobile app: A satellite-enabled application for personalized heatwave risk based on location and user profile

    Science.gov (United States)

    Keramitsoglou, I.; Katsouyanni, K.; Analitis, A.; Sismanidis, P.; Kiranoudis, C. T.

    2016-12-01

    High temperatures and heatwaves are associated with large increases in mortality, especially among susceptible individuals living in urban areas. The within-city variability in the effects associated with specific area characteristics, including the Urban Heat Island effect, have to be taken into account to estimate the level of heatwave risk associated with a specific city location. Real-time appraisal and quantification of spatially distributed heatwave risk is therefore required to develop innovative applications to safeguard citizens' health. TREASURE app (http://treasure.eu-project-sites.com/) integrates the expertise of epidemiologists, Earth Observation scientists and IT developers into intelligent operational and real-time heatwave risk assessment for citizens. The app provides the user with an assessment of personalized location-specific heatwave risk. For the development of the app an epidemiological analysis of a long series of mortality data against measured data series has been carried out to identify the temperature level associated with the minimum mortality (threshold) and the change in risk of death for increases in temperature above this level, in the warm period. Published results have been also taken into account. For the estimation of heatwave hazard thermal infrared Earth Observation data were exploited so as to provide spatially and temporally detailed air and land surface temperatures. An advanced workflow has been developed that uses 4 km/5' geostationary TIR data from EUMETSAT MSG2-SEVIRI satellite, output from the Global Forecast System weather model and SAFNWC software. This workflow consists of the preprocessing of the EO data and the retrieval of LST and TA at an enhanced spatial resolution of 1km. The mobile app was developed for, evaluated in and endorsed by two Mediterranean cities with different characteristics, namely Athens (GR) and Palma (ES) and has set the ground for application to any other European city.

  18. Approximate kernel competitive learning.

    Science.gov (United States)

    Wu, Jian-Sheng; Zheng, Wei-Shi; Lai, Jian-Huang

    2015-03-01

    Kernel competitive learning has been successfully used to achieve robust clustering. However, kernel competitive learning (KCL) is not scalable for large scale data processing, because (1) it has to calculate and store the full kernel matrix that is too large to be calculated and kept in the memory and (2) it cannot be computed in parallel. In this paper we develop a framework of approximate kernel competitive learning for processing large scale dataset. The proposed framework consists of two parts. First, it derives an approximate kernel competitive learning (AKCL), which learns kernel competitive learning in a subspace via sampling. We provide solid theoretical analysis on why the proposed approximation modelling would work for kernel competitive learning, and furthermore, we show that the computational complexity of AKCL is largely reduced. Second, we propose a pseudo-parallelled approximate kernel competitive learning (PAKCL) based on a set-based kernel competitive learning strategy, which overcomes the obstacle of using parallel programming in kernel competitive learning and significantly accelerates the approximate kernel competitive learning for large scale clustering. The empirical evaluation on publicly available datasets shows that the proposed AKCL and PAKCL can perform comparably as KCL, with a large reduction on computational cost. Also, the proposed methods achieve more effective clustering performance in terms of clustering precision against related approximate clustering approaches.

  19. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  20. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  1. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  2. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  3. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  4. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  5. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  6. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  7. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  8. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  9. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  10. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  11. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  12. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  13. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  14. Heterogeneous logics of competition

    DEFF Research Database (Denmark)

    Mossin, Christiane

    2015-01-01

    The purpose of the article is to demonstrate that in order to understand competition as a socially organizing phenomenon, we should not examine competition in isolation, but as constellations of heterogeneous logics. More precisely, the article is based on two main theoretical points: (1) Logics...... of competition are only realized as particular forms of social organization by virtue of interplaying with other kinds of logics, like legal logics. (2) Competition logics enjoy a peculiar status in-between constructedness and givenness; although competition depends on laws and mechanisms of socialization, we...... still experience competition as an expression of spontaneous human activities. On the basis of these perspectives, a study of fundamental rights of EU law, springing from the principle of ‘free movement of people’, is conducted. The first part of the empirical analysis seeks to detect the presence...

  15. Competition in treasury auctions

    OpenAIRE

    Elsinger, Helmut; Schmidt-Dengler, Philipp; Zulehner, Christine

    2016-01-01

    We investigate the role of competition on the outcome of Austrian Treasury auctions. Austria's EU accession led to an increase in the number of banks participating in treasury auctions. We use structural estimates of bidders' private values to examine the effect of increased competition on auction performance: We find that increased competition reduced bidder surplus substantially, but less than reduced form estimates would suggest. A significant component of the surplus reduction is due to m...

  16. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  17. Intramural Gymnastics Competition.

    Science.gov (United States)

    Cornelius, William L.

    1981-01-01

    An intramural gymnastic competition, if properly organized, can foster student and community interest in gymnastics. Aspects of organization and essential preplanning include: directing, judging, scoring, and managing. (JN)

  18. Intramural Gymnastics Competition.

    Science.gov (United States)

    Cornelius, William L.

    1981-01-01

    An intramural gymnastic competition, if properly organized, can foster student and community interest in gymnastics. Aspects of organization and essential preplanning include: directing, judging, scoring, and managing. (JN)

  19. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  20. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  1. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  2. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  3. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  4. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  5. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  6. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...

  7. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  8. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions...... within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004) and is Colb (1975) still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004) claims that we...... investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic...

  9. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  10. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  11. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  12. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  13. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  14. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  15. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  16. Maternal Competition in Women.

    Science.gov (United States)

    Linney, Catherine; Korologou-Linden, Laurel; Campbell, Anne

    2017-03-01

    We examined maternal competition, an unexplored form of competition between women. Given women's high investment in offspring and mothers' key role in shaping their reproductive, social, and cultural success as adults, we might expect to see maternal competition between women as well as mate competition. Predictions about the effect of maternal characteristics (age, relationship status, educational background, number of children, investment in the mothering role) and child variables (age, sex) were drawn from evolutionary theory and sociological research. Mothers of primary school children (in two samples: N = 210 and 169) completed a series of questionnaires. A novel nine-item measure of maternal competitive behavior (MCQ) and two subscales assessing Covert (MCQ-C) and Face-to-Face (MCQ-FF) forms of competition were developed using confirmatory factor analysis. Competitiveness (MCQ score) was predicted by maternal investment, single motherhood, fewer children, and (marginally) child's older age. The effect of single motherhood (but not other predictors) was partially mediated by greater maternal investment. In response to a scenario of their child underperforming relative to their peers, a mother's competitive distress was a positive function of the importance she ascribed to their success and her estimation of her child's ability. Her competitive distress was highly correlated with the distress she attributed to a female friend, hinting at bidirectional dyadic effects. Qualitative responses indicated that nonspecific bragging and boasting about academic achievements were the most common irritants. Although 40% of women were angered or annoyed by such comments, less than 5% endorsed a direct hostile response. Instead, competitive mothers were conversationally shunned and rejected as friends. We suggest that the interdependence of mothers based on reciprocal childcare has supported a culture of egalitarianism that is violated by explicit competitiveness.

  17. Competition: Was Kohn Right?

    Science.gov (United States)

    Shields, David Light; Bredemeier, Brenda Light

    2010-01-01

    Alfie Kohn made the case for competition being destructive to education. The truth may be that there are two separate ways to contest: true competition, which is a healthy desire to excel, and decompetition, which is the unhealthy desire merely to beat the opponent. Decompetition leads to the ills that Kohn enumerated. Educators should teach their…

  18. Competition, Ownership and Productivity

    DEFF Research Database (Denmark)

    Baghdasaryan, Delia; la Cour, Lisbeth

    2013-01-01

    Theoretical results support two concurrent views regarding the mediating role that ownership structure might play on the effect of competition on firm performance. According to one stream of literature, competition has a high, positive impact in companies that have an effective ownership structur...

  19. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  20. Study on Application Techniques of Plant Growth Regulator Foliar Treasure%植物生长调节剂叶面宝应用技术研究

    Institute of Scientific and Technical Information of China (English)

    王华玉

    2015-01-01

    [目的]探讨植物生长调节剂叶面宝应用技术。[方法]进行6种植物生长调节剂叶面宝浓度下用材林树种沙兰杨、泡桐、法桐和果树山楂、葡萄、红富士、黑奥林、巨峰对比试验,研究植物生长调节剂叶面宝增益效应。[结果]试验结果表明,用叶面宝900~1200 mL/hm2,于6—7月份分2~3次喷施,用材林的高生长和粗生长有明显提高,果树叶重、果重和含糖量、树势等都有极显著提高。[结论]叶面宝在林业生产中,尤其在果树生产中有较大的推广和应用价值。%Objective] The aim was to explore the application techniques of plant growth regulator foliar treasure. [Method] The gain effects were studied by concentration test of Shaalan Yang timber species, paulownia, Fatong hawthorn and fruit trees, grapes, Fuji, Olympus black, Jufeng with the six kinds of plant growth regulators foliar concentrations treasures. [Result] The results showed that high growth and diameter growth of timbers has improved significantly with foliage treasure 900-1 200 mL/hm2, 2-3 times spraying in June - July, and leaf weight, fruit weight and sugar content, vigor and others of fruit trees increased significantly. [Conclusion] Foliar treasure had greater promotion and application value in forestry production, especially in fruit production.

  1. 余额宝的法律风险分析--基于PEST分析%The Legal Risk Analysis of Balance Treasure---Based on PEST Analysis

    Institute of Scientific and Technical Information of China (English)

    莫金兰

    2015-01-01

    Balance treasure as a web-based financial creative attempt launched a powerful impact on the fi-nancial markets. Through PEST analysis tools,this paper analyzes the macro environment of balance treasure,finds balance treasure disintermediation Internet financial form is the trend of the development of the financial markets. However,issues emerge in endlessly,such as the lack of social credit,risk disclosure and reveal inadequate,and le-gal compliance risks,this presents new opportunities and challenges for regulatory authorities. So regulators should strengthen the construction of Internet financial credit management system,establish deposit insurance system which can corresponded to the balance treasure,and improve the legal system of Internet financial.%余额宝作为基于互联网金融的创造性尝试给金融市场带来了巨大的冲击。通过PEST工具对余额宝所处的宏观环境进行分析,发现余额宝去中介化的互联网金融形式已是金融市场发展的趋势。但是社会信用缺失、风险披露和揭示不充分、法律合规风险等问题层出不穷,给监管部门提出了新的挑战,应采取加强互联网金融的信用管理体系建设、建立与余额宝相适应的存款保险制度、完善互联网金融的法律体系等措施予以完善。

  2. Competition in investment banking

    Directory of Open Access Journals (Sweden)

    Katrina Ellis

    2011-01-01

    Full Text Available We construct a comprehensive measure of overall investment banking competitiveness for follow-on offerings that aggregates the various dimensions of competition such as fees, pricing accuracy, analyst recommendations, distributional abilities, market making prowess, debt offering capabilities, and overall reputation. The measure allows us to incorporate trade-offs that investment banks may use in competing for new or established clients. We find that firms who switch to similar-quality underwriters enjoy more intense competition among investment banks which manifests in lower fees and more optimistic recommendations. Investment banks do compete vigorously for some clients, with the level of competition related to the likelihood of gaining or losing clients. Finally, investment banks not performing up to market norms are more likely to be dropped in the follow-on offering. In contrast, firms who seek a higher reputation underwriter face relatively non-competitive markets.

  3. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  4. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  5. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  6. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  7. 蛹虫草八宝粥的研制%Development of Cordyceps militaris Eight-treasure Porridge

    Institute of Scientific and Technical Information of China (English)

    何洋; 刘林德; 苏志坚; 黄清荣

    2011-01-01

    [目的]将蛹虫草发酵液应用于八宝粥的生产中,为蛹虫草功能性食品的开发开拓新的思路.[方法]首先通过正交试脸优化蛹虫草菌丝球的制备方法,再以得到的蛹虫草液体发酵产生的菌丝球为特色原料,配以传统材料糯米、玉米、绿豆、红豆、红芸豆、花生、红枣、桂圆、莲子、银耳得到成品.[结果]以4%的葡萄糖为碳源,1%的玉米粉汁为氮源,转速120 r/min,接种量3%的条件下,生产直径6~8 mm的菌球数量最多.各原料混合熬制的八宝粥色泽鲜艳、质软香甜、清香诱人、滑而不腻,且产品各理化指标和微生物指标均符合要求.[结论]蛹虫草八宝粥富含虫草素、虫草酸、虫草多糖等活性物质,是一种新型的蛹虫草功能性食品.%[ Objective ] The aim was to apply broth from Cordyceps militaris fermentation in the production of eight-treasure porridge and open up new development thought for developing functional food from C. militaris. [ Method] At first, the production method of C. militaris mycelium pellet was optimized through orthogonal test. Then, with the mycelium pellet produced from liquid fermentation with C. militaris as feature raw material, the finished product was yielded by supplementing traditional materials, such as glutinous rice, corn, mung bean, red bean, red kidney bean, peanut, red date, longan, lotus seeds and white fungus gourd. [ Result] With 4% glucose as carbon source and 1% maizena juice as nitrogen source, when the rotation speed and innoculation amount were 120 r/min and 3%, the yielded mycelium pellets with diameter of 6 -8 mm were most. The eight-treasure porridge decocted from the mixture of raw materials was bright-colored, soft, fragrant, sweet,smooth but not greasy and threw out inviting faint scent. All the physical and chemical indexes and microbiological index of the product met the requirement. [ Conclusion ] The C. militaris eight-treasure porridge was rich in

  8. Competition Policy and Innovation

    DEFF Research Database (Denmark)

    Møllgaard, Peter; Lorentzen, Jo

    2005-01-01

    We briefly review the rationale behind technological alliances and provide a snapshot oftheir role in global competition, especially insofar as it is based around intellectual capital.They nicely illustrate the increased importance of horizontal agreements and thusestablish the relevance...... of the topic. We move on to discuss the organisation of industriesin a dynamic context and draw out consequences for competition policy. We concludewith an outlook on the underlying tensions between technology alliances, competitionpolicy, and industrial policy.JEL codes: L4, L5, O31Keywords: Competition...

  9. Competition in education

    DEFF Research Database (Denmark)

    Knudsen, Hanne; Christensen, Søren

    Competition in education has two functions: selection and motivation. How do these two functions correlate, contradict or co-exist? How has the educational system reflected on the relation between competition as motivational technology and as a technology for selection? The aim of this paper...... is to formulate the problem of competition in education as a relation between selection and motivation and provide an analytical strategy to grasp this problem. Our ambition is to theorize the problem and give empirical illustrations of how the connection between selection and motivation has been articulated...... in various educational institutions and programs....

  10. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  11. Local clustering in scale-free networks with hidden variables.

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A J E M; van Leeuwaarden, Johan S H; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ∈(2,3), so that the degrees have infinite variance. The natural cutoff h_{c} characterizes the largest degrees in the hidden variable models, and a structural cutoff h_{s} introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N, as a function of h_{s} and h_{c}. For scale-free networks with exponent 2vanish only for networks as large as N=10^{9}.

  12. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  13. Modelling proteins' hidden conformations to predict antibiotic resistance

    Science.gov (United States)

    Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.

    2016-10-01

    TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.

  14. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  15. Self-similarity of complex networks and hidden metric spaces

    CERN Document Server

    Serrano, M Angeles; Boguna, Marian

    2007-01-01

    We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

  16. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  17. Dark matter in the nonabelian hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2015-01-01

    We discuss the dark matter in the hidden gauge theory. We propose a scenario where the mini-inflation dilutes the dark matter density. This scenario is consistent with the current baryon number asymmetry.

  18. Hidden Symmetry from Supersymmetry in One-Dimensional Quantum Mechanics

    Directory of Open Access Journals (Sweden)

    Alexander A. Andrianov

    2009-06-01

    Full Text Available When several inequivalent supercharges form a closed superalgebra in Quantum Mechanics it entails the appearance of hidden symmetries of a Super-Hamiltonian. We examine this problem in one-dimensional QM for the case of periodic potentials and potentials with finite number of bound states. After the survey of the results existing in the subject the algebraic and analytic properties of hidden-symmetry differential operators are rigorously elaborated in the Theorems and illuminated by several examples.

  19. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  20. Extracting hidden trails and roads under canopy using LIDAR

    OpenAIRE

    Krougios, Prokopios

    2008-01-01

    The field of Remote Sensing has been greatly benefited by the development of LIDAR. The extraction of bare earth under tree canopies and especially the identification of hidden trails are important tools for military and civilian operations in dense forests. LIDAR data from Sequoia National Park in California (2008) and Fort Belvoir Military Base in Virginia (2007) were two areas that were selected for analysis. Quick Terrain Modeler software was used in order to recognize hidden trails....

  1. Physical nature of a hidden mass in the Universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Yu. (AN SSSR, Moscow. Inst. Prikladnoj Matematiki)

    1984-04-01

    The problem of an origin of the hidden mass of the Universe is discussed. Observation astronomic data on large-scale Universe structure and hidden mass distribution within the framework of the adiabatic theory of galaxies formation point out the dominance in nowadays Universe of weakly-interacting particles with 15-60 eV mass. Restrictions are obtained for a possible admixture of other relict particles.

  2. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  3. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  4. Competition from Isotopic Modelling

    Directory of Open Access Journals (Sweden)

    Virginie Fabre

    2011-01-01

    Full Text Available During later MOIS3, in Europe two populations were present, autochthonous Neanderthals and modern humans. Ecological competition between these two populations has often been evoked but never demonstrated. Our aim is to establish whether resource competition occurred. In this paper, in order to examine the possibility of ecological competition between these two populations, 599 isotopic data were subjected to rigorous statistical treatment and analysis through mixing models. The aim of this paper was to compare dietary strategies of Neanderthals and modern humans over time. Our conclusions suggest that Neanderthals and modern humans shared dietary habits in the particular environmental context of MOIS3 characterised in Europe by climatic deterioration. In this environmental context, the resource competition between Neanderthals and modern humans may have accelerated the disappearance of the Neanderthal population.

  5. Competition between Women.

    Science.gov (United States)

    Joseph, R.

    1985-01-01

    Examined competition and physical attractiveness among women. Results indicated that a large number of females are highly critical of other women, particularly attractive ones, and are highly concerned about their own appearance in relation to other women. (Author/BL)

  6. Heterogeneous logics of competition

    DEFF Research Database (Denmark)

    Mossin, Christiane

    2015-01-01

    The purpose of the article is to demonstrate that in order to understand competition as a socially organizing phenomenon, we should not examine competition in isolation, but as constellations of heterogeneous logics. More precisely, the article is based on two main theoretical points: (1) Logics...... still experience competition as an expression of spontaneous human activities. On the basis of these perspectives, a study of fundamental rights of EU law, springing from the principle of ‘free movement of people’, is conducted. The first part of the empirical analysis seeks to detect the presence...... of a presumed logic of competition within EU law, whereas the second part focuses on particular legal logics. In this respect, the so-called ‘real link criterion’ (determining the access to transnational social rights for certain groups of unemployed people) is given special attention. What is particularly...

  7. DMEPOS Competitive Bidding

    Data.gov (United States)

    U.S. Department of Health & Human Services — The DMEPOS Competitive Bidding Program was mandated by Congress through the Medicare Prescription Drug, Improvement, and Modernization Act of 2003 (MMA). The statute...

  8. COMPETITIVENESS FOR SUSTAINABLE ECONOMIES

    Directory of Open Access Journals (Sweden)

    Nelu Eugen POPESCU

    2014-04-01

    Full Text Available The current economic environment puts pressure on all national economies which struggle to improve their competitiveness and innovativeness in a sustainable way. This article aims to present the current state of the competitiveness by reviewing the main literature and worldwide researches, in order to provide a brief overview of the determinants that drive productivity and economic success at global and national level, taking into consideration the entrepreneurial activity for a country’s competitiveness and economic growth. The paper identifies the ways in which efficiency driven countries can improve their policies and get a better return on their investments, underlining a set of competitiveness enhancing policies (measures that can be implemented by public and private institutions in order to strengthen the economic fundamentals of the economies.

  9. Competition and Cheating

    Science.gov (United States)

    ... Cheating Family Life Listen Español Text Size Email Print Share Competition and Cheating Page Content Article Body My son tends to cheat when he plays games. What should we do? Cheating is the result ...

  10. Reduced-Rank Hidden Markov Models

    CERN Document Server

    Siddiqi, Sajid M; Gordon, Geoffrey J

    2009-01-01

    We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-...

  11. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  12. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  13. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  14. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  15. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  16. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  17. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  18. Stochastic precipitation generator with hidden state covariates

    Science.gov (United States)

    Kim, Yongku; Lee, GyuWon

    2017-08-01

    Time series of daily weather such as precipitation, minimum temperature and maximum temperature are commonly required for various fields. Stochastic weather generators constitute one of the techniques to produce synthetic daily weather. The recently introduced approach for stochastic weather generators is based on generalized linear modeling (GLM) with covariates to account for seasonality and teleconnections (e.g., with the El Niño). In general, stochastic weather generators tend to underestimate the observed interannual variance of seasonally aggregated variables. To reduce this overdispersion, we incorporated time series of seasonal dry/wet indicators in the GLM weather generator as covariates. These seasonal time series were local (or global) decodings obtained by a hidden Markov model of seasonal total precipitation and implemented in the weather generator. The proposed method is applied to time series of daily weather from Seoul, Korea and Pergamino, Argentina. This method provides a straightforward translation of the uncertainty of the seasonal forecast to the corresponding conditional daily weather statistics.

  19. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  20. Coulomb gauge model for hidden charm tetraquarks

    Science.gov (United States)

    Xie, W.; Mo, L. Q.; Wang, Ping; Cotanch, Stephen R.

    2013-08-01

    The spectrum of tetraquark states with hidden charm is studied within an effective Coulomb gauge Hamiltonian approach. Of the four independent color schemes, two are investigated, the (qcbar)1(cqbar)1 singlet-singlet (molecule) and the (qc)3(qbarcbar)3 triplet-triplet (diquark), for selected JPC states using a variational method. The predicted masses of triplet-triplet tetraquarks are roughly a GeV heavier than the singlet-singlet states. There is also an interesting flavor dependence with (qqbar)1 (ccbar1) states about half a GeV lighter than (qcbar)1(qbarc)1. The lightest 1++ and 1-- predictions are in agreement with the observed X (3872) and Y (4008) masses suggesting they are molecules with ωJ / ψ and ηhc, rather than D*Dbar* and DDbar, type structure, respectively. Similarly, the lightest isovector 1++ molecule, having a ρJ / ψ flavor composition, has mass near the recently observed charged Zc (3900) value. These flavor configurations are consistent with observed X, Y and Zc decays to ππJ / ψ.

  1. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  2. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  3. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  4. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  5. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  6. Gaining Relational Competitive Advantages

    DEFF Research Database (Denmark)

    Hu, Yimei; Zhang, Si; Li, Jizhen

    2015-01-01

    Establishing strategic technological partnerships (STPs) with foreign partners is an increasingly studied topic within the innovation management literature. Partnering firms can jointly create sources of relational competitive advantage. Chinese firms often lack research and development (R......&D) capabilities but are increasingly becoming preferred technological partners for transnational corporations. We investigate an STP between a Scandinavian and a Chinese firm and try to explore how to gain relational competitive advantage by focusing on its two essential stages: relational rent generation...

  7. FameLab competition

    CERN Multimedia

    2011-01-01

    Are you 18 to 35 years old and studying or working in science in Switzerland? Are you passionate about your job and keen on exciting public imagination with a vision of the 21st century of science? Then this competition is for you!   For more information, check out http://www.famelab.ch/ or http://famelab.org/ or write to info@famelab.ch. Read more about the Famelab competition in this Bulletin article.  

  8. World competitiveness and agriculture

    Directory of Open Access Journals (Sweden)

    J. van Zyl

    1997-07-01

    Full Text Available Against the background of a changing environment in which market factors and greater world trade and competitiveness are increasingly becoming the only criteria for success, a framework for the analysis of world competitiveness is initially developed. This is followed by a discussion on the growth of productivity in agriculture, as well as an exposition of the role of agricultural research. Thirdly, price factors and the terms of trade are discussed, followed by a summary of policy implications.

  9. COMPETITION AS MARKET MECHANISM

    Directory of Open Access Journals (Sweden)

    N. Ya. Kazhuro

    2015-01-01

    Full Text Available The essence of a competition as an objective law for development of the commodities production based on private ownership of the means of production and commodity exchange has been revealed in the paper. The paper presents an economic basis of market economy (private ownership which generates a corresponding production objective. Such purpose is a maximization of profit and a minimization of market subject expenses. Therefore, a struggle for the most favourable conditions on commodity production and sales is inevitable in such situation. The struggle is considered in the community with developed market economy as a competition.The competition is regarded not as an exogenic factor exerting its influence on market economic system from the outside, but as an objective phenomenon which is inherent to management market system in itself. Such treatment is substantiated by economic disintegration of individual commodity producers. Being an important engine of market economy, the competition does not establish its laws, and its role is to be an executive of data which are internally inherent in commodity production laws and firstly it concerns a profit maximization law which defines a purpose and guiding motif of economic entities in the given economy.The competition plays a contradictory role under conditions of market economy. On the one hand, it makes manufacturers constantly to aspire to expense reduction for the sake of profit increase. This has resulted in labour productivity increase, production cost decrease and a company receives an opportunity to reduce retail price for its products. Consequently, the competition acts as a potential factor for lowering of prices while increasing production efficiency. On the other hand, sellers have more freedom in price fixing under conditions of imperfect competition as they sell their products under the conditions of a monopolistic competition or an oligopoly. This is the main weakest point of the market

  10. Racial Discrimination and Competition

    OpenAIRE

    Ross Levine; Alexey Levkov; Yona Rubinstein

    2008-01-01

    This paper assesses the impact of competition on racial discrimination. The dismantling of inter- and intrastate bank restrictions by U.S. states from the mid-1970s to the mid-1990s reduced financial market imperfections, lowered entry barriers facing nonfinancial firms, and boosted the rate of new firm formation. We use bank deregulation to identify an exogenous intensification of competition in the nonfinancial sector, and evaluate its impact on the racial wage gap, which is that component ...

  11. Competitiveness in mass tourism

    OpenAIRE

    Claver Cortés, Enrique; Molina-Azorín, José F.; Pereira-Moliner, Jorge

    2007-01-01

    This paper offers an indepth analysis of a second-generation destination specializing in sun and sand mass tourism: Benidorm, Spain. Contrary to the view of many researchers, it is argued that such destinations need not inevitably decline and can in fact continue to be competitive. The persistence of this sun and sand mass tourism model is shown empirically through an analysis of its evolution and competitive situation. The paper offers suggestions about the strategies Benidorm hotels s...

  12. Competition and Offshoring

    OpenAIRE

    Jose Antonio Rodriguez-Lopez

    2012-01-01

    I present a model of offshoring decisions with heterogeneous firms, random adjustment costs, and endogenous markups. The model shows an inverted-U relationship between firm-level productivity and the probability of offshoring; hence, the most productive firms are less likely to offshore than some lower-productivity firms. A tougher competitive environment has two opposing effects on firm-level offshoring likelihood: a Schumpeterian effect--accounting for the negative effect of competition on ...

  13. Untangling healthcare competition.

    Science.gov (United States)

    Harris, I C; McDaniel, R R

    1993-11-01

    Traditional approaches to competition may be inappropriate for healthcare providers. Neoclassical economics makes the implicit assumption that a single actor embodies consumption, compensation, and benefit from a transaction. In healthcare, this assumption does not hold. Instead, such actions are accomplished by three separate actors--consumers (physicians), customers (third-party payers), and clients (patients). A hospital simultaneously competes in three arenas. Hospitals compete for physicians along a technological dimension. Competition for third-party payers takes on a financial dimension. Hospitals compete for patients along a marketing dimension. Because of the complex marketplace interactions among hospital, patient, physician, and third-party payer, the role of price in controlling behavior is difficult to establish. The dynamics underlying the hospital selection decision--that is, the decision maker's expectations of services and the convenience of accessing services--must also be considered. Healthcare managers must understand the interrelationships involved in the three-pronged competitive perspective for several reasons. This perspective clarifies the multiple facets of competition a hospital faces. It also disentangles the actions previously fulfilled by the traditional single buyer. It illuminates the critical skills underlying the competition for each audience. Finally, it defines the primary criterion each audience uses in sorting among hospitals. Recognition of the multifaceted nature of competition among healthcare providers will help demystify market behavior and thereby improve internal organizational communication systems, managers' ability to focus on appropriate activities, and the hospital's ability to adapt to changing market conditions.

  14. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  15. Disease surveillance using a hidden Markov model

    Directory of Open Access Journals (Sweden)

    Wright Graeme

    2009-08-01

    Full Text Available Abstract Background Routine surveillance of disease notification data can enable the early detection of localised disease outbreaks. Although hidden Markov models (HMMs have been recognised as an appropriate method to model disease surveillance data, they have been rarely applied in public health practice. We aimed to develop and evaluate a simple flexible HMM for disease surveillance which is suitable for use with sparse small area count data and requires little baseline data. Methods A Bayesian HMM was designed to monitor routinely collected notifiable disease data that are aggregated by residential postcode. Semi-synthetic data were used to evaluate the algorithm and compare outbreak detection performance with the established Early Aberration Reporting System (EARS algorithms and a negative binomial cusum. Results Algorithm performance varied according to the desired false alarm rate for surveillance. At false alarm rates around 0.05, the cusum-based algorithms provided the best overall outbreak detection performance, having similar sensitivity to the HMMs and a shorter average time to detection. At false alarm rates around 0.01, the HMM algorithms provided the best overall outbreak detection performance, having higher sensitivity than the cusum-based Methods and a generally shorter time to detection for larger outbreaks. Overall, the 14-day HMM had a significantly greater area under the receiver operator characteristic curve than the EARS C3 and 7-day negative binomial cusum algorithms. Conclusion Our findings suggest that the HMM provides an effective method for the surveillance of sparse small area notifiable disease data at low false alarm rates. Further investigations are required to evaluation algorithm performance across other diseases and surveillance contexts.

  16. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  17. Foundational Forces & Hidden Variables in Technology Commercialization

    Science.gov (United States)

    Barnett, Brandon

    2011-03-01

    The science of physics seems vastly different from the process of technology commercialization. Physics strives to understand our world through the experimental deduction of immutable laws and dependent variables and the resulting macro-scale phenomenon. In comparison, the~goal of business is to make a profit by addressing the needs, preferences, and whims of individuals in a market. It may seem that this environment is too dynamic to identify all the hidden variables and deduct the foundational forces that impact a business's ability to commercialize innovative technologies. One example of a business ``force'' is found in the semiconductor industry. In 1965, Intel co-founder Gordon Moore predicted that the number of transistors incorporated in a chip will approximately double every 24 months. Known as Moore's Law, this prediction has become the guiding principle for the semiconductor industry for the last 40 years. Of course, Moore's Law is not really a law of nature; rather it is the result of efforts by Intel and the entire semiconductor industry. A closer examination suggests that there are foundational principles of business that underlie the macro-scale phenomenon of Moore's Law. Principles of profitability, incentive, and strategic alignment have resulted in a coordinated influx of resources that has driven technologies to market, increasing the profitability of the semiconductor industry and optimizing the fitness of its participants. New innovations in technology are subject to these same principles. So, in addition to traditional market forces, these often unrecognized forces and variables create challenges for new technology commercialization. In this talk, I will draw from ethnographic research, complex adaptive theory, and industry data to suggest a framework with which to think about new technology commercialization. Intel's bio-silicon initiative provides a case study.

  18. COMPETITION: CLASSICAL VERSUS NEOCLASSICAL VIEW

    OpenAIRE

    Mihaela Cornelia Sandu

    2013-01-01

    Competition is an important element from economical theory. Over time it has experienced several definitions and classifications much of them being contradictory. In this paper I will make a parallel between classical and neoclassical point of view according to competition. Keywords. Competition; neoclassical theory; classical theory; monopolistic; perfect competition.

  19. Political Failures and Intergovernmental Competition

    Directory of Open Access Journals (Sweden)

    Jean Hindriks

    2012-01-01

    Full Text Available In normative public economics, intergovernmental competition is usually viewed as harmful. Although empirical support for this position does not abound, market integration has intensified competition among developed countries. In this paper we argue that when assessing welfare effects of intergovernmental competition for various forms of political failures (the public choice critique, the outcome is ambiguous and competition can be welfare improving.

  20. Competitively tight graphs

    CERN Document Server

    Kim, Suh-Ryung; Park, Boram; Sano, Yoshio

    2011-01-01

    The competition graph of a digraph $D$ is a (simple undirected) graph which has the same vertex set as $D$ and has an edge between $x$ and $y$ if and only if there exists a vertex $v$ in $D$ such that $(x,v)$ and $(y,v)$ are arcs of $D$. For any graph $G$, $G$ together with sufficiently many isolated vertices is the competition graph of some acyclic digraph. The competition number $k(G)$ of $G$ is the smallest number of such isolated vertices. In general, it is hard to compute the competition number $k(G)$ for a graph $G$ and it has been one of the important research problems in the study of competition graphs. Opsut~[1982] suggested that the edge clique cover number $\\theta_E(G)$ should be closely related to $k(G)$ by showing $\\theta_E(G)-|V(G)|+2 \\leq k(G) \\leq \\theta_E(G)$. In this note, we study on these inequalities. We first show that for any positive integer $m$ satisfying $2 \\leq m \\leq |V(G)|$, there is a graph $G$ satisfying $k(G)=\\theta_E(G)-|V(G)|+m$ and characterize a graph $G$ satisfying $k(G)=\\...

  1. Business plan competition

    CERN Multimedia

    2007-01-01

    "Venture – Companies for tomorrow" is a business plan competition, which supports students and other junior entrepreneurs in developing their business plans. The sixth edition of the competition is now taking place. Venture 2008 highlights: - prize money totalling CHF 150’000; - possibility to optimize business ideas and business plans with the help of experienced coaches: around 200 coaches are available, with a wide range of backgrounds, entrepreneurs as well as venture capitalists; -\tpossibility to present business ideas and business plans to potential investors ("Investor Days" - 17 January and 7 May); - active involvement in the start-up community; -\tcontribution to potential independence. The competition consists of two phases: Phase I, Business idea, Deadline for submission of business idea: 5 December 2007 (online at http://www.venture.ch). Award Ceremony: 17 January 2008 Phase II, Business plan Deadline for submission of business plan: 2 April 2008 (online at...

  2. Marketing mix and competitiveness

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2007-01-01

    Full Text Available Competitiveness cannot simply be viewed as a country's ability to export or generate trade surpluses, since these can be brought about at least temporarily by means of artificially lowering the exchange rate and/or compressing domestic expenditures, as has been done in recent years by many DC that have tried to adjust to diminished resource availability. Authors standpoint is that international competitiveness requires creating comparative advantage where it does not exist, and requires action on several levels including an emerging consensus on the importance of macroeconomic policy, role and accountability of the government as well as the imperative of developing and internalizing technology body of knowledge for achieving competitiveness. Particular attention is given to the role and impact of marketing instruments marketing mix.

  3. COMPETITIVENESS THROUGH ENVIRONMENTAL HEALTH

    Directory of Open Access Journals (Sweden)

    Dinu Cristina

    2010-12-01

    Full Text Available This millennium, confronted with a globalization of means leading as fast as possible at certain pursued aims, highlights the importance of competitiveness from the perspective of the continuous fight against limitation of resources. In this context, the machine of life evolution and economy has got an engine named competitiveness. The rules of circulation should focus on all livings to whom, from the perspective of survival and natural, human and social life accomplishment, the well- known concept of health may be attached. At the same time, competitiveness through environment health should try to reach the convergent performances which means that any form of superior knowledge and experience should always take into consideration environment health.

  4. Context Construction through Competition

    DEFF Research Database (Denmark)

    Kjær, Poul F.

    This paper examines the relation between the evolution of statehood and institutionalised competition in the European context. The first half of the paper develops a historical-sociological view on the evolution of modern political power in the state form in Europe while the second half the paper...... reconstructs how the institutionalisation of competition as a specific type of policy tool which has been used by emerging modern states to establish its authority vis-à-vis competing claims to authority. It furthermore engages in an examination of corporatist and governance based attempts to respectively curb...... and expand the use of competition as a tool for organising social processes and the implications of the se attempts for the state of statehood....

  5. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  6. Architectural Competition and BIM

    DEFF Research Database (Denmark)

    Sørensen, Nils Lykke; Frandsen, Anne Kathrine; Øien, Turid Borgestrand

    2015-01-01

    put under pressure. Thus, the two central actors involved inarchitectural competitions, architects and building clients, are continually influenced by such developments, interpreting and adaptingto changes according to their interests and horizons. During a project reviewing Nordic research literature...... on architecturalcompetitions, a series of interviews was conducted with building clients as well as architects, focusing on the impact of the above-mentioned changes within the building sector on architectural competitions as an institution. In the interviews, ICT and notleast BIM was a recurring theme that both parties saw...

  7. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Lünser, Gabriele; Tyran, Jean-Robert Karl

    2012-01-01

    We study the effects of reputation and competition in a trust game. If trustees are anonymous, outcomes are poor: trustees are not trustworthy, and trustors do not trust. If trustees are identifiable and can, hence, build a reputation, efficiency quadruples but is still at only a third of the first...... best. Adding more information by granting trustors access to all trustees' complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely...

  8. Competition and social cohesion

    Directory of Open Access Journals (Sweden)

    Mario Libertini

    2014-03-01

    Full Text Available "Competition" and "social cohesion" are both protected by E.U. and Italian laws. The author moves from the analysis of the meaning of these two concepts, in order to reflect on their compatibility and the way to conciliate them. The central problem - in the opinion of the Author - is to abandon the myth of spontaneous markets' order and to rebuild a political order able to maintain and support, as far as possible, the competitive market economy, but also to govern economic processes in critical moments and situations.

  9. Competition Policy and Innovation

    DEFF Research Database (Denmark)

    Møllgaard, Peter; Lorentzen, Jo

    2005-01-01

    We briefly review the rationale behind technological alliances and provide a snapshot oftheir role in global competition, especially insofar as it is based around intellectual capital.They nicely illustrate the increased importance of horizontal agreements and thusestablish the relevance of the t......We briefly review the rationale behind technological alliances and provide a snapshot oftheir role in global competition, especially insofar as it is based around intellectual capital.They nicely illustrate the increased importance of horizontal agreements and thusestablish the relevance...... policy, innovation, alliances, industrial policy...

  10. Competition Fosters Trust

    DEFF Research Database (Denmark)

    Huck, Steffen; Ruchala, Gabriele K.; Tyran, Jean-Robert

    but is still at only a third of the first best. Adding more information by granting buyers access to all sellers’ complete history has, somewhat surprisingly, no effect. On the other hand, we find that competition, coupled with some minimal information, eliminates the trust problem almost completely......We study the effects of reputation and competition in a stylized market for experience goods. If interaction is anonymous, such markets perform poorly: sellers are not trustworthy, and buyers do not trust sellers. If sellers are identifiable and can, hence, build a reputation, efficiency quadruples...

  11. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  12. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  13. Riboswitch Detection Using Profile Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Krishnamachari A

    2009-10-01

    Full Text Available Abstract Background Riboswitches are a type of noncoding RNA that regulate gene expression by switching from one structural conformation to another on ligand binding. The various classes of riboswitches discovered so far are differentiated by the ligand, which on binding induces a conformational switch. Every class of riboswitch is characterized by an aptamer domain, which provides the site for ligand binding, and an expression platform that undergoes conformational change on ligand binding. The sequence and structure of the aptamer domain is highly conserved in riboswitches belonging to the same class. We propose a method for fast and accurate identification of riboswitches using profile Hidden Markov Models (pHMM. Our method exploits the high degree of sequence conservation that characterizes the aptamer domain. Results Our method can detect riboswitches in genomic databases rapidly and accurately. Its sensitivity is comparable to the method based on the Covariance Model (CM. For six out of ten riboswitch classes, our method detects more than 99.5% of the candidates identified by the much slower CM method while being several hundred times faster. For three riboswitch classes, our method detects 97-99% of the candidates relative to the CM method. Our method works very well for those classes of riboswitches that are characterized by distinct and conserved sequence motifs. Conclusion Riboswitches play a crucial role in controlling the expression of several prokaryotic genes involved in metabolism and transport processes. As more and more new classes of riboswitches are being discovered, it is important to understand the patterns of their intra and inter genomic distribution. Understanding such patterns will enable us to better understand the evolutionary history of these genetic regulatory elements. However, a complete picture of the distribution pattern of riboswitches will emerge only after accurate identification of riboswitches across genomes

  14. VARIASI KELUASAN MAKNA TEKSTUAL (KMT DALAM TEKS DWIBAHASA FIVE ON THE TREASURE DAN LIMA SEKAWAN DI PULAU HARTA

    Directory of Open Access Journals (Sweden)

    Devi Rosmawati

    2014-10-01

    Full Text Available Penelitian ini bertujuan untuk mendeskripsikan variasi keluasan makna tekstusal (KMT yang direpresentasikan dalam teks Five on The Treasure Island dan Lima Sekawan di Pulau Harta, mendeskripsikan makna variasi KMT tersebut dalam konteks penerjemahan, serta membahas dan menginterpretasikan faktor-faktor kontekstual yang memotivasi terjadinya variasi KMT. Jenis penelitian ini adalah deskriptif-kualitatif yang menerapkan kerangka teoritik Translation Tou dan model komunikasi sematik translational untuk analisis translasi dan model conceptual Halliday untuk analisis makna tekstual. Sumber data yang digunakan adalah dua novel dengan fokus pada satuan-satuan klausa. yang mewujudkan satuan-satuan makna tekstual. Instrumen penelitian ini adalah peneliti sendiri dengan menerapkan konsep Komunikasi Semiotik Translasional (KST dan konsep Halliday tentang makna tekstual. Pengujian keabsahan data dilakukan melalui triangulasi. Hasil penelitian menunjukkan bahwa variasi KMT antara T1 dan T2 cenderung sangat rendah atau T1=T2, hal ini dapat dilihat dari tingkat frekuensi kemunculan terdapat pada variasi nol atau sangat rendah sebesar 552 atau 63,52% (T1=T2. Berdasarkan hasil rerata tingkat keluasannya, T1 lebih luas dari T2. Hal ini dapat dilihat dari kemunculan rerata T1 sejumlah 193 atau sebesar 22,21%. Jenis-jenis tema yang memotivasi terjadinya variasi keluasan makna tekstual yaitu: tema interpersonal, tema tekstual, dan tema topikal. Faktor-faktor kontekstual yang memotivasi terjadinya variasi KMT, yaitu konteks situasi dan konteks budaya. Konteks situasi terdiri dari field, tenor dan mode. Konteks budaya ditunjukkan oleh istilah yang mengacu pada budaya T1 digunakan pada T2. Pada judul yang tampak pada T1 dan T2, mengindikasikan bahwa T2 berintertekstual dengan T1. Kata Kunci: penerjemahan, tema-rema, keluasan makna tekstual.

  15. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  16. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  17. Recent Progress in Search for Hidden/Dark Photon

    CERN Document Server

    Deliyergiyev, M A

    2015-01-01

    We will try to communicate the many difficulties that we encounter when attempting to pinpoint a common origin for the several observed anomalies, or assessing their tension with existing exclusion limits. These include systematics affecting the operation of the detectors, our knowledge of their response, astrophysical uncertainties, and the broad range of particle couplings that can mediate the interaction with a detector target. The interesting astrophysical evidence that motivates a search for dark-photon and focuses our attention on a Hidden Valleys model with a GeV-scale dark sector that produces the exciting signatures, which may include the possible constituent of dark matter, the possible existence of extra gauge groups. Results from the recent underground experiments are also considered. Many models of new physics beyond the Standard Model contain a 'light' hidden sector (dark sector) with a colorful spectrum of new particles. Recently, it has been shown that the hidden sector can give rise to unique...

  18. Applications of hidden symmetries to black hole physics

    Energy Technology Data Exchange (ETDEWEB)

    Frolov, Valeri, E-mail: vfrolov@ualberta.ca [Institute of Theoretical Physics, Department of Physics University of Alberta, Edmonton, Alberta, T6G 2G7 (Canada)

    2011-02-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  19. The hidden-charm pentaquark and tetraquark states

    CERN Document Server

    Chen, Hua-Xing; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like $Z_c$ states and bottomonium-like $Z_b$ states can not be accommodated within the naive quark model. These charged $Z_c$ states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.

  20. Ontology-based Knowledge Extraction from Hidden Web

    Institute of Scientific and Technical Information of China (English)

    SONG Hui; MA Fan-yuan; LIU Xiao-qiang

    2004-01-01

    Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly.

  1. Applications of hidden symmetries to black hole physics

    CERN Document Server

    Frolov, Valeri

    2010-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set (`tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  2. Using the hidden curriculum to teach professionalism in nursing students.

    Science.gov (United States)

    Karimi, Zohreh; Ashktorab, Tahereh; Mohammadi, Easa; Abedi, Heidar Ali

    2014-03-01

    Professionalism in nursing is critical for creating credibility and a positive image. This study was carried out to explain the use of hidden curriculum in teaching professionalism in nursing students. This qualitative study was conducted through purposeful sampling strategy by the participation of 32 nursing students. The data were collected by using semi-structured interviews, and this process was continued until achieving data saturation and themes' emergence. Content analysis method was used for data analysis. DATA ANALYSIS REVEALED THREE MAIN THEMES: Development of understanding the professionalism elements, Variety of influenceability strategies, and Influenceability to various resources. Each theme consisted of some subthemes. The nursing students learnt the professionalism elements by different methods from different resources through the hidden curriculum. Therefore, exploration of the currently administered hidden curricula is suggested.

  3. Competition Law in Malaysia

    OpenAIRE

    Anand Raj; Cynthia Lian; Wen-Ly Chin

    2015-01-01

    There is still some way for Malaysia to go and the lack of merger control (for the foreseeable future) remains a significant shortcoming in the Malaysian competition law regime at this stage. Anand Raj, Cynthia Lian, & Wen-Ly Chin (Shearn Delamore & Co., Kuala Lumpur)

  4. Positioning for Competition.

    Science.gov (United States)

    Lapovsky, Lucie; Hubbell, Loren Loomis

    2000-01-01

    Analyzes results of the 1999 National Association of College and Business Officers tuition discounting survey and identifies trends. Finds colleges and universities are reactively responding to market pressures and proactively trying to analyze and position themselves ahead of the competition, often regional rather than national, for the…

  5. Competition in Individualized CAI.

    Science.gov (United States)

    Hativa, Nira; And Others

    1993-01-01

    Examines the effects of competition and cooperation on learning through computer-assisted instruction (CAI). A questionnaire was administered to 457 Israeli fourth graders who used two CAI arithmetic systems. The characteristics of the systems are discussed, and the results of the survey are correlated to students' gender and achievement levels.…

  6. Industrial location and competitiveness

    NARCIS (Netherlands)

    S. Brakman (Steven); J.H. Garretsen (Harry); J.G.M. van Marrewijk (Charles)

    2006-01-01

    textabstractThe interaction between the extent of location advantages and the intensity of firm competition relative to the size of the market jointly determines the location of industrial activity. Technology, factor endowments, geography, and scale economies are influential for determining locatio

  7. Explaining competitive reaction effects

    NARCIS (Netherlands)

    Leeflang, P.S.H.; Wittink, D.R.

    Changes in promotional expenditure decisions for a brand, as in other marketing decisions, should be based on the expected impact on purchase and consumption behavior as well as on the likely reactions by competitors. Purchase behavior may be predicted from estimated demand functions. Competitive

  8. Conflict exposure and competitiveness

    NARCIS (Netherlands)

    Cecchi, Francesco; Leuveld, Koen; Voors, Maarten

    2016-01-01

    We use data from a street football tournament and a series of lab-in-field experiments in postconflict Sierra Leone to examine the impact of exposure to conflict violence on competitive behavior. We find that football players who experienced more intense exposure to violence are more likely to get a

  9. Business Ideas Competition

    CERN Multimedia

    2003-01-01

    Business Ideas Competition "The Rainbow Seed Fund is a UK fund, which provides finance to support the commercialization of good ideas founded on scientific research; it is for the benefit of the UK industry in particular. To encourage ideas from CERN the Rainbow Seed Fund is running a business ideas competition.The winner of this competition will receive an immediate cash prize of GBP £1,000. In addition the Rainbow Seed Fund may well provide finance for market research, for protection of Intellectual Property Rights (IPR) and for prototyping to take the idea forward. Further awards of GBP £750 will be made for ideas which gain investment from the Fund.Candidates will only be required to prepare a 2-4-page summary of their business idea, and not a full business plan. Full details and an entry form are available at www.rainbowseedfund.com ." ALL Members of the Personnel seeking participation in the business ideas competition are asked to submit their ideas via the CERN TT Unit (Jean-Marie.Le Goff@cern.ch) th...

  10. Conflict exposure and competitiveness

    NARCIS (Netherlands)

    Cecchi, Francesco; Leuveld, Koen; Voors, Maarten

    2016-01-01

    We use data from a street football tournament and a series of lab-in-field experiments in postconflict Sierra Leone to examine the impact of exposure to conflict violence on competitive behavior. We find that football players who experienced more intense exposure to violence are more likely to get a

  11. Crop–weed competition

    DEFF Research Database (Denmark)

    Gallandt, Eric R.; Weiner, Jacob

    2015-01-01

    on crops. Longer term management of crop–weed competition can be achieved through crop rotations, specifically crop sequences that reduce the weed seed bank, and therefore seedling density, and prevent proliferation of perennial weeds. Key ConceptsKey Concepts * Plant growth requires sunlight, water...

  12. Context Construction Through Competition

    DEFF Research Database (Denmark)

    Kjær, Poul F.

    2015-01-01

    This article examines the relationship between the evolution of statehood and competition in the European context. To begin with, a particular take on the evolution of modern political power in the state form in Europe is developed. Against this background, the article reconstructs how the instit......This article examines the relationship between the evolution of statehood and competition in the European context. To begin with, a particular take on the evolution of modern political power in the state form in Europe is developed. Against this background, the article reconstructs how...... the institutionalization of competition as a specific type of policy tool has been used by emerging modern states to establish their authority vis-à-vis competing claims to public authority in society. The article, furthermore, engages in an examination of (neo-)corporatist and governance-based attempts both to curb...... and to expand the use of competition as a tool for organizing social processes, and the implications of these attempts for the state of statehood....

  13. Explaining competitive reaction effects

    NARCIS (Netherlands)

    Leeflang, P.S.H.; Wittink, D.R.

    2001-01-01

    Changes in promotional expenditure decisions for a brand, as in other marketing decisions, should be based on the expected impact on purchase and consumption behavior as well as on the likely reactions by competitors. Purchase behavior may be predicted from estimated demand functions. Competitive re

  14. Mediterranean Way of Competitiveness

    Directory of Open Access Journals (Sweden)

    Art Kovacic

    2010-12-01

    Full Text Available The Mediterranean area have a special concept of competitiveness topic. Normally is that region not so industrial and knowledge based oriented as a North Europe.That countries can't reach the same development level as the north one. Lisbon's and Goethenburg's strategies create the main framework of development programme. Mediterranean programme is such a case. European internal market has forced the EU countries to increase competitiveness. The economic prosperity of countries is associated with their ability to generate or attract economic activities which are able to increase income by performing well on themarket. Financial crisis in the EU has changed the look on the competitiveness research. Economy in the main countries has to find way of recovery. Former giants of the financial world have found themselves suddenly facing bankruptcy.Inevitably, the crisis is also having an effect on households and businesses - economic growth has slowed sharply and in some EU countries unemployment has begun to increase for the first time in several years. Form that perspective we have to find the right solution of European competitiveness.

  15. Growing Competition for Libraries.

    Science.gov (United States)

    Gibbons, Susan

    2001-01-01

    Describes the Questia subscription-based online academic digital books library. Highlights include weaknesses of the collection; what college students want from a library; importance of marketing; competition for traditional academic libraries that may help improve library services; and the ability of Questia to overcome barriers and…

  16. A Swimming Competition

    Institute of Scientific and Technical Information of China (English)

    邹成兵; 邓新华

    2004-01-01

    Last Sunday, there was a swimming competition in our school. It had been a short time since I learned how to swim. Mr. Zhang, our PE teacher, said I had a gift in swimming and that competing in the game would help build up my confidence and courage. With his encouragement,I signed up for the swimming race.

  17. Context Construction Through Competition

    DEFF Research Database (Denmark)

    Kjær, Poul F.

    2015-01-01

    This article examines the relationship between the evolution of statehood and competition in the European context. To begin with, a particular take on the evolution of modern political power in the state form in Europe is developed. Against this background, the article reconstructs how the instit...

  18. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  19. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  20. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  1. Reheating the Standard Model from a hidden sector

    Science.gov (United States)

    Tenkanen, Tommi; Vaskonen, Ville

    2016-10-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before big bang nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful big bang nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  2. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-01-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  3. Backward causation, hidden variables and the meaning of completeness

    Indian Academy of Sciences (India)

    Huw Price

    2001-02-01

    Bell’s theorem requires the assumption that hidden variables are independent of future measurement settings. This independence assumption rests on surprisingly shaky ground. In particular, it is puzzlingly time-asymmetric. The paper begins with a summary of the case for considering hidden variable models which, in abandoning this independence assumption, allow a degree of ‘backward causation’. The remainder of the paper clarifies the physical significance of such models, in relation to the issue as to whether quantum mechanics provides a complete description of physical reality.

  4. Dynamically Generated Open and Hidden Charm Meson Systems

    CERN Document Server

    Gamermann, D; Strottman, D D; Vacas, M J V

    2006-01-01

    The lowest order chiral Lagrangian successfully applied to study the interaction of the SU(3) octet of pseudo-scalar mesons is generalized to include all mesons from the SU(4) 15-plet of pseudo-scalar mesons. Exchanges of heavy vector mesons, which are indirectly taken into account via this approach, are suppressed. Unitarization in coupled channels leads to dynamical generation of resonances in the open and hidden charm sectors. In particular, for reasonable values of the input, a new narrow scalar resonance in the hidden charm sector appears with a mass of 3.7 GeV.

  5. Reheating the Standard Model from a Hidden Sector

    CERN Document Server

    Tenkanen, Tommi

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  6. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-02-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  7. Image Coding using Markov Models with Hidden States

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto

    1999-01-01

    The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same.......The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same....

  8. How to Find a Hidden World at the LHC

    CERN Document Server

    Wells, James D

    2008-01-01

    I discuss how the Large Hadron Collider era should broaden our view of particle physics research, and apply this thinking to the case of Hidden Worlds. I focus on one of the simplest representative cases of a Hidden World, and detail the rich implications it has for LHC physics, including universal suppression of Higgs boson production, trans-TeV heavy Higgs boson signatures, heavy-to-light Higgs boson decays, weakly coupled exotic gauge bosons, and Higgs boson decays to four fermions via light exotic gauge bosons. Some signatures may be accessible in the very early stages of collider operation, whereas others motivate a later high-lumonosity upgrade.

  9. Environmental structure and competitive scoring advantages in team competitions

    Science.gov (United States)

    Merritt, Sears; Clauset, Aaron

    2013-10-01

    In most professional sports, playing field structure is kept neutral so that scoring imbalances may be attributed to differences in team skill. It thus remains unknown what impact environmental heterogeneities can have on scoring dynamics or competitive advantages. Applying a novel generative model of scoring dynamics to roughly 10 million team competitions drawn from an online game, we quantify the relationship between the structure within a competition and its scoring dynamics, while controlling the impact of chance. Despite wide structural variations, we observe a common three-phase pattern in the tempo of events. Tempo and balance are highly predictable from a competition's structural features alone and teams exploit environmental heterogeneities for sustained competitive advantage. Surprisingly, the most balanced competitions are associated with specific environmental heterogeneities, not from equally skilled teams. These results shed new light on the design principles of balanced competition, and illustrate the potential of online game data for investigating social dynamics and competition.

  10. Environmental structure and competitive scoring advantages in team competitions.

    Science.gov (United States)

    Merritt, Sears; Clauset, Aaron

    2013-10-29

    In most professional sports, playing field structure is kept neutral so that scoring imbalances may be attributed to differences in team skill. It thus remains unknown what impact environmental heterogeneities can have on scoring dynamics or competitive advantages. Applying a novel generative model of scoring dynamics to roughly 10 million team competitions drawn from an online game, we quantify the relationship between the structure within a competition and its scoring dynamics, while controlling the impact of chance. Despite wide structural variations, we observe a common three-phase pattern in the tempo of events. Tempo and balance are highly predictable from a competition's structural features alone and teams exploit environmental heterogeneities for sustained competitive advantage. Surprisingly, the most balanced competitions are associated with specific environmental heterogeneities, not from equally skilled teams. These results shed new light on the design principles of balanced competition, and illustrate the potential of online game data for investigating social dynamics and competition.

  11. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Maya: Hidden Worlds Revealed... determine that the objects to be included in the exhibition ``Maya: Hidden Worlds Revealed,'' imported...

  12. The Function and the Utilization of Hidden Curriculum in College English Teaching

    Institute of Scientific and Technical Information of China (English)

    张英

    2013-01-01

    Explore the nature of the hidden curriculum, and utilize the positive functions of hidden curriculum with theory on English teaching and psychological linguistics to obtain desirable effects in College English teaching.

  13. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    Indian Academy of Sciences (India)

    H Itoh; N Okada; T Yamashita

    2007-11-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden.

  14. Coarse-grained hidden entropy production in partially inaccessible quantum jump trajectories

    OpenAIRE

    Frenzel, Max F.; Sagawa, Takahiro

    2016-01-01

    We consider an open quantum system for which only a subset of all possible transitions are accessible, while the remaining ones are hidden from direct observation. Using a modification of the notion of quantum jump trajectories we introduce the coarse-grained hidden entropy, which quantifies the entropy production in the hidden subsystem conditioned on our observations of the visible part. The entropy production consisting of the sum of visible and coarse-grained hidden entropy is shown to sa...

  15. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  16. The Literature of Competitive Intelligence.

    Science.gov (United States)

    Walker, Thomas D.

    1994-01-01

    Describes competitive intelligence (CI) literature in terms of its location, quantity, authorship, length, and problems of bibliographic access. Highlights include subject access; competitive intelligence research; espionage and security; monographs; and journals. (21 references) (LRW)

  17. Endogeneous Risk in Monopolistic Competition

    OpenAIRE

    Vladislav Damjanovic

    2012-01-01

    We consider a model of financial intermediation with a monopolistic competition market structure. A non-monotonic relationship between the risk measured as a probability of default and the degree of competition is established.

  18. The Value of Competitive Contracting

    Science.gov (United States)

    2014-09-01

    Contract FAR authority citations (from GAO, 2010) A few other notable reasons why some agencies inhibit competition are the following: a. Lack of...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA JOINT APPLIED PROJECT THE VALUE OF COMPETITIVE CONTRACTING By: Pamela A...

  19. RECONSIDERING COMPETITIVE ADVANTAGES

    Directory of Open Access Journals (Sweden)

    Valentina Zaharia

    2011-12-01

    Full Text Available Development of the competitive advantage involves a considerable effort from any organization. In particular, those organizations involved in a strong competitive market require the development of strategies to allocate long-term strategic marketing resources, efficiently and with easily quantifiable results. Faced with a multitude of phenomena and processes sometimes contradictory on different markets of consumption, contemporarily marketing has the mission to develop as creative as possible the business strategy of the organizations, their capacity of interacting with customers and other categories of audience. Such concepts as strategic positioning, relational marketing, management of the relationship with the consumer, marketing integrated research, a.s.o. are only a few of the tools with the help of which the marketing managers will implement successful operational strategies. All these developments are creating a real new paradigm of Marketing aimed to better explain the new types of complex market relationship in which the 21st Century organization is .

  20. Competition in Soccer Leagues

    DEFF Research Database (Denmark)

    Hansen, Bodil Olai; Tvede, Mich

    In the present paper a model of competition between sports clubs in a sports league is presented. Clubs are endowed with initial players but at a cost clubs are able to sell their initial players and buy new players. The results are that: if the quality of players is one-dimensional, then equilib......In the present paper a model of competition between sports clubs in a sports league is presented. Clubs are endowed with initial players but at a cost clubs are able to sell their initial players and buy new players. The results are that: if the quality of players is one......-dimensional, then equilibria in pure strategies exist, and; if the quality of players is multi-dimensional, then there need not exist equilibria in pure strategies, but equilibria in mixed strategies exist. Equilibria in mixed strategies resemblance signings on deadline day in european soccer...

  1. Competitiveness in Road Transport

    DEFF Research Database (Denmark)

    Borgström, Benedikte; Gammelgaard, Britta; Bruun, Poul

    take into account logistics service supplier strategic management. We also contribute with better understanding of value creation in order to escape commoditization and differentiate services through relationships (customers and/or other hauliers). Practical implications concern hauliers’ strategy...... a competitive value proposition? We will illustrate the strategy-as-practice with two projects, and discuss implications in terms of capabilities needed to create an effective value proposition and hence competitiveness. The theoretical contribution is in theorizing haulier strategic development in which we...... in the market also encourage strategic development of some road hauliers into providers of unique services. Such road haulier strategic development contributes to efficiency and effectiveness in basically all business sectors of EU. Little research is available of such strategic and operational management...

  2. Competitive Advantage through Innovation

    DEFF Research Database (Denmark)

    Brem, Alexander; Maier, Maximilian; Wimschneider, Christine

    2016-01-01

    to failure several times. Before the current situation of the company, it remains challenging in the future as well. Hence, the Nespresso story provides interesting space for discussion and learning about what innovation is, how innovation emerges, and under which circumstances innovation can serve...... as a source for competitive advantage. Research limitations/implications Especially given the current market situation, the case offers different starting points for discussion about innovation and long-term company success. Practical implications Especially before the current market situation, the case...... offers different starting points for discussion about innovation and the success of a company on the long term. The case is designed to give practitioners a better understanding on what an innovation as, and how competitive advantages can be linked to innovation. Originality/value This case of Nespresso...

  3. Political Competition and Polarization

    DEFF Research Database (Denmark)

    Schultz, Christian

    This paper considers political competition and the consequences of political polarization when parties are better informed about how the economy functions than voters are. Specifically, parties know the cost producing a public good, voters do not. An incumbent's choice of policy acts like a signal...... for costs before an upcoming election. It is shown that the more polarized the political parties the more distorted the incumbent's policy choice....

  4. Managed competition that works.

    Science.gov (United States)

    Caper, P

    1993-05-19

    President Clinton has advocated managed competition within a global budget as a long-term strategy for simultaneously controlling health care costs and expanding access to medical care to all Americans. This proposal is intended to show how these two seemingly conflicting goals can be simultaneously accomplished. Managed competition, as it has been conceptualized to date, is primarily a strategy for reforming the system of providing health services. To work, it must be joined with a strategy for reforming our system of financing and paying for those services and of limiting overall system capacity. "Managed Competition That Works" is a proposal that would create a single trust-funded national system of health insurance, implemented through a system of vouchers to individuals. Global budgeting would be accomplished through establishment of the voucher's value each year. The trust fund would pay health plans for all medical care by capitation, but health plans would be free to negotiate a variety of payment arrangements with physicians, hospitals, and other providers. All plans would be required to offer a standard package of benefits, but would have great flexibility in offering benefits beyond the scope of the standard package, if those benefits replace high-cost with lower-cost services or permit the plan to compete more effectively for market share. This proposal would establish firm but acceptable national budget limits; provide universal, comprehensive, and uniform insurance coverage; eliminate cost shifting; encourage competition; reward efficiency-improving innovation; greatly reduce the need for centralized micromanagement of medical care; and retain local determination and a somewhat reduced level of consumer choice. Although this proposal is written as a national plan, trust funds could be implemented at the state level, if problems associated with portability of benefits among states could be solved.

  5. Competition and dental services.

    Science.gov (United States)

    Grytten, J; Sørensen, R

    2000-07-01

    Dental services for adults are different from all other Norwegian health services in that they are provided by private producers (dentists) who have full freedom to establish a practice. They have had this freedom since the end of World War II. A further liberalization of the market for dental services occurred in November 1995, when the so-called normal tariff was repealed. The system changed from a fixed fee system to a deregulated fee system. In principle, the market for dental services for adults operates as a free competitive market, in which dentists must compete for a market share. The aim of this study was to study the short-term effects of competition. A comprehensive set of data on fees, practice characteristics, treatment profiles and factors that dentists take into account when determining fees was analysed. The main finding was that competition has a weak effect. No support was found for the theory that the level of fees is the result of monopolistic competition or monopoly. The results also provided some evidence against the inducement hypothesis. At this stage, it is interesting to notice that dentists do not seem to exploit the power they have to control the market. One explanation, which is consistent with the more recent literature, is that physicians' behaviour to a large extent is influenced by professional norms and caring concerns about their patients. Financial incentives are important, but these incentives are constrained by norms other than self-interest. The interpretation of the results should also take into account that the deregulation has operated for a short time and that dentists and patients may not yet have adjusted to changes in the characteristics of the market.

  6. Ukraine Agricultural Competitiveness

    OpenAIRE

    2008-01-01

    The agri-food sector is an important part of the Ukrainian economy. Agriculture could make an even larger contribution to economic growth and the vitality of rural areas in Ukraine than is currently the case. Ukraine has the agro-climatic potential to be a major player on world agricultural markets. Agricultural competitiveness in Ukraine also suffers from inadequate systems to test and do...

  7. Attention Competition with Advertisement

    OpenAIRE

    Cetin, Uzay; Bingol, Haluk O.

    2012-01-01

    In the new digital age, information is available in large quantities. Since information consumes primarily the attention of its recipients, the scarcity of attention is becoming the main limiting factor. In this study, we investigate the impact of advertisement pressure on a cultural market where consumers have a limited attention capacity. A model of competition for attention is developed and investigated analytically and by simulation. Advertisement is found to be much more effective when a...

  8. Competition: the answers

    CERN Multimedia

    Staff Association

    2016-01-01

    The correct answers to the Staff Association Competition are: How many women delegates are there currently in the Staff Council? -14 Who is the current President of the Staff Association? - Alessandro Raimondo Which year was the Nursery School established by the Staff Association at CERN?  -1965 How many CERN clubs are supported by the Staff Association? -44 What is the supreme representative body of the Staff Association ? -The Staff Council   The winners will be informed by email.

  9. APPROACHES ON THE COMPETITIVE INTELLIGENCE

    OpenAIRE

    Ioan PETRIŞOR; Natalia Ana STRĂIN (SILAŞ)

    2013-01-01

    Within this study, we approached the concept of "competitive intelligence" (CI), which we consider a key element for the success of a business, especially in the current period, characterized by numerous economic and financial turbulence. According to Society of Competitive Intelligence (SCIP), competitive intelligence is defined as a method of ethical and moral collection, analysis and dissemination of information regarding the competitive environment, opportunities, vulnerabilities, and int...

  10. Uniqueness is Important in Competition

    Institute of Scientific and Technical Information of China (English)

    FENG Ai-Xia; XV Xiu-Lian; HE Da-Ren

    2009-01-01

    We propose a quantitative network description on the function of uniqueness in a competition system. Two statistical parameters, competition ability and uniqueness are defined, and their relationship in ordinary cases is analytically discussed. The competition between Chinese regional universities is taken as an example. The empirical investigation results show that the uniqueness of a university is really important in competition. Also,uniqueness is very helpful in the promotion of the university overall quality.

  11. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  12. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De...

  13. Searching for a hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Sanchis-Lozano Miguel-Angel

    2016-01-01

    Full Text Available A hidden sector beyond the Standard Model can show up in multiparticle production altering inclusive correlations and factorial cumulants of multiplicity distributions. In this report such a study is advocated with a special emphasis on the searches at LHC.

  14. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  15. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  16. Is the Hidden Curriculum a Relevant Issue in Educational Processes

    Directory of Open Access Journals (Sweden)

    Patarroyo Esther

    2004-08-01

    Full Text Available This paper explores some ideas about the hidden curriculum as an amount of ideas and beliefs which are implicit in an indirect way into the scholar life. Those ideas are regarding to gender equality, social status and racial difference, among others. We consider teachers are able to integrate the hidden curriculum as a pedagogical strategy in the classroom. Examples of integration include activities such as observation techniques, role-plays, peer modeling and particularly, the portfolio as a useful tool for reflection which reveals the hidden curriculum. Key words: Hidden Curriculum, Pedagogical Strategy, Portfolio, ELT Processes, Stereotypes Este documento explora algunas ideas acerca del currículo oculto como una suma de ideas y creencias que están implícitos de una forma indirecta dentro de la vida escolar. Estas ideas están relacionadas con la equidad de género, diferencias sociales y raciales, entre otros. Consideramos que es posible para los docentes integrar el currículo como estrategia pedagógica en el aula. Ejemplos de esta integración incluyen técnicas de observación, juegos de roles, modelamiento en parejas y particularmente, el portafolio como herramienta de reflexión que permita hacer evidente el currículo oculto. Palabras claves: Currículo Oculto, Estrategia Pedagógica, Estereotipos, Enseñanza de Inglés, Portafolio

  17. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.

    2015-01-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the nei...

  18. The Hidden Curriculum of Youth Policy: A Dutch Example

    NARCIS (Netherlands)

    Hopman, M.; De Winter, M.; Koops, W.

    2014-01-01

    Youth policy is more than a mere response to the actual behavior of children, but it is equally influenced by values and beliefs of policy makers. These values are however rarely made explicit and, therefore, the authors refer to them as “the hidden curriculum” of youth policy. The study investigati

  19. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel

    2016-01-01

    Most signatures of new physics in colliders have been studied so far on the transverse plane with respect to the beam direction. In this work however we study the impact of a hidden sector beyond the Standard Model (SM) on inclusive (pseudo)rapidity correlations and moments of the multiplicity distributions, with special emphasis in the LHC results.

  20. From epistemology to hidden curriculum: Critical vs. 'commercial' pedagogic perspective

    Directory of Open Access Journals (Sweden)

    Marojević Jovana C.

    2016-01-01

    Full Text Available Knowledge or, more precisely, its power is one of central themes in critical pedagogy. Since they are interested in school as the site of social critique, aimed at social transformations, critically oriented pedagogues pay special attention to the relation of knowledge and power or, to simplify it, the function of knowledge in the reproduction of the existing (often oppressive social relations. Not recognizing school as a mere site of social, economic or cultural preservation, they often study epistemology on which modern school is founded (positivistic epistemology and its hidden curriculum who function so that they legitimate social reproductive function of the school in a continuous cycle of self-justification. Since a certain understanding of knowledge and its function reveals the hidden curriculum of a certain educational philosophy, and since this consequently changes school into a site of social transformation or social transmission, viewed from the critical position this is the subject of the analysis of our paper. By final sublimation and contrasting the opposite positivistic and critical positions we conclude that the hidden curriculum of the first is the curriculum of the soliloquies while the curriculum of the second, critical tendency is entirely of a dialogue nature. It is clear that uni-directedness of the hidden curriculum formed according the postulates of positivistic epistemology can contribute only to positivistic transmission and regeneration of the existing social order, while the discursivity of critically oriented school defines the relation towards society as two-way, transformational, active and emancipatory.

  1. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  2. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...

  3. Thermoelectric generator hidden in a shirt with a fabric radiator

    Science.gov (United States)

    Leonov, Vladimir; Vullers, Ruud J. M.; Hoof, Chris Van

    2012-06-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers of a shirt and its characteristics are reported.

  4. Discriminative training of self-structuring hidden control neural models

    DEFF Research Database (Denmark)

    Sørensen, Helge Bjarup Dissing; Hartmann, Uwe; Hunnerup, Preben

    1995-01-01

    This paper presents a new training algorithm for self-structuring hidden control neural (SHC) models. The SHC models were trained non-discriminatively for speech recognition applications. Better recognition performance can generally be achieved, if discriminative training is applied instead. Thus...

  5. Old, New and Hidden Causes of Perioperative Hypersensitivity.

    Science.gov (United States)

    Garvey, Lene Heise

    2016-01-01

    Perioperative hypersensitivity reactions are rare, often life-threatening events, and subsequent investigations to identify the culprit are important to avoid re-exposure. All exposures in the perioperative setting may potentially be the cause of a hypersensitivity reaction, but drugs administered intravenously such as neuromuscular blocking agents (NMBA), induction agents and antibiotics have traditionally been reported to be implicated most commonly. It has recently become apparent that there are geographical differences in sensitization patterns related to variation in exposures, referral patterns and performance and interpretation of investigations. Differences in sensitization to NMBAs are partly explained by cross sensitization to pholcodine, an ingredient in cough-medicines available in some countries. While NMBAs are the most common causes of perioperative hypersensitivity in some countries, this may not necessarily be the case in all countries. New and hidden allergens have emerged as causes of perioperative hypersensitivity such as blue dyes, chlorhexidine and excipients. Detailed knowledge of the events at the time of reaction is necessary to identify potential culprits including rare and hidden allergens. Cooperation between allergists and anaesthetists, or other staff present perioperatively, is often needed to identify hidden or even undocumented exposures. The objectives of this review are to provide an overview of the history of investigation of perioperative hypersensitivity, to describe the differences in causes of perioperative hypersensitivity emerging over time and to increase awareness about the "hidden allergens" in the perioperative setting. Some practical advice on how to approach the patient testing negative on all initial investigations is also included.

  6. Parameter estimation of hidden periodic model in random fields

    Institute of Scientific and Technical Information of China (English)

    何书元

    1999-01-01

    Two-dimensional hidden periodic model is an important model in random fields. The model is used in the field of two-dimensional signal processing, prediction and spectral analysis. A method of estimating the parameters for the model is designed. The strong consistency of the estimators is proved.

  7. Beyond the hidden curriculum: The challenging search for authentic ...

    African Journals Online (AJOL)

    2013-11-01

    Nov 1, 2013 ... [6] It was erroneously assumed that medical students ... hidden curriculum, therefore, demands an authentic and comprehensive enquiry into the concept of human dignity, ... reasoning that underpins the desirable values-based healthcare. ... and highly interpersonal form of teaching and learning that takes.

  8. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    2014-01-01

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated S-lemma

  9. Recognizing Strokes in Tennis Videos Using Hidden Markov Models

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, W.; Zivkovic, Z.

    2001-01-01

    This paper addresses content-based video retrieval with an emphasis on recognizing events in tennis game videos. In particular, we aim at recognizing different classes of tennis strokes using automatic learning capability of Hidden Markov Models. Driven by our domain knowledge, a robust player segme

  10. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving...

  11. Evolving the Topology of Hidden Markov Models using Evolutionary Algorithms

    DEFF Research Database (Denmark)

    Thomsen, Réne

    2002-01-01

    Hidden Markov models (HMM) are widely used for speech recognition and have recently gained a lot of attention in the bioinformatics community, because of their ability to capture the information buried in biological sequences. Usually, heuristic algorithms such as Baum-Welch are used to estimate...

  12. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a techniqu

  13. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  14. Optical Test of Local Hidden-Variable Model

    Institute of Scientific and Technical Information of China (English)

    WU XiaoHua; ZONG HongShi; PANG HouRong

    2001-01-01

    An inequality is deduced from local realism and a supplementary assumption. This inequality defines an experiment that can be actually performed with the present technology to test local hidden-variable models, and it is violated by quantum mechanics with a factor 1.92, while it can be simplified into a form where just two measurements are required.``

  15. New Caledonian crows reason about hidden causal agents.

    Science.gov (United States)

    Taylor, Alex H; Miller, Rachael; Gray, Russell D

    2012-10-02

    The ability to make inferences about hidden causal mechanisms underpins scientific and religious thought. It also facilitates the understanding of social interactions and the production of sophisticated tool-using behaviors. However, although animals can reason about the outcomes of accidental interventions, only humans have been shown to make inferences about hidden causal mechanisms. Here, we show that tool-making New Caledonian crows react differently to an observable event when it is caused by a hidden causal agent. Eight crows watched two series of events in which a stick moved. In the first set of events, the crows observed a human enter a hide, a stick move, and the human then leave the hide. In the second, the stick moved without a human entering or exiting the hide. The crows inspected the hide and abandoned probing with a tool for food more often after the second, unexplained series of events. This difference shows that the crows can reason about a hidden causal agent. Comparative studies with the methodology outlined here could aid in elucidating the selective pressures that led to the evolution of this cognitive ability.

  16. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  17. Search for dark photons from supersymmetric hidden valleys

    NARCIS (Netherlands)

    Abazov, V.M.; et al., [Unknown; Ancu, L.S.; de Jong, S.J.; Filthaut, F.; Galea, C.F.; Hegeman, J.G.; Houben, P.; Meijer, M.M.; Svoisky, P.; van den Berg, P.J.; van Leeuwen, W.M.

    2009-01-01

    We search for a new light gauge boson, a dark photon, with the D0 experiment. In the model we consider, supersymmetric partners are pair produced and cascade to the lightest neutralinos that can decay into the hidden sector state plus either a photon or a dark photon. The dark photon decays through

  18. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  19. Simple yet Hidden Counterexamples in Undergraduate Real Analysis

    Science.gov (United States)

    Shipman, Barbara A.; Shipman, Patrick D.

    2013-01-01

    We study situations in introductory analysis in which students affirmed false statements as true, despite simple counterexamples that they easily recognized afterwards. The study draws attention to how simple counterexamples can become hidden in plain sight, even in an active learning atmosphere where students proposed simple (as well as more…

  20. Local clustering in scale-free networks with hidden variables

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A. J. E. M.; van Leeuwaarden, Johan S. H.; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ ∈(2 ,3 ) , so that the degrees have infinite variance. The natural cutoff hc characterizes the largest degrees in the hidden variable models, and a structural cutoff hs introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N , as a function of hs and hc. For scale-free networks with exponent 2 universality class at hand. We characterize the extremely slow decay of C when τ ≈2 and show that for τ =2.1 , say, clustering starts to vanish only for networks as large as N =109 .

  1. On local-hidden-variable no-go theorems

    Science.gov (United States)

    Methot, A. A.

    2006-06-01

    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky, and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimately doomed in 1964 with the work of Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus, we will discuss here the three principal forms of no-go theorems for local hidden variable theories of Nature. We will define Bell theorems, Bell theorems without inequalities, and pseudo-telepathy. A discussion of the similarities and differences will follow.

  2. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  3. Isovector and hidden-beauty partners of the X(3872)

    CERN Document Server

    Hogaasen, Hallstein; Richard, Jean-Marc; Sorba, Paul

    2014-01-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks (H. Hogaasen, J-M. Richard and P. Sorba, Phys. Rev. D73, 054013, 2006). The extension to the hidden-beauty sector is discussed.

  4. Bayesian online algorithms for learning in discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2008-01-01

    We propose and analyze two different Bayesian online algorithms for learning in discrete Hidden Markov Models and compare their performance with the already known Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalization we draw learning curves in simplified situations for these algorithms and compare their performances.

  5. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  6. EDUCATION: THE HIDDEN TREASURE? Образование: сокрытое сокровище?

    Directory of Open Access Journals (Sweden)

    Danilova M. I.

    2012-05-01

    Full Text Available Education plays a central role in shaping personality. Moreover, the particular importance are the values and ideals, which are formed through a process of education and training. Today the moral component of the education system is one of the priority tasks of the state

  7. Competition, cooperation, and collective choice

    DEFF Research Database (Denmark)

    Markussen, Thomas; Reuben Paris, Ernesto Guillermo; Tyran, Jean-Robert Karl

    2014-01-01

    scheme fosters cooperation. Competition is popular, but the electoral outcome depends strongly on specific voting rules of institutional choice. If the majority decides, competition is almost always adopted. If likely losers from competition have veto power, it is often not, and substantial gains...

  8. Competition, cooperation, and collective choice

    DEFF Research Database (Denmark)

    Markussen, Thomas; Reuben Paris, Ernesto Guillermo; Tyran, Jean-Robert Karl

    scheme fosters cooperation. Competition is popular but the electoral outcome depends strongly on specific voting rules of institutional choice. If the majority decides, competition is almost always adopted. If likely losers from competition have veto power, it is often not, and substantial gains...

  9. Competitive Intelligence and Social Advantage.

    Science.gov (United States)

    Davenport, Elisabeth; Cronin, Blaise

    1994-01-01

    Presents an overview of issues concerning civilian competitive intelligence (CI). Topics discussed include competitive advantage in academic and research environments; public domain information and libraries; covert and overt competitive intelligence; data diversity; use of the Internet; cooperative intelligence; and implications for library and…

  10. Competitive Environments and Protective Behaviour

    NARCIS (Netherlands)

    Borm, P.E.M.; Estevez Fernandez, M.A.; Fiestras-Janeiro, G.

    2005-01-01

    The class of two-person competition games is introduced and analyzed.For any game in this class the set of Nash equilibria is convex, equilibrium strategies are exchangeable, and all Nash equilibria lead to the same payoff vector. Competition games are compared to other competitive environments such

  11. Competition policy and cartel size

    NARCIS (Netherlands)

    Bos, A.M.; Harrington Jr., J.E.

    2013-01-01

    This paper examines endogenous cartel formation in the presence of a competition authority. Competition policy makes the most inclusive stable cartels less inclusive. In particular, small firms that might have been cartel members in the absence of a competition authority are no longer members. Regar

  12. Competition policy and cartel size

    NARCIS (Netherlands)

    Bos, A.M.; Harrington Jr., J.E.

    2013-01-01

    This paper examines endogenous cartel formation in the presence of a competition authority. Competition policy makes the most inclusive stable cartels less inclusive. In particular, small firms that might have been cartel members in the absence of a competition authority are no longer members.

  13. Competitive Environments and Protective Behaviour

    NARCIS (Netherlands)

    Borm, P.E.M.; Estevez Fernandez, M.A.; Fiestras-Janeiro, G.

    2005-01-01

    The class of two-person competition games is introduced and analyzed.For any game in this class the set of Nash equilibria is convex, equilibrium strategies are exchangeable, and all Nash equilibria lead to the same payoff vector. Competition games are compared to other competitive environments such

  14. Environmental structure and competitive scoring advantages in team competitions

    CERN Document Server

    Merritt, Sears

    2013-01-01

    In most professional sports, the structure of the environment is kept neutral so that scoring imbalances may be attributed to differences in team skill. It thus remains unknown what impact structural heterogeneities can have on scoring dynamics and producing competitive advantages. Applying a generative model of scoring dynamics to roughly 10 million team competitions drawn from an online game, we quantify the relationship between a competition's structure and its scoring dynamics. Despite wide structural variations, we find the same three-phase pattern in the tempo of events observed in many sports. Tempo and balance are highly predictable from a competition's structural features alone and teams exploit environmental heterogeneities for sustained competitive advantage. The most balanced competitions are associated with specific environmental heterogeneities, not from equally skilled teams. These results shed new light on the principles of balanced competition, and illustrate the potential of online game data...

  15. Hospital survival in a competitive environment: the competitive constituency model.

    Science.gov (United States)

    Ehreth, J

    1993-01-01

    Organizational theory is extended to develop a method for administrators to assess hospital effectiveness in a competitive environment. First, the literature pertaining to organizational effectiveness and survival is synthesized to show the lack of consideration for the effects of competition. Second, the article integrates the effects of competition on organizational effectiveness through a competitive constituency model. A step-by-step procedure is proposed to apply the theory in an organizational setting. The model explicitly addresses differences in power relations between hospitals, their competition, and their stakeholders. The relative nature of effectiveness is explored by comparing the hospital to its competition using criteria developed through specific goals of stakeholders. The distinction between managerial and organizational effectiveness constructs is clarified. Finally, the practical application of this model is demonstrated by assessing the effectiveness of a hospital in the competitive environment of Seattle, Washington, where two hospitals have recently closed.

  16. The World Encompassed. Remarks at a Dinner in the Great Hall in Celebration of the Treasures of the Library of Congress (Washington, DC, March 19, 1981). The Center for the Book Viewpoint Series No. 6.

    Science.gov (United States)

    Boorstin, Daniel J.

    The theme for the celebration of the Library of Congress treasures, "The World Encompassed," is suggested by the title of a nephew's account of Sir Francis Drake's circumnavigation of the earth. This account is part of the Sir Francis Drake collection donated by patrons to the library. In April 1581, Drake was knighted by Queen Elizabeth…

  17. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  18. Hidden Owners, Hidden Profits, and Poor Nursing Home Care: A Case Study.

    Science.gov (United States)

    Harrington, Charlene; Ross, Leslie; Kang, Taewoon

    2015-01-01

    The study examined the ownership transparency, financial accountability, and quality indicators of a regional for-profit nursing home chain in California, using a case study methodology to analyze data on the chain's ownership and management structure, financial data, staffing levels, deficiencies and complaints, and litigation. Secondary data were obtained from regulatory and cost reports and litigation cases. Qualitative descriptions of ownership and management were presented and quantitative analyses were conducted by comparing financial and quality indicators with other California for-profit chains, for-profit non-chains, and nonprofit nursing home groups in 2011. The chain's complex, interlocking individual and corporate owners and property companies obscured its ownership structure and financial arrangements. Nursing and support services expenditures were lower than nonprofits and administrative costs were higher than for-profit non-chains. The chain's nurse staffing was lower than expected staffing levels; its deficiencies and citations were higher than in nonprofits; and a number of lawsuits resulted in bankruptcy. Profits were hidden in the chain's management fees, lease agreements, interest payments to owners, and purchases from related-party companies. Greater ownership transparency and financial accountability requirements are needed to ensure regulatory oversight and quality of care.

  19. Competition in a Business Network

    DEFF Research Database (Denmark)

    Ellegaard, Chris; Medlin, Christopher J

    Competition and cooperation stabilize and structure business networks. In business research there is little focus on network based competition between firms and on how firms compete to gain network position. We review a range of conceptualizations of competition and cooperation and work towards...... a meaning of network competition and network cooperation based on goal structures within activity structures inside a firm network context. We conclude by presenting a framework to understand how network competition and cooperation are played out. We complete the paper with the opportunities for future...... research and also managerial thinking about network strategy and implementation....

  20. Competition Advocacy: the Italian Experience

    Directory of Open Access Journals (Sweden)

    Salvatore Rebecchini

    2014-07-01

    Full Text Available Competition advocacy is considered, together with enforcement, the core business of an antitrust authority. Broadly speaking there are at least three main tasks regularly performed by most, if not all, antitrust agencies that are amenable to the advocacy function: addressing laws and regulations in order to remove unnecessary impediments to competition; engaging in sector enquiries to understand markets behavior and identify critical issues; explaining the benefits of open competitive markets to the public opinion. This article examines these three main tasks and outlines the challenges for competition agencies, with references to the experience of the Italian Competition Authority (ICA and the initiatives undertaken at international level.

  1. Strategy and Culture: Hidden Secrets and Soft Skills in Supply Chain Best Practices from Africa

    Directory of Open Access Journals (Sweden)

    Esther Kibuka-Sebitosi

    2015-06-01

    Full Text Available The paper identifies strategy and cultural hidden secrets and soft skills pertaining to supply chain management in African contexts that are pertinent to supply chain and operations management. Africa is increasingly becoming attractive for not only multi-nationals but supply chain businesses that either want to diversify or expand their foot print. The market is complex, turbulent and highly competitive (Porter, 1986 and requires significant knowledge and understanding of the local context but also culture (Johnson, 1987; 1992; 2000, diversity and institutional dynamics (Ogbonna et al., 2002. Due to the complex nature of the emerging markets, the paper draws from multiple-disciplines (Sociology, Business, Management and theoretical approaches namely: culture and strategy; Ubuntu, stakeholder theory and systems thinking, to elicit best practices. Utilizing qualitative methods comprising case study, interviews, focus group discussions and extensive document analysis, the study covers a variety of management practices ranging from strategy, culture to hyper market management. This paper highlights lessons from successful supermarket chains in Africa particularly the hidden secrets and soft skills that are often ignored in mainstream operations and supply chain management or strategy research. Findings underscore the lessons of understanding strategy and culture implementation through practicing cultural values, treating the customer as a queen/king, knowing political skills, being a learning organisation and implementing continuous improvement. It contributes to management theory for academics, researchers & managers through strategy and culture, proposing inclusion of the cultural diversity into strategy implementation as a critical force affecting the behaviour of people inside the organization. Managers should take into account the cultural context and use it to promote organizational business excellence. These lessons for business excellence

  2. Competitive Manufacturing Dynamics

    DEFF Research Database (Denmark)

    Rymaszewska, Anna; Christensen, Irene; Karlsson, Christer

    The increasing complexity of business environments and the pressure for organizations on delivering new products faster while maintaining the superior quality of their products, has forced manufacturing organizations to rethink their operations. Managers responsible for manufacturing ramp-up need...... to constantly improve this process in terms of time to volume, according to predefined cost and quality measures. The importance of the success of this process can lead to a significant creation of competitive advantage. This paper addresses the challenges of the manufacturing ramp-up process in the context...

  3. Attention competition with advertisement

    Science.gov (United States)

    Cetin, Uzay; Bingol, Haluk O.

    2014-09-01

    In the new digital age, information is available in large quantities. Since information consumes primarily the attention of its recipients, the scarcity of attention is becoming the main limiting factor. In this study, we investigate the impact of advertisement pressure on a cultural market where consumers have a limited attention capacity. A model of competition for attention is developed and investigated analytically and by simulation. Advertisement is found to be much more effective when the attention capacity of agents is extremely scarce. We have observed that the market share of the advertised item improves if dummy items are introduced to the market while the strength of the advertisement is kept constant.

  4. Profit maximization mitigates competition

    DEFF Research Database (Denmark)

    Dierker, Egbert; Grodal, Birgit

    1996-01-01

    We consider oligopolistic markets in which the notion of shareholders' utility is well-defined and compare the Bertrand-Nash equilibria in case of utility maximization with those under the usual profit maximization hypothesis. Our main result states that profit maximization leads to less price...... competition than utility maximization. Since profit maximization tends to raise prices, it may be regarded as beneficial for the owners as a whole. Moreover, if profit maximization is a good proxy for utility maximization, then there is no need for a general equilibrium analysis that takes the distribution...... of profits among consumers fully into account and partial equilibrium analysis suffices...

  5. Attention competition with advertisement.

    Science.gov (United States)

    Cetin, Uzay; Bingol, Haluk O

    2014-09-01

    In the new digital age, information is available in large quantities. Since information consumes primarily the attention of its recipients, the scarcity of attention is becoming the main limiting factor. In this study, we investigate the impact of advertisement pressure on a cultural market where consumers have a limited attention capacity. A model of competition for attention is developed and investigated analytically and by simulation. Advertisement is found to be much more effective when the attention capacity of agents is extremely scarce. We have observed that the market share of the advertised item improves if dummy items are introduced to the market while the strength of the advertisement is kept constant.

  6. Competitive Manufacturing Dynamics

    DEFF Research Database (Denmark)

    Rymaszewska, Anna; Christensen, Irene; Karlsson, Christer

    The increasing complexity of business environments and the pressure for organizations on delivering new products faster while maintaining the superior quality of their products, has forced manufacturing organizations to rethink their operations. Managers responsible for manufacturing ramp-up need...... to constantly improve this process in terms of time to volume, according to predefined cost and quality measures. The importance of the success of this process can lead to a significant creation of competitive advantage. This paper addresses the challenges of the manufacturing ramp-up process in the context...... of lean improvements as well as organizational learning....

  7. Entrepreneurship and corporate competitiveness

    Directory of Open Access Journals (Sweden)

    Mihailović Božo

    2005-01-01

    Full Text Available Macroeconomics reforms are not enough for long-range stability. Transition enterprises in domestic economy hasn't prepare itself for the market economy. It has some specific characteristics which are analyzed in this paper. Entrepreneurship is the corner stone for enterprise development in the sense of achieving sustainable competitiveness in the contemporary globalized world economy. There are two possibilities to introduce it in transition enterprises: (a self-development (development by itself or evolution and (b create partnerships or alliance with some reputable competitor. In current situation, author proposal is for the second solution.

  8. Competitive Moves over Time

    DEFF Research Database (Denmark)

    Antero, Michelle; Hedman, Jonas; Henningsson, Stefan

    2014-01-01

    its viability to survive in the marketplace. The study begins with a review of sourcing literature to position the Red Queen theory within the sourcing literature. It subsequently applies the framework to a case study of SAP AG to illustrate how sourcing strategies changed over time in response...... the firm; (c) organizations are reflexive and over time develop competitive hysteresis which allows them to become stronger competitors. In the case of SAP AG, various sourcing arrangements were selected over its 40-year history to respond to technological and market changes....

  9. Staphylococci in Competition1

    Science.gov (United States)

    Peterson, A. C.; Black, J. J.; Gunderson, M. F.

    1964-01-01

    Foods containing large amounts of carbohydrate have frequently been involved in staphylococcal food poisoning. Custard has been considered to be a highly favorable culture medium for staphylococci; however, it may be a selective medium rather than an ideal one. The influence of dextrose, lactose, and sucrose in varying amounts from 0.25 to 18%, and of starch, on the growth of staphylococci in mixed populations with saprophytes was determined. The inhibitory effect of the sugars was much greater on the saprophyte population than on the staphylococci. Of the three sugars, sucrose was most inhibitory to the saprophytes. It greatly decreased their lag periods as the concentration of sugar increased. Dextrose was the least inhibitory; in fact, 0.5% dextrose gave considerable stimulus to saprophyte growth. This sharply repressed staphylococcal growth. Lactose occupied an intermediate position. Rapid onset of the death phase of the staphylococci was observed in all increased sugar concentrations and seemed to be a pH effect rather than a result of competition. Sucrose exerted an inhibitory effect on the growth of saprophytes at and above room temperature. In the presence of 2.5% corn starch, staphylococcal growth in mixed cultures was slightly inhibited, while the death phase was sharply accelerated. Thus, carbohydrates exert their influence on staphylococcal growth in mixed cultures through their effect on the saprophytes by decreasing or increasing competition. PMID:14106944

  10. Engineering of Algorithms for Hidden Markov models and Tree Distances

    DEFF Research Database (Denmark)

    Sand, Andreas

    grown exponentially because of drastic improvements in the technology behind DNA and RNA sequencing, and focus on the research field has increased due to its potential to expand our knowledge about biological mechanisms and to improve public health. There has therefore been a continuously growing demand...... of the algorithms to exploit the parallel architecture of modern computers. In this PhD dissertation, I present my work with algorithmic optimizations and parallelizations in primarily two areas in algorithmic bioinformatics: algorithms for analyzing hidden Markov models and algorithms for computing distance...... measures between phylogenetic trees. Hidden Markov models is a class of probabilistic models that is used in a number of core applications in bioinformatics such as modeling of proteins, gene finding and reconstruction of species and population histories. I show how a relatively simple parallelization can...

  11. Extraction of hidden information by efficient community detection in networks

    CERN Document Server

    Lee, Juyong; Lee, Jooyoung

    2012-01-01

    Currently, we are overwhelmed by a deluge of experimental data, and network physics has the potential to become an invaluable method to increase our understanding of large interacting datasets. However, this potential is often unrealized for two reasons: uncovering the hidden community structure of a network, known as community detection, is difficult, and further, even if one has an idea of this community structure, it is not a priori obvious how to efficiently use this information. Here, to address both of these issues, we, first, identify optimal community structure of given networks in terms of modularity by utilizing a recently introduced community detection method. Second, we develop an approach to use this community information to extract hidden information from a network. When applied to a protein-protein interaction network, the proposed method outperforms current state-of-the-art methods that use only the local information of a network. The method is generally applicable to networks from many areas.

  12. Effectiveness of AODV Protocol under Hidden Node Environment

    Science.gov (United States)

    Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit

    IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.

  13. Perpetual points and hidden attractors in dynamical systems

    Energy Technology Data Exchange (ETDEWEB)

    Dudkowski, Dawid, E-mail: dawid.dudkowski@p.lodz.pl [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland); Prasad, Awadhesh [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India); Kapitaniak, Tomasz [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland)

    2015-10-23

    We discuss the use of perpetual points for tracing the hidden and the rare attractors of dynamical systems. The analysis of perpetual points and their co-existence due to the parameters values is presented and the impact of these points on the behavior of the systems is shown. The results are obtained for single as well as coupled externally excited van der Pol–Duffing oscillators. The presented results can be generalized to other systems having different dynamics. - Highlights: • Computation of perpetual points in forced nonlinear dynamical systems. • Locating the hidden and rare attractors using perpetual points. • Analysis of states and different types of synchronization in coupled systems. • Understanding the complexity in coupled and uncoupled forced van der Pol–Duffing oscillator.

  14. Penta-Quark States with Strangeness, Hidden Charm and Beauty

    Science.gov (United States)

    Wu, Jia-Jun; Zou, Bing-Song

    The classical quenched quark models with three constituent quarks provide a good description for the baryon spatial ground states, but fail to reproduce the spectrum of baryon excited states. More and more evidences suggest that unquenched effects with multi-quark dynamics are necessary ingredients to solve the problem. Several new hyperon resonances reported recently could fit in the picture of penta-quark states. Based on this picture, some new hyperon excited states were predicted to exist; meanwhile with extension from strangeness to charm and beauty, super-heavy narrow N* and Λ* resonances with hidden charm or beauty were predicted to be around 4.3 and 11 GeV, respectively. Recently, two of such N* with hidden charm might have been observed by the LHCb experiment. More of those states are expected to be observed in near future. This opens a new window in order to study hadronic dynamics for the multi-quark states.

  15. Penta-quark States with Strangeness, Hidden Charm and Beauty

    CERN Document Server

    Wu, Jia-Jun

    2015-01-01

    The classical quenched quark models with three constituent quarks provide a good description for the baryon spatial ground states, but fail to reproduce the spectrum of baryon excited states. More and more evidences suggest that unquenched effects with multi-quark dynamics are necessary ingredients to solve the problem. Several new hyperon resonances reported recently could fit in the picture of penta-quark states. Based on this picture, some new hyperon excited states were predicted to exist; meanwhile with extension from strangeness to charm and beauty, super-heavy narrow $N^*$ and $\\Lambda^*$ resonances with hidden charm or beauty were predicted to be around 4.3 and 11 GeV, respectively. Recently, two of such $N^*$ with hidden charm might have been observed by the LHCb experiment. More of those states are expected to be observed in near future. This opens a new window in order to study hadronic dynamics for the multi-quark states.

  16. Markov chain Monte Carlo simulation for Bayesian Hidden Markov Models

    Science.gov (United States)

    Chan, Lay Guat; Ibrahim, Adriana Irawati Nur Binti

    2016-10-01

    A hidden Markov model (HMM) is a mixture model which has a Markov chain with finite states as its mixing distribution. HMMs have been applied to a variety of fields, such as speech and face recognitions. The main purpose of this study is to investigate the Bayesian approach to HMMs. Using this approach, we can simulate from the parameters' posterior distribution using some Markov chain Monte Carlo (MCMC) sampling methods. HMMs seem to be useful, but there are some limitations. Therefore, by using the Mixture of Dirichlet processes Hidden Markov Model (MDPHMM) based on Yau et. al (2011), we hope to overcome these limitations. We shall conduct a simulation study using MCMC methods to investigate the performance of this model.

  17. Wikipedia mining of hidden links between political leaders

    CERN Document Server

    Frahm, Klaus M; Shepelyansky, Dima L

    2016-01-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  18. Attribute-Based Encryption with Partially Hidden Ciphertext Policies

    Science.gov (United States)

    Nishide, Takashi; Yoneyama, Kazuki; Ohta, Kazuo

    We propose attribute-based encryption schemes where encryptor-specified policies (called ciphertext policies) are hidden. By using our schemes, an encryptor can encrypt data with a hidden access control policy. A decryptor obtains her secret key associated with her attributes from a trusted authority in advance and if the attributes associated with the decryptor's secret key do not satisfy the access control policy associated with the encrypted data, the decryptor cannot decrypt the data or guess even what access control policy was specified by the encryptor. We prove security of our construction based on the Decisional Bilinear Diffie-Hellman assumption and the Decision Linear assumption. In our security notion, even the legitimate decryptor cannot obtain the information about the access control policy associated with the encrypted data more than the fact that she can decrypt the data.

  19. Inhomogeneous spatial point processes with hidden second-order stationarity

    DEFF Research Database (Denmark)

    Hahn, Ute; Jensen, Eva B. Vedel

    correlation function g(u, v) is a function of u −˘ v, where −˘ is a generalized subtraction operator. For the reweighted second-order stationary processes, the subtraction operator is simply u −˘ v = u − v. The processes in the extended class are called hidden second-order stationary because, in many cases......Modelling of inhomogeneous spatial point patterns is a challenging research area with numerous applications in diverse areas of science. In recent years, the focus has mainly been on the class of reweighted second-order stationary point processes that is characterized by the mathematically...... attractive property of a translation invariant pair correlation function. Motivated by examples where this model class is not adequate, we extend the class of reweighted second-order stationary processes. The extended class consists of hidden second-order stationary point processes for which the pair...

  20. Generation and Analysis of Hidden Optical-Polarization States

    CERN Document Server

    Singh, Ravi S

    2010-01-01

    A hybrid Optical-Device (Phase-Conjugating Mirror Michelson Interferometer), made up of Phase-conjugate mirror along with ordinary mirror and Polarization Beam-splitter, is formally designed and investigated for the generation of an unusual Optical-Polarization States. This weird yet 'essentially single-mode' optical-polarization state has non-random 'ratio of amplitudes' and non-random 'sum of phases' in orthogonal bases-modes contrary to usual 'truly single-mode' optical-polarization states of which non-random 'ratio of amplitudes' and non-random 'difference of phases' serves as optical-polarization characteristic parameters. Since it is seen not to be characterized by Stokes parameters, one may, therefore, assign the name 'Hidden Optical-Polarization States (HOPS)'. HOPS are characterized by a set of parameters, namely, Hidden Optical-Polarization parameters. Formal experimental schemes are presented to experimentally measure these parameters and, thus, offering characterization of HOPS.