WorldWideScience

Sample records for hidden units randomly

  1. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  2. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, Maja; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  3. Parameter estimation of hidden periodic model in random fields

    Institute of Scientific and Technical Information of China (English)

    何书元

    1999-01-01

    Two-dimensional hidden periodic model is an important model in random fields. The model is used in the field of two-dimensional signal processing, prediction and spectral analysis. A method of estimating the parameters for the model is designed. The strong consistency of the estimators is proved.

  4. Grammatical-Restrained Hidden Conditional Random Fields for Bioinformatics applications

    Directory of Open Access Journals (Sweden)

    Martelli Pier

    2009-10-01

    Full Text Available Abstract Background Discriminative models are designed to naturally address classification tasks. However, some applications require the inclusion of grammar rules, and in these cases generative models, such as Hidden Markov Models (HMMs and Stochastic Grammars, are routinely applied. Results We introduce Grammatical-Restrained Hidden Conditional Random Fields (GRHCRFs as an extension of Hidden Conditional Random Fields (HCRFs. GRHCRFs while preserving the discriminative character of HCRFs, can assign labels in agreement with the production rules of a defined grammar. The main GRHCRF novelty is the possibility of including in HCRFs prior knowledge of the problem by means of a defined grammar. Our current implementation allows regular grammar rules. We test our GRHCRF on a typical biosequence labeling problem: the prediction of the topology of Prokaryotic outer-membrane proteins. Conclusion We show that in a typical biosequence labeling problem the GRHCRF performs better than CRF models of the same complexity, indicating that GRHCRFs can be useful tools for biosequence analysis applications. Availability GRHCRF software is available under GPLv3 licence at the website http://www.biocomp.unibo.it/~savojard/biocrf-0.9.tar.gz.

  5. Heterogeneous Web Data Extraction Algorithm Based On Modified Hidden Conditional Random Fields

    OpenAIRE

    Cui Cheng

    2014-01-01

    As it is of great importance to extract useful information from heterogeneous Web data, in this paper, we propose a novel heterogeneous Web data extraction algorithm using a modified hidden conditional random fields model. Considering the traditional linear chain based conditional random fields can not effectively solve the problem of complex and heterogeneous Web data extraction, we modify the standard hidden conditional random fields in three aspects, which are 1) Using the hidden Markov mo...

  6. Detection and characterization of regulatory elements using probabilistic conditional random field and hidden Markov models

    Institute of Scientific and Technical Information of China (English)

    Hongyan Wang; Xiaobo Zhou

    2013-01-01

    By altering the electrostatic charge of histones or providing binding sites to protein recognition molecules,Chromatin marks have been proposed to regulate gene expression,a property that has motivated researchers to link these marks to cis-regulatory elements.With the help of next generation sequencing technologies,we can now correlate one specific chromatin mark with regulatory elements (e.g.enhancers or promoters) and also build tools,such as hidden Markov models,to gain insight into mark combinations.However,hidden Markov models have limitation for their character of generative models and assume that a current observation depends only on a current hidden state in the chain.Here,we employed two graphical probabilistic models,namely the linear conditional random field model and multivariate hidden Markov model,to mark gene regions with different states based on recurrent and spatially coherent character of these eight marks.Both models revealed chromatin states that may correspond to enhancers and promoters,transcribed regions,transcriptional elongation,and low-signal regions.We also found that the linear conditional random field model was more effective than the hidden Markov model in recognizing regulatory elements,such as promoter-,enhancer-,and transcriptional elongation-associated regions,which gives us a better choice.

  7. Monte Carlo simulations: Hidden errors from ``good'' random number generators

    Science.gov (United States)

    Ferrenberg, Alan M.; Landau, D. P.; Wong, Y. Joanna

    1992-12-01

    The Wolff algorithm is now accepted as the best cluster-flipping Monte Carlo algorithm for beating ``critical slowing down.'' We show how this method can yield incorrect answers due to subtle correlations in ``high quality'' random number generators.

  8. Landslide Displacement Prediction With Uncertainty Based on Neural Networks With Random Hidden Weights.

    Science.gov (United States)

    Lian, Cheng; Zeng, Zhigang; Yao, Wei; Tang, Huiming; Chen, Chun Lung Philip

    2016-12-01

    In this paper, we propose a new approach to establish a landslide displacement forecasting model based on artificial neural networks (ANNs) with random hidden weights. To quantify the uncertainty associated with the predictions, a framework for probabilistic forecasting of landslide displacement is developed. The aim of this paper is to construct prediction intervals (PIs) instead of deterministic forecasting. A lower-upper bound estimation (LUBE) method is adopted to construct ANN-based PIs, while a new single hidden layer feedforward ANN with random hidden weights for LUBE is proposed. Unlike the original implementation of LUBE, the input weights and hidden biases of the ANN are randomly chosen, and only the output weights need to be adjusted. Combining particle swarm optimization (PSO) and gravitational search algorithm (GSA), a hybrid evolutionary algorithm, PSOGSA, is utilized to optimize the output weights. Furthermore, a new ANN objective function, which combines a modified combinational coverage width-based criterion with one-norm regularization, is proposed. Two benchmark data sets and two real-world landslide data sets are presented to illustrate the capability and merit of our method. Experimental results reveal that the proposed method can construct high-quality PIs.

  9. Measuring the usefulness of hidden units in Boltzmann machines with mutual information.

    Science.gov (United States)

    Berglund, Mathias; Raiko, Tapani; Cho, Kyunghyun

    2015-04-01

    Restricted Boltzmann machines (RBMs) and deep Boltzmann machines (DBMs) are important models in deep learning, but it is often difficult to measure their performance in general, or measure the importance of individual hidden units in specific. We propose to use mutual information to measure the usefulness of individual hidden units in Boltzmann machines. The measure is fast to compute, and serves as an upper bound for the information the neuron can pass on, enabling detection of a particular kind of poor training results. We confirm experimentally that the proposed measure indicates how much the performance of the model drops when some of the units of an RBM are pruned away. We demonstrate the usefulness of the measure for early detection of poor training in DBMs. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Child Labor Trafficking in the United States: A Hidden Crime

    Directory of Open Access Journals (Sweden)

    Katherine Kaufka Walts

    2017-06-01

    Full Text Available Emerging research brings more attention to labor trafficking in the United States. However, very few efforts have been made to better understand or respond to labor trafficking of minors. Cases of children forced to work as domestic servants, in factories, restaurants, peddling candy or other goods, or on farms may not automatically elicit suspicion from an outside observer as compared to a child providing sexual services for money. In contrast to sex trafficking, labor trafficking is often tied to formal economies and industries, which often makes it more difficult to distinguish from "legitimate" work, including among adolescents. This article seeks to provide examples of documented cases of child labor trafficking in the United States, and to provide an overview of systemic gaps in law, policy, data collection, research, and practice. These areas are currently overwhelmingly focused on sex trafficking, which undermines the policy intentions of the Trafficking Victims Protection Act (2000, the seminal statute criminalizing sex and labor trafficking in the United States, its subsequent reauthorizations, and international laws and protocols addressing human trafficking.

  11. Hidden State Conditional Random Field for Abnormal Activity Recognition in Smart Homes

    Directory of Open Access Journals (Sweden)

    Yu Tong

    2015-03-01

    Full Text Available As the number of elderly people has increased worldwide, there has been a surge of research into assistive technologies to provide them with better care by recognizing their normal and abnormal activities. However, existing abnormal activity recognition (AAR algorithms rarely consider sub-activity relations when recognizing abnormal activities. This paper presents an application of the Hidden State Conditional Random Field (HCRF method to detect and assess abnormal activities that often occur in elderly persons’ homes. Based on HCRF, this paper designs two AAR algorithms, and validates them by comparing them with a feature vector distance based algorithm in two experiments. The results demonstrate that the proposed algorithms favorably outperform the competitor, especially when abnormal activities have same sensor type and sensor number as normal activities.

  12. ITAC volume assessment through a Gaussian hidden Markov random field model-based algorithm.

    Science.gov (United States)

    Passera, Katia M; Potepan, Paolo; Brambilla, Luca; Mainardi, Luca T

    2008-01-01

    In this paper, a semi-automatic segmentation method for volume assessment of Intestinal-type adenocarcinoma (ITAC) is presented and validated. The method is based on a Gaussian hidden Markov random field (GHMRF) model that represents an advanced version of a finite Gaussian mixture (FGM) model as it encodes spatial information through the mutual influences of neighboring sites. To fit the GHMRF model an expectation maximization (EM) algorithm is used. We applied the method to a magnetic resonance data sets (each of them composed by T1-weighted, Contrast Enhanced T1-weighted and T2-weighted images) for a total of 49 tumor-contained slices. We tested GHMRF performances with respect to FGM by both a numerical and a clinical evaluation. Results show that the proposed method has a higher accuracy in quantifying lesion area than FGM and it can be applied in the evaluation of tumor response to therapy.

  13. A Coupled Hidden Markov Random Field Model for Simultaneous Face Clustering and Tracking in Videos

    KAUST Repository

    Wu, Baoyuan

    2016-10-25

    Face clustering and face tracking are two areas of active research in automatic facial video processing. They, however, have long been studied separately, despite the inherent link between them. In this paper, we propose to perform simultaneous face clustering and face tracking from real world videos. The motivation for the proposed research is that face clustering and face tracking can provide useful information and constraints to each other, thus can bootstrap and improve the performances of each other. To this end, we introduce a Coupled Hidden Markov Random Field (CHMRF) to simultaneously model face clustering, face tracking, and their interactions. We provide an effective algorithm based on constrained clustering and optimal tracking for the joint optimization of cluster labels and face tracking. We demonstrate significant improvements over state-of-the-art results in face clustering and tracking on several videos.

  14. A Coupled Hidden Conditional Random Field Model for Simultaneous Face Clustering and Naming in Videos

    KAUST Repository

    Zhang, Yifan

    2016-08-18

    For face naming in TV series or movies, a typical way is using subtitles/script alignment to get the time stamps of the names, and tagging them to the faces. We study the problem of face naming in videos when subtitles are not available. To this end, we divide the problem into two tasks: face clustering which groups the faces depicting a certain person into a cluster, and name assignment which associates a name to each face. Each task is formulated as a structured prediction problem and modeled by a hidden conditional random field (HCRF) model. We argue that the two tasks are correlated problems whose outputs can provide prior knowledge of the target prediction for each other. The two HCRFs are coupled in a unified graphical model called coupled HCRF where the joint dependence of the cluster labels and face name association is naturally embedded in the correlation between the two HCRFs. We provide an effective algorithm to optimize the two HCRFs iteratively and the performance of the two tasks on real-world data set can be both improved.

  15. Segmentation of cone-beam CT using a hidden Markov random field with informative priors

    Science.gov (United States)

    Moores, M.; Hargrave, C.; Harden, F.; Mengersen, K.

    2014-03-01

    Cone-beam computed tomography (CBCT) has enormous potential to improve the accuracy of treatment delivery in image-guided radiotherapy (IGRT). To assist radiotherapists in interpreting these images, we use a Bayesian statistical model to label each voxel according to its tissue type. The rich sources of prior information in IGRT are incorporated into a hidden Markov random field model of the 3D image lattice. Tissue densities in the reference CT scan are estimated using inverse regression and then rescaled to approximate the corresponding CBCT intensity values. The treatment planning contours are combined with published studies of physiological variability to produce a spatial prior distribution for changes in the size, shape and position of the tumour volume and organs at risk. The voxel labels are estimated using iterated conditional modes. The accuracy of the method has been evaluated using 27 CBCT scans of an electron density phantom. The mean voxel-wise misclassification rate was 6.2%, with Dice similarity coefficient of 0.73 for liver, muscle, breast and adipose tissue. By incorporating prior information, we are able to successfully segment CBCT images. This could be a viable approach for automated, online image analysis in radiotherapy.

  16. Characterising the Transmission Dynamics of Acinetobacter baumannii in Intensive Care Units Using Hidden Markov Models.

    Directory of Open Access Journals (Sweden)

    Tan N Doan

    Full Text Available Little is known about the transmission dynamics of Acinetobacter baumannii in hospitals, despite such information being critical for designing effective infection control measures. In the absence of comprehensive epidemiological data, mathematical modelling is an attractive approach to understanding transmission process. The statistical challenge in estimating transmission parameters from infection data arises from the fact that most patients are colonised asymptomatically and therefore the transmission process is not fully observed. Hidden Markov models (HMMs can overcome this problem. We developed a continuous-time structured HMM to characterise the transmission dynamics, and to quantify the relative importance of different acquisition sources of A. baumannii in intensive care units (ICUs in three hospitals in Melbourne, Australia. The hidden states were the total number of patients colonised with A. baumannii (both detected and undetected. The model input was monthly incidence data of the number of detected colonised patients (observations. A Bayesian framework with Markov chain Monte Carlo algorithm was used for parameter estimations. We estimated that 96-98% of acquisition in Hospital 1 and 3 was due to cross-transmission between patients; whereas most colonisation in Hospital 2 was due to other sources (sporadic acquisition. On average, it takes 20 and 31 days for each susceptible individual in Hospital 1 and Hospital 3 to become colonised as a result of cross-transmission, respectively; whereas it takes 17 days to observe one new colonisation from sporadic acquisition in Hospital 2. The basic reproduction ratio (R0 for Hospital 1, 2 and 3 was 1.5, 0.02 and 1.6, respectively. Our study is the first to characterise the transmission dynamics of A. baumannii using mathematical modelling. We showed that HMMs can be applied to sparse hospital infection data to estimate transmission parameters despite unobserved events and imperfect detection of

  17. The hidden societal cost of antibiotic resistance per antibiotic prescribed in the United States: an exploratory analysis.

    Science.gov (United States)

    Michaelidis, Constantinos I; Fine, Michael J; Lin, Chyongchiou Jeng; Linder, Jeffrey A; Nowalk, Mary Patricia; Shields, Ryan K; Zimmerman, Richard K; Smith, Kenneth J

    2016-11-08

    Ambulatory antibiotic prescribing contributes to the development of antibiotic resistance and increases societal costs. Here, we estimate the hidden societal cost of antibiotic resistance per antibiotic prescribed in the United States. In an exploratory analysis, we used published data to develop point and range estimates for the hidden societal cost of antibiotic resistance (SCAR) attributable to each ambulatory antibiotic prescription in the United States. We developed four estimation methods that focused on the antibiotic-resistance attributable costs of hospitalization, second-line inpatient antibiotic use, second-line outpatient antibiotic use, and antibiotic stewardship, then summed the estimates across all methods. The total SCAR attributable to each ambulatory antibiotic prescription was estimated to be $13 (range: $3-$95). The greatest contributor to the total SCAR was the cost of hospitalization ($9; 69 % of the total SCAR). The costs of second-line inpatient antibiotic use ($1; 8 % of the total SCAR), second-line outpatient antibiotic use ($2; 15 % of the total SCAR) and antibiotic stewardship ($1; 8 %). This apperars to be an error.; of the total SCAR) were modest contributors to the total SCAR. Assuming an average antibiotic cost of $20, the total SCAR attributable to each ambulatory antibiotic prescription would increase antibiotic costs by 65 % (range: 15-475 %) if incorporated into antibiotic costs paid by patients or payers. Each ambulatory antibiotic prescription is associated with a hidden SCAR that substantially increases the cost of an antibiotic prescription in the United States. This finding raises concerns regarding the magnitude of misalignment between individual and societal antibiotic costs.

  18. Conditional Random Fields versus Hidden Markov Models for activity recognition in temporal sensor data

    NARCIS (Netherlands)

    van Kasteren, T.L.M.; Noulas, A.K.; Kröse, B.J.A.; Smit, G.J.M.; Epema, D.H.J.; Lew, M.S.

    2008-01-01

    Conditional Random Fields are a discriminative probabilistic model which recently gained popularity in applications that require modeling nonindependent observation sequences. In this work, we present the basic advantages of this model over generative models and argue about its suitability in the do

  19. Recognizing Combinations of Facial Action Units with Different Intensity Using a Mixture of Hidden Markov Models and Neural Network

    CERN Document Server

    Khademi, Mahmoud; Kiapour, Mohammad H; Kiaei, Ali A

    2010-01-01

    Facial Action Coding System consists of 44 action units (AUs) and more than 7000 combinations. Hidden Markov models (HMMs) classifier has been used successfully to recognize facial action units (AUs) and expressions due to its ability to deal with AU dynamics. However, a separate HMM is necessary for each single AU and each AU combination. Since combinations of AU numbering in thousands, a more efficient method will be needed. In this paper an accurate real-time sequence-based system for representation and recognition of facial AUs is presented. Our system has the following characteristics: 1) employing a mixture of HMMs and neural network, we develop a novel accurate classifier, which can deal with AU dynamics, recognize subtle changes, and it is also robust to intensity variations, 2) although we use an HMM for each single AU only, by employing a neural network we can recognize each single and combination AU, and 3) using both geometric and appearance-based features, and applying efficient dimension reducti...

  20. Woodrow Wilson's hidden stroke of 1919: the impact of patient-physician confidentiality on United States foreign policy.

    Science.gov (United States)

    Menger, Richard P; Storey, Christopher M; Guthikonda, Bharat; Missios, Symeon; Nanda, Anil; Cooper, John M

    2015-07-01

    World War I catapulted the United States from traditional isolationism to international involvement in a major European conflict. Woodrow Wilson envisaged a permanent American imprint on democracy in world affairs through participation in the League of Nations. Amid these defining events, Wilson suffered a major ischemic stroke on October 2, 1919, which left him incapacitated. What was probably his fourth and most devastating stroke was diagnosed and treated by his friend and personal physician, Admiral Cary Grayson. Grayson, who had tremendous personal and professional loyalty to Wilson, kept the severity of the stroke hidden from Congress, the American people, and even the president himself. During a cabinet briefing, Grayson formally refused to sign a document of disability and was reluctant to address the subject of presidential succession. Wilson was essentially incapacitated and hemiplegic, yet he remained an active president and all messages were relayed directly through his wife, Edith. Patient-physician confidentiality superseded national security amid the backdrop of friendship and political power on the eve of a pivotal juncture in the history of American foreign policy. It was in part because of the absence of Woodrow Wilson's vocal and unwavering support that the United States did not join the League of Nations and distanced itself from the international stage. The League of Nations would later prove powerless without American support and was unable to thwart the rise and advance of Adolf Hitler. Only after World War II did the United States assume its global leadership role and realize Wilson's visionary, yet contentious, groundwork for a Pax Americana. The authors describe Woodrow Wilson's stroke, the historical implications of his health decline, and its impact on United States foreign policy.

  1. HIV among African-born persons in the United States: a hidden epidemic?

    Science.gov (United States)

    Kerani, Roxanne P; Kent, James B; Sides, Tracy; Dennis, Greg; Ibrahim, Abdel R; Cross, Helene; Wiewel, Ellen W; Wood, Robert W; Golden, Matthew R

    2008-09-01

    Although a large proportion of HIV diagnoses in Western Europe occur in African-born persons, analyses of US HIV surveillance data do not routinely assess the proportion of diagnoses occurring in African-born US residents. To determine the percentage of newly reported HIV diagnoses occurring in African-born persons in selected areas of the United States with large African-born immigrant populations. We collated and analyzed aggregate data on persons diagnosed with HIV in 2003-2004 and reported to HIV surveillance units in the states of California, Georgia, Massachusetts, Minnesota, and New Jersey and in King County, Washington; New York City; and the portion of Virginia included in the Washington, DC, metropolitan area. African-born persons accounted for 0.6% of the population and 3.8% of HIV diagnoses in participating areas (HIV diagnoses range: 1%-20%). Across all areas, up to 41% of diagnoses in women (mean: 8.4%, range: 4%-41%) and up to 50% of diagnoses in blacks (mean: 8.0%, range: 2%-50%) occurred among African-born individuals. In some areas, classifying HIV cases among foreign-born blacks as occurring in African Americans dramatically alters the epidemiological picture of HIV. Country of birth should be consistently included in local and national analyses of HIV surveillance data.

  2. Effects of tai chi qigong on psychosocial well-being among hidden elderly, using elderly neighborhood volunteer approach: a pilot randomized controlled trial

    Science.gov (United States)

    Chan, Aileen WK; Yu, Doris SF; Choi, KC

    2017-01-01

    Purpose To test the feasibility and preliminary effectiveness of a tai chi qigong program with the assistance of elderly neighborhood volunteers in strengthening social networks and enhancing the psychosocial well-being of hidden elderly. Patients and methods “Hidden elderly” is a term used to describe older adults who are socially isolated and refuse social participation. This pilot randomized controlled trial recruited 48 older adults aged 60 or above who did not engage in any social activity. They were randomized into tai chi qigong (n=24) and standard care control (n=24) groups. The former group underwent a three-month program of two 60-minute sessions each week, with the socially active volunteers paired up with them during practice. Standard care included regular home visits by social workers. Primary outcomes were assessed by means of the Lubben social network and De Jong Gieveld loneliness scales, and by a revised social support questionnaire. Secondary outcomes were covered by a mental health inventory and the Rosenberg self-esteem scale, and quality of life by using the 12-Item Short Form Health Survey. Data was collected at baseline, and at three and six months thereafter. Results The generalized estimating equations model revealed general improvement in outcomes among participants on the tai chi qigong program. In particular, participants reported a significantly greater improvement on the loneliness scale (B=−1.32, 95% confidence interval [CI] −2.54 to −0.11, P=0.033) and the satisfaction component of the social support questionnaire (B=3.43, 95% CI 0.10–6.76, P=0.044) than the control group. Conclusion The pilot study confirmed that tai chi qigong with elderly neighborhood volunteers is a safe and feasible social intervention for hidden elderly. Its potential benefits in improving social and psychological health suggest the need for a full-scale randomized controlled trial to reveal its empirical effects. PMID:28115837

  3. Randomized trial of a patient-centered hospital unit.

    Science.gov (United States)

    Martin, D P; Diehr, P; Conrad, D A; Davis, J H; Leickly, R; Perrin, E B

    1998-06-01

    Patient-centered hospital units have grown out of the national trend to greater consumerism, but few of these units have been evaluated rigorously. We used a randomized controlled trial to compare patient outcomes on the Planetree Model Hospital Unit with other medical-surgical units in the hospital. Planetree patients were significantly more satisfied than controls with their hospital stay, the unit's environment and nursing care, but did not differ in ratings of physician care. Planetree patients reported more involvement in their care while hospitalized and higher satisfaction with the education they received. There were few differences between Planetree and controls in health behaviors. While Planetree patients reported better mental health status and role functioning after discharge, their health status was similar to controls after 3 to 6 months. There were no differences in length of stay and charges for the index hospitalization, readmissions or outpatient care during the following year.

  4. Effects of tai chi qigong on psychosocial well-being among hidden elderly, using elderly neighborhood volunteer approach: a pilot randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Chan AW

    2017-01-01

    Full Text Available Aileen WK Chan, Doris SF Yu, KC Choi The Nethersole School of Nursing, Faculty of Medicine, The Chinese University of Hong Kong, Shatin, NT, Hong Kong SAR Purpose: To test the feasibility and preliminary effectiveness of a tai chi qigong program with the assistance of elderly neighborhood volunteers in strengthening social networks and enhancing the psychosocial well-being of hidden elderly. Patients and methods: “Hidden elderly” is a term used to describe older adults who are socially isolated and refuse social participation. This pilot randomized controlled trial recruited 48 older adults aged 60 or above who did not engage in any social activity. They were randomized into tai chi qigong (n=24 and standard care control (n=24 groups. The former group underwent a three-month program of two 60-minute sessions each week, with the socially active volunteers paired up with them during practice. Standard care included regular home visits by social workers. Primary outcomes were assessed by means of the Lubben social network and De Jong Gieveld loneliness scales, and by a revised social support questionnaire. Secondary outcomes were covered by a mental health inventory and the Rosenberg self-esteem scale, and quality of life by using the 12-Item Short Form Health Survey. Data was collected at baseline, and at three and six months thereafter. Results: The generalized estimating equations model revealed general improvement in outcomes among participants on the tai chi qigong program. In particular, participants reported a significantly greater improvement on the loneliness scale (B=-1.32, 95% confidence interval [CI] -2.54 to -0.11, P=0.033 and the satisfaction component of the social support questionnaire (B=3.43, 95% CI 0.10–6.76, P=0.044 than the control group. Conclusion: The pilot study confirmed that tai chi qigong with elderly neighborhood volunteers is a safe and feasible social intervention for hidden elderly. Its potential benefits in

  5. Recognizing suspicious activities in infrared imagery using appearance-based features and the theory of hidden conditional random fields for outdoor perimeter surveillance

    Science.gov (United States)

    Rogotis, Savvas; Palaskas, Christos; Ioannidis, Dimosthenis; Tzovaras, Dimitrios; Likothanassis, Spiros

    2015-11-01

    This work aims to present an extended framework for automatically recognizing suspicious activities in outdoor perimeter surveilling systems based on infrared video processing. By combining size-, speed-, and appearance-based features, like the local phase quantization and the histograms of oriented gradients, actions of small duration are recognized and used as input, along with spatial information, for modeling target activities using the theory of hidden conditional random fields (HCRFs). HCRFs are used to classify an observation sequence into the most appropriate activity label class, thus discriminating high-risk activities like trespassing from zero risk activities, such as loitering outside the perimeter. The effectiveness of this approach is demonstrated with experimental results in various scenarios that represent suspicious activities in perimeter surveillance systems.

  6. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  7. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  8. Analysis of 18F-DMFP-PET data using Hidden Markov Random Field and the Gaussian distribution to assist the diagnosis of Parkinsonism

    Science.gov (United States)

    Segovia, Fermín.; Salas-Gonzalez, Diego; Górriz, Juan M.; Ramírez, Javier; Martínez-Murcia, Francisco J.

    2017-03-01

    18F-DMFP-PET is a neuroimaging modality that allows us to analyze the striatal dopamine. Thus, it is recently emerging as an effective tool to assist the diagnosis of Parkinsonism and differentiate among parkinsonian syndromes. However the analysis of these data, which require specific preprocessing methods, is still poorly covered. In this work we demonstrate a novel methodology based on Hidden Markov Random Fields (HMRF) and the Gaussian distribution to preprocess 18F-DMFP-PET data. First, we performed a selection of voxels based on the analysis of the histogram in order to remove low-signal regions and regions outside the brain. Specifically, we modeled the histogram of intensities of a neuroimage with a mixture of two Gaussians and then, using a HMRF algorithm the voxels corresponding to the low-intensity Gaussian were discarded. This procedure is similar to the tissue segmentation usually applied to Magnetic Resonance Imaging data. Secondly, the intensity of the selected voxels was scaled so that the Gaussian that models the histogram for each neuroimage has same mean and standard deviation. This step made comparable the data from different patients, without removing the characteristic patterns of each patient's disorder. The proposed approach was evaluated using a computer system based on statistical classification that separated the neuroimages according to the parkinsonian variant they represented. The proposed approach achieved higher accuracy rates than standard approaches for voxel selection (based on atlases) and intensity normalization (based on the global mean).

  9. Effects of tai chi qigong on psychosocial well-being among hidden elderly, using elderly neighborhood volunteer approach: a pilot randomized controlled trial

    OpenAIRE

    Chan AW; Yu DS; Choi KC

    2017-01-01

    Aileen WK Chan, Doris SF Yu, KC Choi The Nethersole School of Nursing, Faculty of Medicine, The Chinese University of Hong Kong, Shatin, NT, Hong Kong SAR Purpose: To test the feasibility and preliminary effectiveness of a tai chi qigong program with the assistance of elderly neighborhood volunteers in strengthening social networks and enhancing the psychosocial well-being of hidden elderly. Patients and methods: “Hidden elderly” is a term used to describe older adults w...

  10. Randomization of Qp spaces on the unit ball of Cn

    Institute of Scientific and Technical Information of China (English)

    LI; Bo; OUYANG; Caiheng

    2005-01-01

    In this paper, we study the random power series of several complex variables,and give some sufficient conditions for random power series to belong to Qp and Qp,0spaces by means of their characterizations of Carleson measure. Moreover, we show that such conditions are best possible in some sense.

  11. Hidden Treasure.

    Science.gov (United States)

    Clayton, Pamela; Euscher, Gisela

    2001-01-01

    Over 100 women immigrants were interviewed in the United Kingdom, Denmark, Czech Republic, and Germany. Two-thirds had participated in higher education in their home countries, one-third had degrees, some had owned businesses, and over half had good English skills. Despite their qualifications, only five were currently not underemployed. (SK)

  12. VECTOR-VALUED RANDOM POWER SERIES ON THE UNIT BALL OF Cn

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In this article, the authors study the vector-valued random power series on the unit ball of Cn and get vector-valued Salem-Zygmund theorem for them by using martingale technique. Further, the relationships between vector-valued random power series and several function spaces are also studied.

  13. 基于隐条件随机场的异构Web数据源数据抽取算法研究%Research on Heterogeneous Web Data Extraction Algorithm Based on Hidden Conditional Random Fields

    Institute of Scientific and Technical Information of China (English)

    於实

    2012-01-01

    提出了一种基于改进的隐条件随机场的异构Web数据源数据抽取算法.通过对隐条件随机场进行的改进,对隐含变量进行更为准确的计算,并且克服了该模型的性能严重依赖于初始参数选择的问题,而且进行模型训练时不需要大量的人工标注的样本数据.实验结果表明,对比已有方法,本文算法在对具有缺省属性以及多属性特征的网站进行数据抽取时,在查全率,查准率以及F1值上都获得了令人满意的性能.%In this paper, we propose a novel heterogeneous Web data extraction algorithm based on modified hidden conditional random fields model. Firstly, the hidden conditional random fields model is modified to obtain more accurate calculation of implicit variables, and the problem that the model' s performance is heavily dependent on the choice of initial parameters is well solved. Moreover, the proposed model does not require a lot of manual labeling sample data to construct training data. Experimental results show that compared with the existing method, the proposed algorithm can obtain satisfactory performance both in websites with the default attributes and the websites with multi-attributes.

  14. Kernel conditional ordinal random fields for temporal segmentation of facial action units

    NARCIS (Netherlands)

    Rudovic, Ognjen; Pavlovic, Vladimir; Pantic, Maja

    2012-01-01

    We consider the problem of automated recognition of temporal segments (neutral, onset, apex and offset) of Facial Action Units. To this end, we propose the Laplacian-regularized Kernel Conditional Ordinal Random Field model. In contrast to standard modeling approaches to recognition of AUs’ temporal

  15. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  16. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  17. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  18. ANALYSIS OF A TWO UNIT STANDBY SYSTEM WITH CORRELATED FAILURE AND REPAIR AND RANDOM APPEARANCE AND DISAPPEARANCE OF REPAIRMAN

    Directory of Open Access Journals (Sweden)

    Rakesh Gupta

    2010-01-01

    Full Text Available The paper deals with the stochastic analysis of a two non-identical unit standbysystem model. The one unit is considered as priority (p unit and the other as ordinary (o unit.The p-unit gets priority in operation. A single repair facility appears in and disappears from thesystem randomly with constant rates. The repair discipline of units is FCFS. The joint distributionof failure and repair times for each unit is taken to be bivariate exponential. Using regenerativepoint technique various measures of system effectiveness useful to industrial managers areobtained.

  19. Tristable and multiple bistable activity in complex random binary networks of two-state units

    CERN Document Server

    Christ, Simon; Schimansky-Geier, Lutz

    2016-01-01

    We study complex networks of stochastic two-state units. Our aim is to model discrete stochastic excitable dynamics with a rest and an excited state. These two states are assumed to possess different waiting time distributions. The rest state is treated as an activation process with an exponentially distributed life time, whereas the latter in the excited state shall have a constant mean which may originate from any distribution. The activation rate of any single unit is determined by its neighbors according to a random complex network structure. In order to treat this problem in an analytical way, we use a heterogeneous mean-field approximation yielding a set of equations general valid for uncorrelated random networks. Based on this derivation we focus on random binary networks where the network is solely comprised of nodes with either of two degrees. The ratio between the two degrees is shown to be a crucial parameter. Dependent on the composition of the network the steady states show the usual transition f...

  20. Community structure detection algorithm based on hidden Markov random field%基于隐马尔可夫随机场的社区结构发现算法

    Institute of Scientific and Technical Information of China (English)

    刘栋; 刘震; 张贤坤

    2012-01-01

    针对社区结构发现问题,提出了一种基于隐马尔可夫随机场社区发现算法.该方法将网络中的顶点度数映射为顶点信息值,用马尔可夫随机场模型描述网络中上下文信息并构造系统能量函数,使用迭代条件模式算法对能量方程进行优化.该方法在Zachary空手道俱乐部网络、海豚关系网络以及美国大学足球联赛网络上进行验证,实验结果表明,该算法的准确率较高.%For the problem of community structure detection of complex networkt a community detection algorithm based on hidden Markov random field is presented. In this method, the network vertices information value corresponding to its degree is assumed, the HMRF model is applied to characterize the contexture-dependent information, and the energy function of system is defined, iterated conditional mode algorithm is applied to fulfill optimization. The algorithm is tested on Zachary karate clue network, dolphin social network and American College football network, and experimental result shows it has high accuracy rate.

  1. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  2. Teaching emotional intelligence to intensive care unit nurses and their general health: a randomized clinical trial.

    Science.gov (United States)

    Sharif, F; Rezaie, S; Keshavarzi, S; Mansoori, P; Ghadakpoor, S

    2013-07-01

    Emotion and how people manage it is an important part of personality that would immensely affect their health. Investigations showed that emotional intelligence is significantly related to and can predict psychological health. To determine the effect of teaching emotional intelligence to intensive care unit nurses on their general health. This randomized clinical trial (registered as IRCT201208022812N9) was conducted on 52 of 200 in intensive care unit nurses affiliated to Shiraz University of Medical Sciences. They were recruited through purposeful convenience sampling and then randomly categorized into two groups. The intervention group members were trained in emotional intelligence. Bar-on emotional intelligence and Goldberg's general health questionnaires were administered to each participant before, immediately after, and one month after the intervention. While the mean score of general health for the intervention group decreased from 25.4 before the intervention, to 18.1 immediately after the intervention and to 14.6 one month later, for the control group, it increased from 22.0, to 24.2 and to 26.5, respectively (pTeaching emotional intelligence improved the general health of intensive care unit nurses.

  3. Teaching Emotional Intelligence to Intensive Care Unit Nurses and their General Health: A Randomized Clinical Trial

    Directory of Open Access Journals (Sweden)

    F Sharif

    2013-07-01

    Full Text Available Background: Emotion and how people manage it is an important part of personality that would immensely affect their health. Investigations showed that emotional intelligence is significantly related to and can predict psychological health. Objective: To determine the effect of teaching emotional intelligence to intensive care unit nurses on their general health. Methods: This randomized clinical trial (registered as IRCT201208022812N9 was conducted on 52 of 200 in intensive care unit nurses affiliated to Shiraz University of Medical Sciences. They were recruited through purposeful convenience sampling and then randomly categorized into two groups. The intervention group members were trained in emotional intelligence. Bar-on emotional intelligence and Goldberg's general health questionnaires were administered to each participant before, immediately after, and one month after the intervention. Results: While the mean score of general health for the intervention group decreased from 25.4 before the intervention, to 18.1 immediately after the intervention and to 14.6 one month later, for the control group, it increased from 22.0, to 24.2 and to 26.5, respectively (p<0.001. Conclusion: Teaching emotional intelligence improved the general health of intensive care unit nurses.

  4. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  5. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  6. Another Look at the Draft Mil-Std-1540E Unit Random Vibration Test Requirements

    Science.gov (United States)

    Perl, E.; Peterson, A. J..; Davis, D.

    2012-07-01

    The draft Mil-Std-1540E has been updated to reflect lessons learned since its publication as an SMC Standard in 2008, [1], and an earlier Aerospace Corporation Technical Report released in 2006, [2]. This paper discusses the technical rationale supporting some of the unit random vibration test requirements to provide better insight into their derivation and application to programs. It is intended that these requirements be tailored for each program to reflect the customer risk profile. Several tailoring options are provided and a two phase test strategy is discussed to highlight its applicability to utilizing heritage hardware in new applications.

  7. Monte Carlo Simulations of Random Frustrated Systems on Graphics Processing Units

    Science.gov (United States)

    Feng, Sheng; Fang, Ye; Hall, Sean; Papke, Ariane; Thomasson, Cade; Tam, Ka-Ming; Moreno, Juana; Jarrell, Mark

    2012-02-01

    We study the implementation of the classical Monte Carlo simulation for random frustrated models using the multithreaded computing environment provided by the the Compute Unified Device Architecture (CUDA) on modern Graphics Processing Units (GPU) with hundreds of cores and high memory bandwidth. The key for optimizing the performance of the GPU computing is in the proper handling of the data structure. Utilizing the multi-spin coding, we obtain an efficient GPU implementation of the parallel tempering Monte Carlo simulation for the Edwards-Anderson spin glass model. In the typical simulations, we find over two thousand times of speed-up over the single threaded CPU implementation.

  8. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  9. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  10. Hidden intrahospital mortality for cerebro vascular diseases in the Intermediate Care Unit service. A five year period from 2000 to 2004. Mortalidad oculta intrahospitalaria por enfermedades cerebro vasculares en el Servicio de Terapia Intermedia. Quinquenio 2000-2004.

    Directory of Open Access Journals (Sweden)

    Julio Jova Hernández

    2005-11-01

    Full Text Available Introduction: mortality is one of the trustable and necessary indicator for the analysis of the sanitary situation of a community, and a data source that satisfies an ample cover that allows to define strategies in health actions upon a given population. Objective: to describe aspects related with hidden mortality by cerebrovascular diseases in Intermediate Care Unit. Method: Descriptive and retrospective study of a series of cases carried out during the period 2002-2004 in the hospital ¨Dr. Gustavo Aldereguía Lima¨ of Cienfuegos. All monthly reports of the cerebrovascular diseases attention group were analysed, these being gathered from digitalized data bases from the Hospital Statistics Department (n=3477. An enquiry was applied to obtain information as: year and month of hospitalisation; egress state; decease place if in case; stay; and type of cerebrovascular disease. The deceased necropsy protocols were analysed. Results: The hidden mortality was of 0.05; the main causal entity was the cerebral infarction (71,87%, the behaviour was similar in the five years, the average stay of deceased patients in Intermediate Care Unity was of 4.2 days, and outside this Unity: 8.7 days. It was proved the reduced inn hospital hidden mortality caused by cerebrovascular diseases with lethality definition by these entities during the first days in progressive care. A reduced percent of patients died in other units where an average stay doubles that of the Intermediate Care Unit, and as the main cause: the polymorbility associated to bronchopneumonia. Fundamento:La mortalidad es uno de los indicadores confiables y necesarios para el análisis del estado sanitario de una comunidad y fuente de datos para satisfacer una amplia cobertura que permite definir estrategias en las acciones de salud sobre una población. Objetivo: Describir aspectos relacionados con

  11. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  12. The decline in living kidney donation in the United States: random variation or cause for concern?

    Science.gov (United States)

    Rodrigue, James R; Schold, Jesse D; Mandelbrot, Didier A

    2013-11-15

    The annual number of living kidney donors in the United States peaked at 6647 in 2004. The preceding decade saw a 120% increase in living kidney donation. However, since 2004, living kidney donation has declined in all but 1 year, resulting in a 13% decline in the annual number of living kidney donors from 2004 to 2011. The proportional decline in living kidney donation has been more pronounced among men, blacks, younger adults, siblings, and parents. In this article, we explore several possible explanations for the decline in living kidney donation, including an increase in medical unsuitability, an aging transplant patient population, financial disincentives, public policies, and shifting practice patterns, among others. We conclude that the decline in living donation is not merely reflective of random variation but one that warrants action by the transplant centers, the broader transplant community, and the state and national governments.

  13. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  14. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  15. Hidden Conditional Random Fields for Action Recognition

    NARCIS (Netherlands)

    Chen, L.; van der Aa, N.P.; Tan, R.T.; Veltkamp, R.C.

    2014-01-01

    In the field of action recognition, the design of features has been explored extensively, but the choice of action classification methods is limited. Commonly used classification methods like k-Nearest Neighbors and Support Vector Machines assume conditional independency between features. In contras

  16. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  17. Local clustering in scale-free networks with hidden variables.

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A J E M; van Leeuwaarden, Johan S H; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ∈(2,3), so that the degrees have infinite variance. The natural cutoff h_{c} characterizes the largest degrees in the hidden variable models, and a structural cutoff h_{s} introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N, as a function of h_{s} and h_{c}. For scale-free networks with exponent 2vanish only for networks as large as N=10^{9}.

  18. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  19. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  20. Effect of Medication Label Units of Measure on Parent Choice of Dosing Tool: A Randomized Experiment.

    Science.gov (United States)

    Yin, H Shonna; Parker, Ruth M; Sanders, Lee M; Dreyer, Benard P; Mendelsohn, Alan; Bailey, Stacy; Patel, Deesha A; Jimenez, Jessica J; Kim, Kwang-Youn A; Jacobson, Kara; Hedlund, Laurie; Landa, Rosa; Maness, Leslie; Tailor Raythatha, Purvi; McFadden, Terri; Wolf, Michael S

    Some experts recommend eliminating "teaspoon" and "tablespoon" terms from pediatric medication dosing instructions, because these terms could inadvertently encourage use of nonstandard tools (ie, kitchen spoons), which are associated with dosing errors. We examined whether use of "teaspoon" or "tsp" on prescription labels affects parents' choice of dosing tools, and the role of health literacy and language. Analysis of data collected as part of a controlled experiment (SAFE Rx for Kids [Safe Administration For Every Prescription for Kids] study), which randomized English- and Spanish-speaking parents (n = 2110) of children 8 years of age and younger to 1 of 5 groups, which varied in unit of measurement pairings on medication labels and dosing tools. Outcome assessed was parent self-reported choice of dosing tool. Parent health literacy was measured using the Newest Vital Sign. Seventy-seven percent had limited health literacy (36.0% low, 41.0% marginal); 35.0% completed assessments in Spanish. Overall, 27.7% who viewed labels containing either "tsp" or "teaspoon" units (alone or with "mL") chose nonstandard dosing tools (ie, kitchen teaspoon, kitchen tablespoon), compared with 8.3% who viewed "mL"-only labels (adjusted odds ratio [AOR] = 4.4 [95% confidence interval (CI), 3.3-5.8]). Odds varied based on whether "teaspoon" was spelled out or abbreviated ("teaspoon"-alone: AOR = 5.3 [95% CI, 3.8-7.3]); "teaspoon" with mL: AOR = 4.7 [95% CI, 3.3-6.5]; "tsp" with mL: AOR = 3.3 [95% CI, 2.4-4.7]; P units ("teaspoon" or "tsp") on prescription labels is associated with increased likelihood of parent choice of nonstandard dosing tools. Future studies might be helpful to examine the real-world effect of eliminating teaspoon units from medication labels, and identify additional strategies to promote the safe use of pediatric liquid medications. Copyright © 2016 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  1. Introducing random safety audits (RSA) in a neonatal intensive care unit (NICU).

    LENUS (Irish Health Repository)

    Szymanska, M

    2012-01-31

    Random safety audits (RSA) have been shown to be effective in improving standards of clinical practice. 19 data collection audits were performed relating to hygiene, safe prescribing, oxygen pulse oximetry monitoring and documentation in keeping with the requirements of the new Medical Practitioners Act (MPA) 2007. Hygiene audits (range from 20\\/25 to 21\\/21 80%-100%) and safe prescribing audits (range from 23\\/25 to 25\\/25 86%-100%) achieved n=25 100% compliance with unit guidelines over a 3 month period. Compliance with oxygen pulse oximetry monitoring guideline limits improved from 4\\/27 (15%) to 9\\/16 (56%). Compliance with requirement and use of Physician IMC registration number in documentation was only 10\\/18 (56%). RSA\\'s led to improvements in hygiene and prescribing. Compliance with oxygen monitoring guideline limits highlighted the need for greater education. Awareness of legal requirements relating to documentation improved but this has not translated into a change in practice. RSA\\'s can facilitate real time quality improvement in daily clinical practice.

  2. Admitting acute ischemic stroke patients to a stroke care monitoring unit versus a conventional stroke unit : a randomized pilot study

    NARCIS (Netherlands)

    Sulter, Geert; Elting, Jan Willem; Langedijk, Marc; Maurits, Natasha M; De Keyser, Jacques

    2003-01-01

    BACKGROUND AND PURPOSE: Pathophysiological considerations and observational studies indicate that elevated body temperature, hypoxia, hypotension, and cardiac arrhythmias in the acute phase of ischemic stroke may aggravate brain damage and worsen outcome. METHODS: Both units were organized with the

  3. Admitting acute ischemic stroke patients to a stroke care monitoring unit versus a conventional stroke unit : a randomized pilot study

    NARCIS (Netherlands)

    Sulter, Geert; Elting, Jan Willem; Langedijk, Marc; Maurits, Natasha M; De Keyser, Jacques

    2003-01-01

    BACKGROUND AND PURPOSE: Pathophysiological considerations and observational studies indicate that elevated body temperature, hypoxia, hypotension, and cardiac arrhythmias in the acute phase of ischemic stroke may aggravate brain damage and worsen outcome. METHODS: Both units were organized with the

  4. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  5. Error statistics of hidden Markov model and hidden Boltzmann model results

    Science.gov (United States)

    Newberg, Lee A

    2009-01-01

    Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results. PMID:19589158

  6. Predicting local Soil- and Land-units with Random Forest in the Senegalese Sahel

    Science.gov (United States)

    Grau, Tobias; Brandt, Martin; Samimi, Cyrus

    2013-04-01

    MODIS (MCD12Q1) or Globcover are often the only available global land-cover products, however ground-truthing in the Sahel of Senegal has shown that most classes do have any agreement with actual land-cover making those products unusable in any local application. We suggest a methodology, which models local Wolof land- and soil-types in an area in the Senegalese Ferlo around Linguère at different scales. In a first step, interviews with the local population were conducted to ascertain the local denotation of soil units, as well as their agricultural use and woody vegetation mainly growing on them. "Ndjor" are soft sand soils with mainly Combretum glutinosum trees. They are suitable for groundnuts and beans while millet is grown on hard sand soils ("Bardjen") dominated by Balanites aegyptiaca and Acacia tortilis. "Xur" are clayey depressions with a high diversity of tree species. Lateritic pasture sites with dense woody vegetation (mostly Pterocarpus lucens and Guiera senegalensis) have never been used for cropping and are called "All". In a second step, vegetation and soil parameters of 85 plots (~1 ha) were surveyed in the field. 28 different soil parameters are clustered into 4 classes using the WARD algorithm. Here, 81% agree with the local classification. Then, an ordination (NMDS) with 2 dimensions and a stress-value of 9.13% was calculated using the 28 soil parameters. It shows several significant relationships between the soil classes and the fitted environmental parameters which are derived from field data, a digital elevation model, Landsat and RapidEye imagery as well as TRMM rainfall data. Landsat's band 5 reflectance values (1.55 - 1.75 µm) of mean dry season image (2000-2010) has a R² of 0.42 and is the most important of 9 significant variables (5%-level). A random forest classifier is then used to extrapolate the 4 classes to the whole study area based on the 9 significant environmental parameters. At a resolution of 30 m the OBB (out-of-bag) error

  7. Intensive Early Rehabilitation in the Intensive Care Unit for Liver Transplant Recipients: A Randomized Controlled Trial.

    Science.gov (United States)

    Maffei, Pierre; Wiramus, Sandrine; Bensoussan, Laurent; Bienvenu, Laurence; Haddad, Eric; Morange, Sophie; Fathallah, Mohamed; Hardwigsen, Jean; Viton, Jean-Michel; Le Treut, Y Patrice; Albanese, Jacques; Gregoire, Emilie

    2017-08-01

    To validate the feasibility and tolerance of an intensive rehabilitation protocol initiated during the postoperative period in an intensive care unit (ICU) in liver transplant recipients. Prospective randomized study. ICU. Liver transplant recipients over a period of 1 year (N=40). The "usual treatment group" (n=20), which benefited from the usual treatment applied in the ICU (based on physician prescription for the physiotherapist, with one session a day), and the experimental group (n=20), which followed a protocol of early and intensive rehabilitation (based on a written protocol validated by physicians and an evaluation by physiotherapist, with 2 sessions a day), were compared. Our primary aims were tolerance, assessed from the number of adverse events during rehabilitation sessions, and feasibility, assessed from the number of sessions discontinued. The results revealed a small percentage of adverse events (1.5% in the usual treatment group vs 1.06% in the experimental group) that were considered to be of low intensity. Patients in the experimental group sat on the edge of their beds sooner (2.6 vs 9.7d; P=.048) and their intestinal transit resumed earlier (5.6 vs 3.7d; P=.015) than patients in the usual treatment group. There was no significant difference between the 2 arms regarding length of stay (LOS), despite a decrease in duration in the experimental group. The introduction of an intensive early rehabilitation program for liver transplant recipients was well tolerated and feasible in the ICU. We noted that the different activities proposed were introduced sooner in the experimental group. Moreover, there is a tendency to decreased LOS in the ICU for the experimental group. These results now need to be confirmed by studies on a larger scale. Copyright © 2016 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  8. Management of diabetes by a healthcare team in a cardiology unit: a randomized controlled trial

    Science.gov (United States)

    de Moraes, Maria Antonieta P; Rodrigues, Juliane; Cremonesi, Mariana; Polanczyk, Carisi; Schaan, Beatriz D

    2013-01-01

    OBJECTIVE: To assess the effectiveness of healthcare team guidance in the implementation of a glycemic control protocol in the non-intensive care unit of a cardiology hospital. METHODS: This was a randomized clinical trial comparing 9 months of intensive guidance by a healthcare team on a protocol for diabetes care (Intervention Group, n = 95) with 9 months of standard care (Control Group, n = 87). Clinicaltrials.gov: NCT01154413. RESULTS: The mean age of the patients was 61.7±10 years, and the mean glycated hemoglobin level was 71±23 mmol/mol (8.7±2.1%). The mean capillary glycemia during hospitalization was similar between the groups (9.8±2.9 and 9.1±2.4 mmol/l for the Intervention Group and Control Group, respectively, p = 0.078). The number of hypoglycemic episodes (p = 0.77), hyperglycemic episodes (47 vs. 50 in the Intervention Group and Control Group, p = 0.35, respectively), and the length of stay in the hospital were similar between the groups (p = 0.64). The amount of regular insulin administered was 0 (0–10) IU in the Intervention Group and 28 (7–56) IU in the Control Group (p<0.001), and the amount of NPH insulin administered was similar between the groups (p = 0.16). CONCLUSIONS: While guidance on a glycemic control protocol given by a healthcare team resulted in a modification of the therapeutic strategy, no changes in glycemic control, frequency of episodes of hypoglycemia and hyperglycemia, or hospitalization duration were observed. PMID:24270950

  9. Management of diabetes by a healthcare team in a cardiology unit: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Maria Antonieta P. de Moraes

    2013-11-01

    Full Text Available OBJECTIVE: To assess the effectiveness of healthcare team guidance in the implementation of a glycemic control protocol in the non-intensive care unit of a cardiology hospital. METHODS: This was a randomized clinical trial comparing 9 months of intensive guidance by a healthcare team on a protocol for diabetes care (Intervention Group, n = 95 with 9 months of standard care (Control Group, n = 87. Clinicaltrials.gov: NCT01154413. RESULTS: The mean age of the patients was 61.7±10 years, and the mean glycated hemoglobin level was 71±23 mmol/mol (8.7±2.1%. The mean capillary glycemia during hospitalization was similar between the groups (9.8±2.9 and 9.1±2.4 mmol/l for the Intervention Group and Control Group, respectively, p = 0.078. The number of hypoglycemic episodes (p = 0.77, hyperglycemic episodes (47 vs. 50 in the Intervention Group and Control Group, p = 0.35, respectively, and the length of stay in the hospital were similar between the groups (p = 0.64. The amount of regular insulin administered was 0 (0-10 IU in the Intervention Group and 28 (7-56 IU in the Control Group (p<0.001, and the amount of NPH insulin administered was similar between the groups (p = 0.16. CONCLUSIONS: While guidance on a glycemic control protocol given by a healthcare team resulted in a modification of the therapeutic strategy, no changes in glycemic control, frequency of episodes of hypoglycemia and hyperglycemia, or hospitalization duration were observed.

  10. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  11. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  12. Generation and Analysis of Hidden Optical-Polarization States

    CERN Document Server

    Singh, Ravi S

    2010-01-01

    A hybrid Optical-Device (Phase-Conjugating Mirror Michelson Interferometer), made up of Phase-conjugate mirror along with ordinary mirror and Polarization Beam-splitter, is formally designed and investigated for the generation of an unusual Optical-Polarization States. This weird yet 'essentially single-mode' optical-polarization state has non-random 'ratio of amplitudes' and non-random 'sum of phases' in orthogonal bases-modes contrary to usual 'truly single-mode' optical-polarization states of which non-random 'ratio of amplitudes' and non-random 'difference of phases' serves as optical-polarization characteristic parameters. Since it is seen not to be characterized by Stokes parameters, one may, therefore, assign the name 'Hidden Optical-Polarization States (HOPS)'. HOPS are characterized by a set of parameters, namely, Hidden Optical-Polarization parameters. Formal experimental schemes are presented to experimentally measure these parameters and, thus, offering characterization of HOPS.

  13. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The locations of the breaks are subsequently obtained by assigning states to data points according to the Maximum Posterior Mode (MPM) algorithm. The Integrated Classification Likelihood-Bayesian Information Criterion (ICL-BIC) allows for the determination of the number of regimes by taking into account...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule....

  14. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  15. The Hidden Subgroup Problem

    CERN Document Server

    Wang, Frédéric

    2010-01-01

    We give an overview of the Hidden Subgroup Problem (HSP) as of July 2010, including new results discovered since the survey of arXiv:quant-ph/0411037v1. We recall how the problem provides a framework for efficient quantum algorithms and present the standard methods based on coset sampling. We study the Dihedral and Symmetric HSPs and how they relate to hard problems on lattices and graphs. Finally, we conclude with the known solutions and techniques, describe connections with efficient algorithms as well as miscellaneous variants of HSP. We also bring various contributions to the topic. We show that in theory, we can solve HSP over a given group inductively: the base case is solving HSP over its simple factor groups and the inductive step is building efficient oracles over a normal subgroup N and over the factor group G/N. We apply this analysis to the Dedekindian HSP to get an alternative abelian HSP algorithm based on a change of the underlying group. We also propose a quotient reduction by the normal group...

  16. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group.......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  17. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of offshor...... of our study is to suggest how hidden costs of offshoring can be mitigated through an explicit orientation towards improving organizational processes and structures as well as experience with offshoring.......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  18. Randomized trial of automated, electronic monitoring to facilitate early detection of sepsis in the intensive care unit*.

    Science.gov (United States)

    Hooper, Michael H; Weavind, Lisa; Wheeler, Arthur P; Martin, Jason B; Gowda, Supriya Srinivasa; Semler, Matthew W; Hayes, Rachel M; Albert, Daniel W; Deane, Norment B; Nian, Hui; Mathe, Janos L; Nadas, Andras; Sztipanovits, Janos; Miller, Anne; Bernard, Gordon R; Rice, Todd W

    2012-07-01

    To determine whether automated identification with physician notification of the systemic inflammatory response syndrome in medical intensive care unit patients expedites early administration of new antibiotics or improvement of other patient outcomes in patients with sepsis. : A prospective randomized, controlled, single center study. Medical intensive care unit of an academic, tertiary care medical center. Four hundred forty-two consecutive patients admitted over a 4-month period who met modified systemic inflammatory response syndrome criteria in a medical intensive care unit. Patients were randomized to monitoring by an electronic "Listening Application" to detect modified (systemic inflammatory response syndrome) criteria vs. usual care. The listening application notified physicians in real time when modified systemic inflammatory response syndrome criteria were detected, but did not provide management recommendations. The median time to new antibiotics was similar between the intervention and usual care groups when comparing among all patients (6.0 hr vs. 6.1 hr, p = .95), patients with sepsis (5.3 hr vs. 5.1 hr; p = .90), patients on antibiotics at enrollment (5.2 hr vs. 7.0 hr, p = .27), or patients not on antibiotics at enrollment (5.2 hr vs. 5.1 hr, p = .85). The amount of fluid administered following detection of modified systemic inflammatory response syndrome criteria was similar between groups whether comparing all patients or only patients who were hypotensive at enrollment. Other clinical outcomes including intensive care unit length of stay, hospital length of stay, and mortality were not shown to be different between patients in the intervention and control groups. Realtime alerts of modified systemic inflammatory response syndrome criteria to physicians in one tertiary care medical intensive care unit were feasible and safe but did not influence measured therapeutic interventions for sepsis or significantly alter clinical outcomes.

  19. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  20. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  1. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  2. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  3. Bayesian structural inference for hidden processes.

    Science.gov (United States)

    Strelioff, Christopher C; Crutchfield, James P

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ε-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ε-machines, irrespective of estimated transition probabilities. Properties of ε-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  4. Infinite conditional random fields for human behavior analysis

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF

  5. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  6. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  7. Action unit classification using active appearance models and conditional random fields

    NARCIS (Netherlands)

    Van der Maaten, L.J.P.; Hendriks, E.A.

    2011-01-01

    In this paper, we investigate to what extent modern computer vision and machine learning techniques can assist social psychology research by automatically recognizing facial expressions. To this end, we develop a system that automatically recognizes the action units defined in the facial action codi

  8. Action unit classification using active appearance models and conditional random fields

    NARCIS (Netherlands)

    Van der Maaten, L.J.P.; Hendriks, E.A.

    2011-01-01

    In this paper, we investigate to what extent modern computer vision and machine learning techniques can assist social psychology research by automatically recognizing facial expressions. To this end, we develop a system that automatically recognizes the action units defined in the facial action codi

  9. Action unit classification using active appearance models and conditional random fields

    NARCIS (Netherlands)

    Van der Maaten, L.J.P.; Hendriks, E.A.

    2011-01-01

    In this paper, we investigate to what extent modern computer vision and machine learning techniques can assist social psychology research by automatically recognizing facial expressions. To this end, we develop a system that automatically recognizes the action units defined in the facial action

  10. PERSONAL NETWORK SAMPLING, OUTDEGREE ANALYSIS AND MULTILEVEL ANALYSIS - INTRODUCING THE NETWORK CONCEPT IN STUDIES OF HIDDEN POPULATIONS

    NARCIS (Netherlands)

    SPREEN, M; ZWAAGSTRA, R

    1994-01-01

    Populations, such as heroin and cocaine users, the homeless and the like (hidden populations), are among the most difficult populations to which to apply classic random sampling procedures. A frequently used data collection method for these hidden populations is the snowball procedure. The prerequis

  11. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  12. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  13. Pentaquark states with hidden charm

    Science.gov (United States)

    Bijker, Roelof

    2017-07-01

    I develop an extension of the usual three-flavor quark model to four flavors (u, d, s and c), and discuss the classification of pentaquark states with hidden charm. This work is motivated by the recent observation of such states by the LHCb Collatoration at CERN.

  14. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  15. Stress cardiac magnetic resonance imaging with observation unit care reduces cost for patients with emergent chest pain: a randomized trial.

    Science.gov (United States)

    Miller, Chadwick D; Hwang, Wenke; Hoekstra, James W; Case, Doug; Lefebvre, Cedric; Blumstein, Howard; Hiestand, Brian; Diercks, Deborah B; Hamilton, Craig A; Harper, Erin N; Hundley, W Gregory

    2010-09-01

    We determine whether imaging with cardiac magnetic resonance imaging (MRI) in an observation unit would reduce medical costs among patients with emergent non-low-risk chest pain who otherwise would be managed with an inpatient care strategy. Emergency department patients (n=110) at intermediate or high probability for acute coronary syndrome without electrocardiographic or biomarker evidence of a myocardial infarction provided consent and were randomized to stress cardiac MRI in an observation unit versus standard inpatient care. The primary outcome was direct hospital cost calculated as the sum of hospital and provider costs. Estimated median cost differences (Hodges-Lehmann) and distribution-free 95% confidence intervals (Moses) were used to compare groups. There were 110 participants with 53 randomized to cardiac MRI and 57 to inpatient care; 8 of 110 (7%) experienced acute coronary syndrome. In the MRI pathway, 49 of 53 underwent stress cardiac MRI, 11 of 53 were admitted, 1 left against medical advice, 41 were discharged, and 2 had acute coronary syndrome. In the inpatient care pathway, 39 of 57 patients initially received stress testing, 54 of 57 were admitted, 3 left against medical advice, and 6 had acute coronary syndrome. At 30 days, no subjects in either group experienced acute coronary syndrome after discharge. The cardiac MRI group had a reduced median hospitalization cost (Hodges-Lehmann estimate $588; 95% confidence interval $336 to $811); 79% were managed without hospital admission. Compared with inpatient care, an observation unit strategy involving stress cardiac MRI reduced incident cost without any cases of missed acute coronary syndrome in patients with emergent chest pain. Copyright (c) 2010 American College of Emergency Physicians. Published by Mosby, Inc. All rights reserved.

  16. Stock Market Trend Analysis Using Hidden Markov Models

    OpenAIRE

    Kavitha, G.; Udhayakumar, A.; D. Nagarajan

    2013-01-01

    Price movements of stock market are not totally random. In fact, what drives the financial market and what pattern financial time series follows have long been the interest that attracts economists, mathematicians and most recently computer scientists [17]. This paper gives an idea about the trend analysis of stock market behaviour using Hidden Markov Model (HMM). The trend once followed over a particular period will sure repeat in future. The one day difference in close value of stocks for a...

  17. Randomly distributed unit sources to enhance optimization in tsunami waveform inversion

    Directory of Open Access Journals (Sweden)

    I. E. Mulia

    2014-05-01

    Full Text Available Determination of sea surface deformation generated by earthquakes is crucial to the success of tsunami modeling. Using waveforms recorded at measurement stations and assuming that the rupture velocity is much faster than the tsunami wave celerity, sea surface deformation caused by a tsunamigenic earthquake can be inferred through an inversion operation using the Green's function technique. However, this inversion method for tsunami waveforms possesses a limitation, in that the inverse matrix does not always exist because of the non-uniqueness of the solution. In addition to the large number of unknown parameters, which might produce many local optima on the misfit function measure, the search towards optimality is confined by the uniform distance of unit sources used in the regular Green's function. This study proposes a new method to both optimize the determination of the unknown parameters and introduce a global optimization method for tsunami waveform inversion. The method has been tested using an artificial tsunami source with real bathymetry data. A significant improvement is achieved by stochastically searching for an optimal distribution of unit source locations prior to the inversion.

  18. Local clustering in scale-free networks with hidden variables

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A. J. E. M.; van Leeuwaarden, Johan S. H.; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ ∈(2 ,3 ) , so that the degrees have infinite variance. The natural cutoff hc characterizes the largest degrees in the hidden variable models, and a structural cutoff hs introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N , as a function of hs and hc. For scale-free networks with exponent 2 universality class at hand. We characterize the extremely slow decay of C when τ ≈2 and show that for τ =2.1 , say, clustering starts to vanish only for networks as large as N =109 .

  19. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  20. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    Adam Kiil. 19. NGC 2467 - number 2 by Josh Barrington. 20. Haffner 18 and 19 by Javier Fuentes. Igor Chekalin, winner of the trip to Paranal, says: "It was a great experience and pleasure to work with such amazing data. As an amateur astrophotographer, this was the most difficult processing and post-processing job I have ever done. My participation in the Hidden Treasures competition gave me a range of challenges, from installing new software to studying techniques and even operating systems that I did not know before." The success of the ESO's Hidden Treasures 2010 competition and the enthusiasm of the skilled participants made it easy to decide to run a follow-up to the competition. Stay tuned and check www.eso.org for news about ESO's Hidden Treasures 2011. More information ESO, the European Southern Observatory, is the foremost intergovernmental astronomy organisation in Europe and the world's most productive astronomical observatory. It is supported by 15 countries: Austria, Belgium, Brazil, the Czech Republic, Denmark, France, Finland, Germany, Italy, the Netherlands, Portugal, Spain, Sweden, Switzerland and the United Kingdom. ESO carries out an ambitious programme focused on the design, construction and operation of powerful ground-based observing facilities enabling astronomers to make important scientific discoveries. ESO also plays a leading role in promoting and organising cooperation in astronomical research. ESO operates three unique world-class observing sites in Chile: La Silla, Paranal and Chajnantor. At Paranal, ESO operates the Very Large Telescope, the world's most advanced visible-light astronomical observatory and VISTA, the world's largest survey telescope. ESO is the European partner of a revolutionary astronomical telescope ALMA, the largest astronomical project in existence. ESO is currently planning a 42-metre European Extremely Large optical/near-infrared Telescope, the E-ELT, which will become "the world's biggest eye on the sky".

  1. Effects of lyric analysis interventions on treatment motivation in patients on a detoxification unit: a randomized effectiveness study.

    Science.gov (United States)

    Silverman, Michael J

    2015-01-01

    Treatment motivation is a key component in the early rehabilitative stages for people with substance use disorders. To date, no music therapy researcher has studied how lyric analysis interventions might affect motivation in a randomized controlled design. The primary purpose of this study was to determine the effect of lyric analysis interventions on treatment motivation in patients on a detoxification unit using a single-session wait-list control design. A secondary purpose was to determine if there were between-group differences concerning two contrasting songs used for the lyric analyses. Participants (N=104) were cluster randomized to a group lyric analysis condition or a wait-list control condition. Participants received either a "Hurt" or a "How to Save a Life" lyric analysis treatment. The Texas Christian University Treatment Motivation Scale-Client Evaluation of Self at Intake (CESI) (Simpson, 2008[2005]) was used to measure aspects of treatment motivation: problem recognition, desire for help, treatment readiness, pressures for treatment, and total motivation. Results indicated significant between-group differences in measures of problem recognition, desire for help, treatment readiness, and total motivation, with experimental participants having higher treatment motivation means than control participants. There was no difference between the two lyric analysis interventions. Although the song used for lyric analysis interventions did not affect outcome, a single group-based music therapy lyric analysis session can be an effective psychosocial treatment intervention to enhance treatment motivation in patients on a detoxification unit. Limitations, implications for clinical practice, and suggestions for future research are provided. © the American Music Therapy Association 2015. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  2. Three-month evaluation of vital tooth bleaching using light units-a randomized clinical study.

    Science.gov (United States)

    Polydorou, O; Wirsching, M; Wokewitz, M; Hahn, P

    2013-01-01

    The aim of this study was to evaluate the color stability of vital bleaching using a halogen unit, laser, or only chemical activation up to three months after treatment. A total of 60 patients were divided into three groups, and their teeth were bleached with 38% hydrogen peroxide using three methods: acceleration of the bleaching process with halogen (eight minutes), laser (30 seconds), or chemical activation only. All teeth were bleached a maximum of four times (4 × 15 minutes) until a change of six shade tabs took place. The color was evaluated both visually and with a spectrophotometer before bleaching, immediately after bleaching, and one and three months after bleaching. Directly after bleaching, the use of halogen showed better results than laser (p≤0.05). One and three months after bleaching, no significant difference was found between the tested methods relative to the shade change, independent of the method of shade evaluation (p>0.05). As far as the color stability is concerned, bleaching with halogen resulted in stable color throughout the three months (p>0.05), whereas the other two methods resulted in whiter teeth after one and three months compared with the color directly after bleaching (p≤0.05). Bleaching with laser needed more time than halogen for the desired shade change (p≤0.05). Although directly after treatment bleaching with halogen resulted in better results, one and three months after bleaching the kind of acceleration used in the bleaching process did not have any effect on the esthetic results.

  3. Search for passing-through-walls neutrons constrains hidden braneworlds

    Directory of Open Access Journals (Sweden)

    Michaël Sarrazin

    2016-07-01

    Full Text Available In many theoretical frameworks our visible world is a 3-brane, embedded in a multidimensional bulk, possibly coexisting with hidden braneworlds. Some works have also shown that matter swapping between braneworlds can occur. Here we report the results of an experiment – at the Institut Laue-Langevin (Grenoble, France – designed to detect thermal neutron swapping to and from another braneworld, thus constraining the probability p2 of such an event. The limit, p87 in Planck length units.

  4. Search for passing-through-walls neutrons constrains hidden braneworlds

    Science.gov (United States)

    Sarrazin, Michaël; Pignol, Guillaume; Lamblin, Jacob; Pinon, Jonhathan; Méplan, Olivier; Terwagne, Guy; Debarsy, Paul-Louis; Petit, Fabrice; Nesvizhevsky, Valery V.

    2016-07-01

    In many theoretical frameworks our visible world is a 3-brane, embedded in a multidimensional bulk, possibly coexisting with hidden braneworlds. Some works have also shown that matter swapping between braneworlds can occur. Here we report the results of an experiment - at the Institut Laue-Langevin (Grenoble, France) - designed to detect thermal neutron swapping to and from another braneworld, thus constraining the probability p2 of such an event. The limit, p 87 in Planck length units.

  5. The hidden dragons.

    Science.gov (United States)

    Zeng, Ming; Williamson, Peter J

    2003-10-01

    Most multinational corporations are fascinated with China. Carried away by the number of potential customers and the relatively cheap labor, firms seeking a presence in China have traditionally focused on selling products, setting up manufacturing facilities, or both. But they've ignored an important development: the emergence of Chinese firms as powerful rivals--in China and also in the global market. In this article, Ming Zeng and Peter Williamson describe how Chinese companies like Haier, Legend, and Pearl River Piano have quietly managed to grab market share from older, bigger, and financially stronger rivals in Asia, Europe, and the United States. Global managers tend to offer the usual explanations for why Chinese companies don't pose a threat: They aren't big enough or profitable enough to compete overseas, the managers say, and these primarily state-owned companies are ill-financed and ill-equipped for global competition. As the government's policies about the private ownership of companies changed from forbidding the practice to encouraging it, a new breed of Chinese companies evolved. The authors outline the four types of hybrid Chinese companies that are simultaneously tackling the global market. China's national champions are using their advantages as domestic leaders to build global brands. The dedicated exporters are entering foreign markets on the strength of their economies of scale. The competitive networks have taken on world markets by bringing together small, specialized companies that operate in close proximity. And the technology upstarts are using innovations developed by China's government-owned research institutes to enter emerging sectors such as biotechnology. Zeng and Williamson identify these budding multinationals, analyze their strategies, and evaluate their weaknesses.

  6. Selective laser melting: a unit cell approach for the manufacture of porous, titanium, bone in-growth constructs, suitable for orthopedic applications. II. Randomized structures.

    Science.gov (United States)

    Mullen, Lewis; Stamp, Robin C; Fox, Peter; Jones, Eric; Ngo, Chau; Sutcliffe, Christopher J

    2010-01-01

    In this study, the unit cell approach, which has previously been demonstrated as a method of manufacturing porous components suitable for use as orthopedic implants, has been further developed to include randomized structures. These random structures may aid the bone in-growth process because of their similarity in appearance to trabecular bone and are shown to carry legacy properties that can be related back to the original unit cell on which they are ultimately based. In addition to this, it has been shown that randomization improves the mechanical properties of regular unit cell structures, resulting in anticipated improvements to both implant functionality and longevity. The study also evaluates the effect that a post process sinter cycle has on the components, outlines the improved mechanical properties that are attainable, and also the changes in both the macro and microstructure that occur.

  7. A TWO-STATE MIXED HIDDEN MARKOV MODEL FOR RISKY TEENAGE DRIVING BEHAVIOR

    Science.gov (United States)

    Jackson, John C.; Albert, Paul S.; Zhang, Zhiwei

    2016-01-01

    This paper proposes a joint model for longitudinal binary and count outcomes. We apply the model to a unique longitudinal study of teen driving where risky driving behavior and the occurrence of crashes or near crashes are measured prospectively over the first 18 months of licensure. Of scientific interest is relating the two processes and predicting crash and near crash outcomes. We propose a two-state mixed hidden Markov model whereby the hidden state characterizes the mean for the joint longitudinal crash/near crash outcomes and elevated g-force events which are a proxy for risky driving. Heterogeneity is introduced in both the conditional model for the count outcomes and the hidden process using a shared random effect. An estimation procedure is presented using the forward–backward algorithm along with adaptive Gaussian quadrature to perform numerical integration. The estimation procedure readily yields hidden state probabilities as well as providing for a broad class of predictors.

  8. On quantum algorithms for noncommutative hidden subgroups

    Energy Technology Data Exchange (ETDEWEB)

    Ettinger, M. [Los Alamos National Lab., NM (United States); Hoeyer, P. [Odense Univ. (Denmark)

    1998-12-01

    Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. The authors present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of calls to the input function. They also explore the difficulties of developing an algorithm to process the data to explicitly calculate a generating set for the subgroup. A general framework for the noncommutative hidden subgroup problem is discussed and they indicate future research directions.

  9. The effects of parental presence in the postanesthetic care unit on children's postoperative behavior: a prospective, randomized, controlled study.

    Science.gov (United States)

    Lardner, David R; Dick, Bruce D; Crawford, Susan

    2010-04-01

    The effects on children of parental presence in the postanesthesia care unit (PACU) have not been extensively studied. The few published studies are retrospective, nonrandomized, or lack adequate controls. They suggest that parental presence in the PACU decreases crying and negative behavior change postoperatively. We performed this prospective, randomized, controlled study to determine whether the presence of a parent affected crying behaviors in the PACU and behavior change 2 weeks postoperatively. Randomly selected patients, aged 2.0 to 8 years 11 months, ASA physical status I or II, and scheduled for elective outpatient surgery with an anticipated PACU stay of >10 minutes were randomly assigned to the parent present group (n = 150) or parent absent group (n = 150) in the PACU. All parents underwent the same preparation program. Reunification occurred once children's eyes had opened for the parent present group. In the PACU, crying was scored each minute after eye opening using a 5-point scale. Negative behavior change 2 weeks after discharge was determined using the Post Hospitalization Behavior Questionnaire. Because the anesthesia technique to be used was not determined a priori, data on the technique used were collected to ensure that groups were similar. Multiple and logistic regression techniques were used to determine predictors of crying in the PACU and behavior change 2 weeks postoperatively. Parental presence in the PACU made no difference in crying in the PACU. Negative behavior change 2 weeks postoperatively occurred more frequently in the parent absent group than the parent present group (45.8% vs 29.3%; P = 0.007). Multiple regression identified the following significant factors as predictive of larger proportion of time spent crying in the PACU (R(2) = 0.256, F[5, 273] = 15.66, P < 0.001): age <5 years (P < 0.001) and higher Children's Hospital of Eastern Ontario Pain Scale score at 15 minutes after arrival in day surgery (P < 0.001). Parental

  10. Music Listening Among Postoperative Patients in the Intensive Care Unit: A Randomized Controlled Trial with Mixed-Methods Analysis

    Directory of Open Access Journals (Sweden)

    Nancy Ames

    2017-07-01

    Full Text Available Background: Music listening may reduce the physiological, emotional, and mental effects of distress and anxiety. It is unclear whether music listening may reduce the amount of opioids used for pain management in critical care, postoperative patients or whether music may improve patient experience in the intensive care unit (ICU. Methods: A total of 41 surgical patients were randomized to either music listening or controlled non-music listening groups on ICU admission. Approximately 50-minute music listening interventions were offered 4 times per day (every 4-6 hours during the 48 hours of patients’ ICU stays. Pain, distress, and anxiety scores were measured immediately before and after music listening or controlled resting periods. Total opioid intake was recorded every 24 hours and during each intervention. Results: There was no significant difference in pain, opioid intake, distress, or anxiety scores between the control and music listening groups during the first 4 time points of the study. However, a mixed modeling analysis examining the pre- and post-intervention scores at the first time point revealed a significant interaction in the Numeric Rating Scale (NRS for pain between the music and the control groups ( P  = .037. The Numeric Rating Score decreased in the music group but remained stable in the control group. Following discharge from the ICU, the music group’s interviews were analyzed for themes. Conclusions: Despite the limited sample size, this study identified music listening as an appropriate intervention that improved patients’ post-intervention experience, according to patients’ self-report. Future mixed methods studies are needed to examine both qualitative patient perspectives and methodology to improve music listening in critical care units.

  11. Unsteady Fast Random Particle Mesh method for efficient prediction of tonal and broadband noises of a centrifugal fan unit

    Directory of Open Access Journals (Sweden)

    Seung Heo

    2015-09-01

    Full Text Available In this study, efficient numerical method is proposed for predicting tonal and broadband noises of a centrifugal fan unit. The proposed method is based on Hybrid Computational Aero-Acoustic (H-CAA techniques combined with Unsteady Fast Random Particle Mesh (U-FRPM method. The U-FRPM method is developed by extending the FRPM method proposed by Ewert et al. and is utilized to synthesize turbulence flow field from unsteady RANS solutions. The H-CAA technique combined with U-FRPM method is applied to predict broadband as well as tonal noises of a centrifugal fan unit in a household refrigerator. Firstly, unsteady flow field driven by a rotating fan is computed by solving the RANS equations with Computational Fluid Dynamic (CFD techniques. Main source regions around the rotating fan are identified by examining the computed flow fields. Then, turbulence flow fields in the main source regions are synthesized by applying the U-FRPM method. The acoustic analogy is applied to model acoustic sources in the main source regions. Finally, the centrifugal fan noise is predicted by feeding the modeled acoustic sources into an acoustic solver based on the Boundary Element Method (BEM. The sound spectral levels predicted using the current numerical method show good agreements with the measured spectra at the Blade Pass Frequencies (BPFs as well as in the high frequency range. On the more, the present method enables quantitative assessment of relative contributions of identified source regions to the sound field by comparing predicted sound pressure spectrum due to modeled sources.

  12. Music Listening Among Postoperative Patients in the Intensive Care Unit: A Randomized Controlled Trial with Mixed-Methods Analysis

    Science.gov (United States)

    Ames, Nancy; Shuford, Rebecca; Yang, Li; Moriyama, Brad; Frey, Meredith; Wilson, Florencia; Sundaramurthi, Thiruppavai; Gori, Danelle; Mannes, Andrew; Ranucci, Alexandra; Koziol, Deloris; Wallen, Gwenyth R

    2017-01-01

    Background: Music listening may reduce the physiological, emotional, and mental effects of distress and anxiety. It is unclear whether music listening may reduce the amount of opioids used for pain management in critical care, postoperative patients or whether music may improve patient experience in the intensive care unit (ICU). Methods: A total of 41 surgical patients were randomized to either music listening or controlled non-music listening groups on ICU admission. Approximately 50-minute music listening interventions were offered 4 times per day (every 4-6 hours) during the 48 hours of patients’ ICU stays. Pain, distress, and anxiety scores were measured immediately before and after music listening or controlled resting periods. Total opioid intake was recorded every 24 hours and during each intervention. Results: There was no significant difference in pain, opioid intake, distress, or anxiety scores between the control and music listening groups during the first 4 time points of the study. However, a mixed modeling analysis examining the pre- and post-intervention scores at the first time point revealed a significant interaction in the Numeric Rating Scale (NRS) for pain between the music and the control groups (P = .037). The Numeric Rating Score decreased in the music group but remained stable in the control group. Following discharge from the ICU, the music group’s interviews were analyzed for themes. Conclusions: Despite the limited sample size, this study identified music listening as an appropriate intervention that improved patients’ post-intervention experience, according to patients’ self-report. Future mixed methods studies are needed to examine both qualitative patient perspectives and methodology to improve music listening in critical care units.

  13. Hidden temporal order unveiled in stock market volatility variance

    Directory of Open Access Journals (Sweden)

    Y. Shapira

    2011-06-01

    Full Text Available When analyzed by standard statistical methods, the time series of the daily return of financial indices appear to behave as Markov random series with no apparent temporal order or memory. This empirical result seems to be counter intuitive since investor are influenced by both short and long term past market behaviors. Consequently much effort has been devoted to unveil hidden temporal order in the market dynamics. Here we show that temporal order is hidden in the series of the variance of the stocks volatility. First we show that the correlation between the variances of the daily returns and means of segments of these time series is very large and thus cannot be the output of random series, unless it has some temporal order in it. Next we show that while the temporal order does not show in the series of the daily return, rather in the variation of the corresponding volatility series. More specifically, we found that the behavior of the shuffled time series is equivalent to that of a random time series, while that of the original time series have large deviations from the expected random behavior, which is the result of temporal structure. We found the same generic behavior in 10 different stock markets from 7 different countries. We also present analysis of specially constructed sequences in order to better understand the origin of the observed temporal order in the market sequences. Each sequence was constructed from segments with equal number of elements taken from algebraic distributions of three different slopes.

  14. Does breastfeeding reduce acute procedural pain in preterm infants in the neonatal intensive care unit? A randomized clinical trial.

    Science.gov (United States)

    Holsti, Liisa; Oberlander, Timothy F; Brant, Rollin

    2011-11-01

    Managing acute procedural pain effectively in preterm infants in the neonatal intensive care unit remains a significant problem. The objectives of this study were to evaluate the efficacy of breastfeeding for reducing pain and to determine if breastfeeding skills were altered after this treatment. Fifty-seven infants born at 30-36 weeks gestational age were randomized to be breastfed (BF) or to be given a soother during blood collection. Changes in the Behavioral Indicators of Infant Pain (BIIP) and in mean heart rate (HR) across 3 phases of blood collection were measured. In the BF group, the Premature Infant Breastfeeding Behaviors (PIBBS) scale was scored before and 24 hours after blood collection. Longitudinal regression analysis was used to compare changes in Lance/squeeze and Recovery phases of blood collection between groups, with gestational age at birth, baseline BIIP scores, and mean HR included as covariates. Differences in PIBBS scores were assessed using a paired t-test. Relationships between PIBBS scores, BIIP scores, and HR were evaluated with Pearson correlations. No differences between treatment groups were found: BIIP (P=0.44, confidence interval [CI] -1.60-0.69); HR (P=0.73, CI -7.0-10.0). Infants in the BF group showed improved PIBBS scores after the treatment (Ppain indices or interfere with the acquisition of breastfeeding skills. Exploratory analyses indicate there may be benefit for infants with mature breastfeeding abilities.

  15. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  16. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  17. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  18. Evaluation of the preliminary effectiveness of hand massage therapy on postoperative pain of adults in the intensive care unit after cardiac surgery: a pilot randomized controlled trial.

    Science.gov (United States)

    Boitor, Mădălina; Martorella, Géraldine; Arbour, Caroline; Michaud, Cécile; Gélinas, Céline

    2015-06-01

    Although many intensive care unit patients experience significant pain, very few studies explored massage to maximize their pain relief. This study aimed to evaluate the preliminary effects of hand massage on pain after cardiac surgery in the adult intensive care unit. A pilot randomized controlled trial was used for this study. The study was conducted in a Canadian medical-surgical intensive care unit. Forty adults who were admitted to the intensive care unit after undergoing elective cardiac surgery in the previous 24 hours participated in the study. They were randomly assigned to the experimental (n = 21) or control (n = 19) group. The experimental group received a 15-minute hand massage, and the control group received a 15-minute hand-holding without massage. In both groups the intervention was followed by a 30-minute rest period. The interventions were offered on 2-3 occasions within 24 hours after surgery. Pain, muscle tension, and vital signs were assessed. Pain intensity and behavioral scores were decreased for the experimental group. Although hand massage decreased muscle tension, fluctuations in vital signs were not significant. This study supports potential benefits of hand massage for intensive care unit postoperative pain management. Although larger randomized controlled trials are necessary, this low-cost nonpharmacologic intervention can be safely administered.

  19. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  20. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  1. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  2. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  3. Hidden Markov models: the best models for forager movements?

    Directory of Open Access Journals (Sweden)

    Rocio Joo

    Full Text Available One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs. We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs. They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour, while their behavioural modes (fishing, searching and cruising were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%, significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  4. Assessment in multisite randomized clinical trials of patients with autistic disorder: the Autism RUPP Network. Research Units on Pediatric Psychopharmacology.

    Science.gov (United States)

    Arnold, L E; Aman, M G; Martin, A; Collier-Crespin, A; Vitiello, B; Tierney, E; Asarnow, R; Bell-Bradshaw, F; Freeman, B J; Gates-Ulanet, P; Klin, A; McCracken, J T; McDougle, C J; McGough, J J; Posey, D J; Scahill, L; Swiezy, N B; Ritz, L; Volkmar, F

    2000-04-01

    Assessment of autistic disorder (autism) symptoms, primary and secondary, poses more challenging problems than ordinarily found in multisite randomized clinical trial (RCT) assessments. For example, subjects may be uncommunicative and extremely heterogeneous in problem presentation, and current pharmacological treatments are not likely to alter most core features of autism. The Autism Research Units on Pediatric Psychopharmacology (RUPP Autism Network) resolved some of these problems during the design of a risperidone RCT in children/adolescents. The inappropriateness of the usual anchors for a Clinical Global Impression of Severity (CGI-S) was resolved by defining uncomplicated autism without secondary symptoms as a CGI-S of 3, mildly ill. The communication problems, compromising use of the patient as an informant, were addressed by several strategies, including careful questioning of care providers, rating scales, laboratory tests, and physical exams. The broad subject heterogeneity requires outcome measures sensitive to individual change over a wide spectrum of treatment response and side effects. The problems of neuropsychologically testing nonverbal, lower functioning, sometimes noncompliant subjects requires careful instrument selection/adaptation and flexible administration techniques. The problems of assessing low-end IQs, neglected by most standardized test developers, was resolved by an algorithm of test hierarchy. Scarcity of other autism-adapted cognitive and neuropsychological tests and lack of standardization required development of a new, specially adapted battery. Reliability on the Autism Diagnostic Interview (currently the most valid diagnostic instrument) and other clinician instruments required extensive cross-site training (in-person, videotape, and teleconference sessions). Definition of a treatment responder required focus on individually relevant target symptoms, synthesis of possible modest improvements in many domains, and acceptance of

  5. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  6. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  7. Inference in Hidden Markov Models with Explicit State Duration Distributions

    CERN Document Server

    Dewar, Michael; Wood, Frank

    2012-01-01

    In this letter we borrow from the inference techniques developed for unbounded state-cardinality (nonparametric) variants of the HMM and use them to develop a tuning-parameter free, black-box inference procedure for Explicit-state-duration hidden Markov models (EDHMM). EDHMMs are HMMs that have latent states consisting of both discrete state-indicator and discrete state-duration random variables. In contrast to the implicit geometric state duration distribution possessed by the standard HMM, EDHMMs allow the direct parameterisation and estimation of per-state duration distributions. As most duration distributions are defined over the positive integers, truncation or other approximations are usually required to perform EDHMM inference.

  8. Models with hidden regular variation: Generation and detection

    Directory of Open Access Journals (Sweden)

    Bikramjit Das

    2015-12-01

    Full Text Available We review the notions of multivariate regular variation (MRV and hidden regular variation (HRV for distributions of random vectors and then discuss methods for generating models exhibiting both properties concentrating on the non-negative orthant in dimension two. Furthermore we suggest diagnostic techniques that detect these properties in multivariate data and indicate when models exhibiting both MRV and HRV are plausible fits for the data. We illustrate our techniques on simulated data, as well as two real Internet data sets.

  9. In Brief: Hidden environment and health costs of energy

    Science.gov (United States)

    Showstack, Randy

    2009-10-01

    The hidden costs of energy production and use in the United States amounted to an estimated $120 billion in 2005, according to a 19 October report by the U.S. National Research Council. The report, “Hidden Costs of Energy: Unpriced Consequences of Energy Production and Use,” examines hidden costs, including the cost of air pollution damage to human health, which are not reflected in market prices of energy sources, electricity, or gasoline. The report found that in 2005, the total annual external damages from sulfur dioxide, nitrogen oxides, and particulate matter created by coal-burning power plants that produced 95% of the nation's coal-generated electricity were about $62 billion, with nonclimate damages averaging about 3.2 cents for every kilowatt-hour of energy produced. It is estimated that by 2030, nonclimate damages will fall to 1.7 cents per kilowatt-hour. The 2030 figure assumes that new policies already slated for implementation are put in place.

  10. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  11. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  12. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  13. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  14. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  15. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  16. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  17. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  18. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  19. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  20. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  1. Hidden local symmetry and beyond

    Science.gov (United States)

    Yamawaki, Koichi

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here, I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H = SU(2)L × SU(2)R/SU(2)V with additional symmetry, the nonlinearly-realized scale symmetry. Then, the SM does have a dynamical gauge boson of the SU(2)V HLS, "SM ρ meson", in addition to the Higgs as a pseudo-dilaton as well as the NG bosons to be absorbed in to the W and Z. Based on the recent work done with Matsuzaki and Ohki, I discuss a novel possibility that the SM ρ meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "dark SM skyrmion (DSMS)".

  2. Constraining solar hidden photons using HPGe detector

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, R.; Kekez, D., E-mail: Dalibor.Kekez@irb.hr; Krčmar, M.; Krečak, Z.; Ljubičić, A.

    2013-04-25

    In this Letter we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory. With our experimental setup we observe the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, entails both photon into hidden state oscillations and a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in Sun's interior as well as in the detector. We exclude hidden photons with kinetic couplings χ>(2.2×10{sup −13}–3×10{sup −7}) in the mass region 0.2 eV≲m{sub γ{sup ′}}≲30 keV. Our constraints on the mixing parameter χ in the mass region from 20 eV up to 15 keV prove even slightly better then those obtained recently by using data from the CAST experiment, albeit still somewhat weaker than those obtained from solar and HB stars lifetime arguments.

  3. Whose Immigration Story?: Attending to Hidden Messages of Material in Social Studies

    Science.gov (United States)

    Oikonomidoy, Eleni; Williams, Gwendolyn

    2010-01-01

    Sometimes materials used in schools with good intentions can have effects opposite from those stated. Through the microscopic analysis of a parent-student immigration interview assignment on a social studies unit on immigration, this article aims to uncover the hidden story that underlies the questions asked. In so doing, it intends not only to…

  4. For Distinguishing Conjugate Hidden Subgroups, the Pretty Good Measurement is as Good as it Gets

    CERN Document Server

    Moore, Cristopher; Moore, Cristopher; Russell, Alexander

    2005-01-01

    Recently Bacon, Childs and van Dam showed that the ``pretty good measurement'' (PGM) is optimal for the Hidden Subgroup Problem on the dihedral group D_n in the case where the hidden subgroup is chosen uniformly from the n involutions. We show that, for any group and any subgroup H, the PGM is the optimal one-register experiment in the case where the hidden subgroup is a uniformly random conjugate of H. We go on to show that when H forms a Gel'fand pair with its parent group, the PGM is the optimal measurement for any number of registers. In both cases we bound the probability that the optimal measurement succeeds. This generalizes the case of the dihedral group, and includes a number of other examples of interest.

  5. Effectiveness of supporting intensive care units on implementing the guideline 'End-of-life care in the intensive care unit, nursing care': a cluster randomized controlled trial

    NARCIS (Netherlands)

    Noome, M.; Dijkstra, B.M.; Leeuwen, E. van; Vloet, L.C.M.

    2017-01-01

    AIM: The aim of this study was to examine the effectiveness of supporting intensive care units on implementing the guidelines. BACKGROUND: Quality of care can be achieved through evidence-based practice. Guidelines can facilitate evidence-based practice, such as the guidelines 'End-of-life care in t

  6. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  7. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  8. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  9. One-Session Treatment of Specific Phobias in Youth: A Randomized Clinical Trial in the United States and Sweden

    Science.gov (United States)

    Ollendick, Thomas H.; Ost, Lars-Goran; Reuterskiold, Lena; Costa, Natalie; Cederlund, Rio; Sirbu, Cristian; Davis, Thompson E., III; Jarrett, Matthew A.

    2009-01-01

    One hundred and ninety-six youth, ages 7-16, who fulfilled "Diagnostic and Statistical Manual of Mental Disorders" (4th ed.) criteria for various specific phobias were randomized to a one-session exposure treatment, education support treatment, or a wait list control group. After the waiting period, the wait list participants were…

  10. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  11. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  12. The Effect of the Educational Program on Iranian Premature Infants’ Parental Stress in a Neonatal Intensive Care Unit: A Double-Blind Randomized Controlled Trial

    OpenAIRE

    Beheshtipour, Noushin; Baharlu, Seyedeh Marzieh; Montaseri, Sedigheh; Razavinezhad Ardakani, Seyed Mostajab

    2014-01-01

    Background: Hospitalization in neonatal intensive care unit (NICU) leads to a lot of stress and shock to the parents. Nurses, as the primary sources of information, could play an important role in reducing their stress. The aim of this study was to determine the effect of educational program on the premature infants’ parental stress in NICU. Methods: This double-blind randomized controlled trial study with a pre-and post-test and follow up design was conducted from February 2013 to March 2014...

  13. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  14. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  15. Hidden simplicity of gauge theory amplitudes

    Science.gov (United States)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  16. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  17. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  18. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  19. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  20. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  1. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  2. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  3. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  4. Realistic Approach for Phasor Measurement Unit Placement

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Chen, Zhe; Thøgersen, Paul

    2015-01-01

    This paper presents a realistic cost-effectivemodel for optimal placement of phasor measurement units (PMUs) for complete observability of a power system considering practical cost implications. The proposed model considers hidden or otherwise unaccounted practical costs involved in PMU...

  5. Perfectly Secure Oblivious RAM without Random Oracles

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Meldgaard, Sigurd Torkel; Nielsen, Jesper Buus

    2011-01-01

    We present an algorithm for implementing a secure oblivious RAM where the access pattern is perfectly hidden in the information theoretic sense, without assuming that the CPU has access to a random oracle. In addition we prove a lower bound on the amount of randomness needed for implementing...

  6. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  7. Shadow networks: Discovering hidden nodes with models of information flow

    CERN Document Server

    Bagrow, James P; Frank, Morgan R; Manukyan, Narine; Mitchell, Lewis; Reagan, Andrew; Bloedorn, Eric E; Booker, Lashon B; Branting, Luther K; Smith, Michael J; Tivnan, Brian F; Danforth, Christopher M; Dodds, Peter S; Bongard, Joshua C

    2013-01-01

    Complex, dynamic networks underlie many systems, and understanding these networks is the concern of a great span of important scientific and engineering problems. Quantitative description is crucial for this understanding yet, due to a range of measurement problems, many real network datasets are incomplete. Here we explore how accidentally missing or deliberately hidden nodes may be detected in networks by the effect of their absence on predictions of the speed with which information flows through the network. We use Symbolic Regression (SR) to learn models relating information flow to network topology. These models show localized, systematic, and non-random discrepancies when applied to test networks with intentionally masked nodes, demonstrating the ability to detect the presence of missing nodes and where in the network those nodes are likely to reside.

  8. Statistical patterns of visual search for hidden objects

    Science.gov (United States)

    Credidio, Heitor F.; Teixeira, Elisângela N.; Reis, Saulo D. S.; Moreira, André A.; Andrade, José S., Jr.

    2012-12-01

    The movement of the eyes has been the subject of intensive research as a way to elucidate inner mechanisms of cognitive processes. A cognitive task that is rather frequent in our daily life is the visual search for hidden objects. Here we investigate through eye-tracking experiments the statistical properties associated with the search of target images embedded in a landscape of distractors. Specifically, our results show that the twofold process of eye movement, composed of sequences of fixations (small steps) intercalated by saccades (longer jumps), displays characteristic statistical signatures. While the saccadic jumps follow a log-normal distribution of distances, which is typical of multiplicative processes, the lengths of the smaller steps in the fixation trajectories are consistent with a power-law distribution. Moreover, the present analysis reveals a clear transition between a directional serial search to an isotropic random movement as the difficulty level of the searching task is increased.

  9. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  10. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements

  11. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  12. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  13. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  14. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  15. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  16. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  17. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  18. Prediction of protein binding sites in protein structures using hidden Markov support vector machine

    Directory of Open Access Journals (Sweden)

    Lin Lei

    2009-11-01

    Full Text Available Abstract Background Predicting the binding sites between two interacting proteins provides important clues to the function of a protein. Recent research on protein binding site prediction has been mainly based on widely known machine learning techniques, such as artificial neural networks, support vector machines, conditional random field, etc. However, the prediction performance is still too low to be used in practice. It is necessary to explore new algorithms, theories and features to further improve the performance. Results In this study, we introduce a novel machine learning model hidden Markov support vector machine for protein binding site prediction. The model treats the protein binding site prediction as a sequential labelling task based on the maximum margin criterion. Common features derived from protein sequences and structures, including protein sequence profile and residue accessible surface area, are used to train hidden Markov support vector machine. When tested on six data sets, the method based on hidden Markov support vector machine shows better performance than some state-of-the-art methods, including artificial neural networks, support vector machines and conditional random field. Furthermore, its running time is several orders of magnitude shorter than that of the compared methods. Conclusion The improved prediction performance and computational efficiency of the method based on hidden Markov support vector machine can be attributed to the following three factors. Firstly, the relation between labels of neighbouring residues is useful for protein binding site prediction. Secondly, the kernel trick is very advantageous to this field. Thirdly, the complexity of the training step for hidden Markov support vector machine is linear with the number of training samples by using the cutting-plane algorithm.

  19. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  20. Hidden colonic adenomas in a patient with a family history of polyposis.

    Science.gov (United States)

    Petros, J G; Chong, F K

    1992-12-01

    We describe an asymptomatic patient with a strong family history of polyposis who was found to have flat and depressed adenomas that were not visible on colonoscopy. The diagnosis required assessment of multiple, randomly obtained biopsy specimens. Partial deflation of the colon during colonoscopy may allow hidden lesions to be seen. Biopsies should be performed in all patients with a family history of polyposis who are examined colonoscopically, even if they are asymptomatic and no lesions are visible through the colonoscope.

  1. Effect of graded early mobilization versus routine physiotherapy on the length of intensive care unit stay in mechanically ventilated patients: A randomized controlled study

    Directory of Open Access Journals (Sweden)

    Priyakshi Bezbaruah

    2012-01-01

    Full Text Available Background: Early mobilization is an important component of physiotherapy used to prevent and decrease pulmonary and immobilization complications, which are the major goals of physiotherapy in the intensive care unit (ICU. Prolonged bed rest and hospitalization leads to deconditioning and weakness which can further increase the length of the ICU stay. This study was conducted to find an answer to whether early mobilization is as effective as or better than routine physiotherapy in reducing the length of ICU stay in mechanically ventilated patients. Study Design: Randomized controlled study. Study Setting: Medical ICU, Father Muller Medical College Hospital. Mangalore, Karnataka, India. Aim: To detect the effectiveness of graded early mobilization and routine physiotherapy and to compare these techniques with respect to the length of ICU stay in mechanically ventilated patients. Materials and Methods: Fifteen subjects of both gender who were on mechanical ventilators fulfilling the inclusion criteria were randomly assigned to two groups, group 1 (graded early mobilization, n = 8 and Group 2 (routine physiotherapy, n = 7 by using the randomization plan from the website www.randomization.com. All the vitals of the subjects were noted as they were made to perform particular maneuvers depending on the group they belonged to. Participants recruited into the early mobilization group were mobilized as soon as their vitals were stable and were able to participate in the therapy. The patients who underwent routine physiotherapy were mobilized once they were extubated. At the time of discharge from the ICU, days of weaning, days first out of bed, and length of ICU stay were noted. Results: A significant difference was observed between early mobilization and routine physiotherapy groups with respect to the length of ICU stay. Conclusion: Early mobilization showed better outcome compared to routine physiotherapy in reducing the length of ICU stay in

  2. Intermittent versus continuous renal replacement therapy for acute kidney injury patients admitted to the intensive care unit: results of a randomized clinical trial.

    Science.gov (United States)

    Lins, Robert L; Elseviers, Monique M; Van der Niepen, Patricia; Hoste, Eric; Malbrain, Manu L; Damas, Pierre; Devriendt, Jacques

    2009-02-01

    There is uncertainty on the effect of different dialysis modalities for the treatment of patients with acute kidney injury (AKI), admitted to the intensive care unit (ICU). This controlled clinical trial performed in the framework of the multicentre SHARF 4 study (Stuivenberg Hospital Acute Renal Failure) aimed to investigate the outcome in patients with AKI, stratified according to severity of disease and randomized to different treatment options. This was a multicentre prospective randomized controlled trial with stratification according to severity of disease expressed by the SHARF score. ICU patients were eligible for inclusion when serum creatinine was >2 mg/dL, and RRT was initiated. The selected patients were randomized to intermittent (IRRT) or continuous renal replacement therapy (CRRT). A total of 316 AKI patients were randomly assigned to IRRT (n = 144) or CRRT (n = 172). The mean age was 66 (range 18-96); 59% were male. Intention-to-treat analysis revealed a mortality of 62.5% in IRRT compared to 58.1% in CRRT (P = 0.430). No difference between IRRT and CRRT could be observed in the duration of ICU stay or hospital stay. In survivors, renal recovery at hospital discharge was comparable between both groups. Multivariate analysis, including the SHARF score, APACHE II and SOFA scores for correction of disease severity, showed no difference in mortality between both treatment modalities. This result was confirmed in pre-specified subgroup analysis (elderly, patients with sepsis, heart failure, ventilation) and after exclusion of possible confounders (early mortality, delayed ICU admission). Modality of RRT, either CRRT or IRRT, had no impact on the outcome in ICU patients with AKI. Both modalities need to be considered as complementary in the treatment of AKI (Clinical Trial: SHARF 4, NCT00322933, http://ClinicalTrials.gov).

  3. Testing for the presence and source of nonstationarity in United States energy efficiency: Time trends, hysteresis or random walk?

    Science.gov (United States)

    McArdle, Paul Francis

    This research tests for the presence and source of non-stationarity in U.S. aggregate energy efficiency for the 1900-1991 period. An outlier/intervention model is used to test for the presence of a unit-root in aggregate energy efficiency against the alternative hypothesis of a segmented/broken trend. A decomposed energy price model is also used to test if hysteresis in energy efficiency results from an asymmetrical response to energy price changes. The analysis revealed four distinct stages in aggregate energy efficiency during the 20th century: (1) the 1900-1920 period characterized by highly volatile decreases in energy efficiency caused by rapid industrialization and transition to a fossil-fueled economy; (2) the 1920-1949 period distinguished by a persistent increase in energy efficiency as the economy became adept at harnessing fossil energy; (3) the 1949-1972 period when energy efficiency remained stable within a narrow range; and (4) the 1973-1991 period when energy efficiency improved dramatically in response to the two oil prices shocks of the 1970s. Key modeling results include the following: (1) energy efficiency follows a unit-root process even when the effects of intervention outliers are taken into consideration, indicating that the unit-root hypothesis cannot be rejected against an alternative of a segmented/broken trend; (2) a major source of non-stationarity in energy efficiency is hysteresis induced by non-reverting changes in energy efficiency, in turn caused by dramatic increases in energy prices; and (3) although a strong negative trend appears to have occurred in aggregate energy intensity since 1920, it seems to be the result of energy price increases, rather than a general downward trend. An important economic implication of the analysis is that energy price increases appear to impact energy efficiency, while energy price decreases appear to have much less effect. This finding is consistent with much of the economic literature in this area

  4. One-session treatment of specific phobias in youth: a randomized clinical trial in the United States and Sweden.

    Science.gov (United States)

    Ollendick, Thomas H; Ost, Lars-Göran; Reuterskiöld, Lena; Costa, Natalie; Cederlund, Rio; Sirbu, Cristian; Davis, Thompson E; Jarrett, Matthew A

    2009-06-01

    One hundred and ninety-six youth, ages 7-16, who fulfilled Diagnostic and Statistical Manual of Mental Disorders (4th ed.) criteria for various specific phobias were randomized to a one-session exposure treatment, education support treatment, or a wait list control group. After the waiting period, the wait list participants were offered treatment and, if interested, rerandomized to 1 of the 2 active treatments. The phobias were assessed with semistructured diagnostic interviews, clinician severity ratings, and behavioral avoidance tests, whereas fears, general anxiety, depression, and behavior problems were assessed with self- and parent report measures. Assessments were completed pretreatment, posttreatment, and at 6 months following treatment. Results showed that both treatment conditions were superior to the wait list control condition and that 1-session exposure treatment was superior to education support treatment on clinician ratings of phobic severity, percentage of participants who were diagnosis free, child ratings of anxiety during the behavioral avoidance test, and treatment satisfaction as reported by the youth and their parents. There were no differences on self-report measures. Treatment effects were maintained at follow-up. Implications of these findings are discussed.

  5. Ultrasound Versus the Landmark Technique: A Prospective Randomized Comparative Study of Internal Jugular Vein Cannulation in an Intensive Care Unit

    Directory of Open Access Journals (Sweden)

    B R Shrestha

    2011-06-01

    Full Text Available OBJECTIVE: The aim of this study is to find out if an ultrasound technique has advantages over the conventional landmark technique. METHODS: This is a prospective randomized comparative study on 120 patients requiring central venous cannulation of the right internal jugular vein. The study comprised of two groups: ultrasound and landmark groups, each consisting of 60 patients. The outcome measures were compared between the groups. RESULTS: Cannulation of the internal jugular vein was successful in 58 patients in the ultrasound group and in 53 in the landmark group. The number of attempts was 1.5 (1 - 3 and 2 (1 - 3 in the ultrasound and landmark group respectively (p = 0.001. The time taken for the successful cannulation was 4.9 +/- 1.7 minutes in the ultrasound approach and 8.0 +/- 2.8 minutes in the landmark approach (p = 0.00. The internal jugular vein diameter in the supine position was 11.2 +/- 1.5 mm which increased to 15.04 +/- 1.5 mm with a 15 degrees head-down position in the USG group (p = 0.001. The first attempt success rate was 39/60 (63% in the ultrasound group and 19/60 (32% with the landmark technique. The seven (12% failure cases in the landmark group were rescued by the ultrasound technique. Inadvertent carotid artery puncture occurred in 2/60 (3% and 6/60 (10% of patients in the ultrasound and land mark group respectively. CONCLUSIONS: Ultrasound improves success rate, minimizes cannulation time and complications during internal jugular vein cannulation. It can be employed as a rescue technique in cases of a failed landmark technique. Keywords:cannulation, central, landmark, technique, ultrasound.

  6. Minority participation in a school-based randomized clinical trial of tooth decay prevention in the United States.

    Science.gov (United States)

    Nelson, Suchitra; Milgrom, Peter

    2012-01-01

    To describe the strategies-based on the social triad concept of a partnership of researchers, school personnel and community-employed to recruit low-income, minority parent/caregivers of kindergarten children into a school-based tooth decay prevention trial in the United States. The study site was an urban school district with five elementary schools. Recruitment was carried out once each year for three years. Recruitment involved strategies at the school district, school, classroom, and student-parent level. A coalition of researchers, school personnel and community individuals was established for communication and recruitment. Outreach workers from the community were hired to promote, recruit, and disseminate oral health information. Study promotion included both print materials (logos, flyers, pictorial story boards) and presentations at school and community events. The School District Superintendent and administrators approved the study, and all five school principals and kindergarten teachers participated. All children within the classrooms were eligible: the overall participation rate of was 86% (580/672). Community outreach workers actively facilitated the recruitment and participants were recruited at open house for parent-teacher meeting (37% of all participants), sending letters and consent forms home (31%), at a prearranged convenient time during drop off and pick up of the child at their respective schools (30%), curriculum nights and health fairs (2%). Utilizing the social triad concept led to success in planning and carrying out the recruitment of predominantly minority school children with high participation rates. Copyright © 2011 Elsevier Inc. All rights reserved.

  7. Chain folding controlled by an isomeric repeat unit: helix formation versus random aggregation in acetylene-bridged carbazole-bipyridine co-oligomers.

    Science.gov (United States)

    Divya, Kizhmuri P; Sreejith, Sivaramapanicker; Suresh, Cherumuttathu H; Philips, Divya S; Ajayaghosh, Ayyappanpillai

    2013-07-01

    An unprecedented, positional effect of the isomeric repeat unit on chain folding in donor–acceptor-linked oligomers, which contain alternating bipyridine and carbazole moieties that are connected through an acetylinic linkage, is reported. 4,4′-Linked oligomer 1 adopts an intrachain helical conformation (CD-active) in CHCl3/MeCN (20:80 v/v), whereas oligomer 2, which contains an isomeric 6,6′-linkage, forms interchain randomly coiled aggregates (CD-inactive). The substitution position plays a significant role in controlling the variations in electronic effects and dipole moments around the bipyridyl moiety, which are responsible for this observed phenomenon. Two model compounds of oligomers 1 and 2 (3 and 4, respectively) were prepared and their properties were compared. A systematic investigation of the photophysical and CD properties of these structures, as well as theoretical studies, support our conclusions.

  8. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  9. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  10. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  11. Comparison of Metal-Ceramic and All-Ceramic Three-Unit Posterior Fixed Dental Prostheses: A 3-Year Randomized Clinical Trial.

    Science.gov (United States)

    Nicolaisen, Maj H; Bahrami, Golnosh; Schropp, Lars; Isidor, Flemming

    2016-01-01

    The aim of this randomized clinical study was to compare the 3-year clinical outcome of metal-ceramic fixed dental prostheses (MC-FDPs) and zirconia all-ceramic fixed dental prostheses (AC-FDPs) replacing a posterior tooth. A sample of 34 patients with a missing posterior tooth were randomly chosen to receive either a MC-FDP (n = 17) or an AC-FDP (n = 17). The FDPs were evaluated at baseline and yearly until 3 years after cementation. They were assessed using the California Dental Association assessment system. Periodontal parameters were measured at the abutment teeth, and the contralateral teeth served as control. The statistical unit was the FDP/patient. The survival rates for MC-FDPs and AC-FDPs were 100%. The success rate was 76% and 71% for MC-FDPs and AC-FDPs, respectively. Three technical complications were observed in the MC-FDP group and five in the AC-FDP group, all chipping fractures of the ceramic veneer. Furthermore, one biologic complication in the MC-FDP group (an apical lesion) was observed. No framework fractures occurred. All patients had optimal oral hygiene and showed no bleeding on periodontal probing at any of the recalls. Only minor changes in the periodontal parameters were observed during the 3 years of observation. Three-unit posterior MC-FDPs and AC-FDPs showed similar high survival rates and acceptable success rates after 3 years of function, and ceramic veneer chipping fracture was the most frequent complication for both types of restorations.

  12. Single-hidden-layer feed-forward quantum neural network based on Grover learning.

    Science.gov (United States)

    Liu, Cheng-Yi; Chen, Chein; Chang, Ching-Ter; Shih, Lun-Min

    2013-09-01

    In this paper, a novel single-hidden-layer feed-forward quantum neural network model is proposed based on some concepts and principles in the quantum theory. By combining the quantum mechanism with the feed-forward neural network, we defined quantum hidden neurons and connected quantum weights, and used them as the fundamental information processing unit in a single-hidden-layer feed-forward neural network. The quantum neurons make a wide range of nonlinear functions serve as the activation functions in the hidden layer of the network, and the Grover searching algorithm outstands the optimal parameter setting iteratively and thus makes very efficient neural network learning possible. The quantum neuron and weights, along with a Grover searching algorithm based learning, result in a novel and efficient neural network characteristic of reduced network, high efficient training and prospect application in future. Some simulations are taken to investigate the performance of the proposed quantum network and the result show that it can achieve accurate learning.

  13. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  14. Finite State Transducers Approximating Hidden Markov Models

    CERN Document Server

    Kempe, A

    1999-01-01

    This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is especially advantageous for part-of-speech tagging because the resulting transducer can be composed with other transducers that encode correction rules for the most frequent tagging errors. The speed of tagging is also improved. The described methods have been implemented and successfully tested on six languages.

  15. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  16. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  17. Killing and letting die: hidden value assumptions.

    Science.gov (United States)

    Atkinson, G

    1983-01-01

    In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.

  18. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  19. Effects of music therapy on drug avoidance self-efficacy in patients on a detoxification unit: a three-group randomized effectiveness study.

    Science.gov (United States)

    Silverman, Michael J

    2014-01-01

    Self-efficacy is a component of Bandura's social cognitive theory and can lead to abstinence and a reduction of relapse potential for people who have substance abuse disorders. To date, no music therapy researcher has utilized this theoretical model to address abstinence and reduce the likelihood of relapse in people who have addictions. The purpose of this study was to determine the effects of music therapy on drug avoidance self-efficacy in a randomized three-group wait-list control design with patients on a detoxification unit. Participants (N = 131) were cluster randomized to one of three single-session conditions: music therapy, verbal therapy, or wait-list control. Music therapy participants received a group lyric analysis intervention, verbal therapy participants received a group talk therapy session, and wait-list control participants eventually received a group recreational music therapy intervention. Although there was no significant between-group difference in drug avoidance self-efficacy, participants in the music therapy condition tended to have the highest mean drug avoidance self-efficacy scores. Posttest written comments supported the use of both music therapy and verbal therapy sessions. Two music therapy participants specifically noted that their initial skepticism had dissipated after receiving music therapy. Despite a lack of significant differences, the theoretical support of self-efficacy for substance abuse rehabilitation suggests that this may be an area of continued clinical focus and empirical investigation. Clinical anecdotes, limitations of the study, and suggestions for future research are provided.

  20. Effects of Live and Educational Music Therapy on Working Alliance and Trust With Patients on Detoxification Unit: A Four-Group Cluster-Randomized Trial.

    Science.gov (United States)

    Silverman, Michael J

    2016-11-09

    Lyric analysis is a commonly utilized music therapy intervention for clients in substance abuse rehabilitation wherein participants interpret song lyrics related to their clinical objectives. For these patients, working alliance and trust in the therapist represent consequential factors that may influence outcomes. However, there is a lack of randomized controlled music therapy studies investigating working alliance and trust in the therapist within lyric analysis interventions for patients with addictions. The purpose of this study was to quantitatively differentiate live versus recorded and educational versus recreational music therapy interventions via measures of working alliance and trust with patients on a detoxification unit. Participants (N = 130) were cluster randomized in a single-session posttest-only design to one of four conditions: Live educational music therapy, recorded educational music therapy, education without music, or recreational music therapy. Dependent measures included working alliance and trust in the therapist. Educational music therapy interventions were scripted lyric analyses. There was no statistically significant between-group difference in any of the measures. Although not significant, a greater number of patients and research participants attended live educational music therapy sessions. Between-group descriptive data were consistently similar but attendance trends may have implications for engaging patients and billing. Implications for clinical practice, limitations of the study, and suggestions for future research are provided.

  1. An innovative telemedicine knowledge translation program to improve quality of care in intensive care units: protocol for a cluster randomized pragmatic trial

    Directory of Open Access Journals (Sweden)

    Pinto Ruxandra

    2009-02-01

    Full Text Available Abstract Background There are challenges to timely adoption of, and ongoing adherence to, evidence-based practices known to improve patient care in the intensive care unit (ICU. Quality improvement initiatives using a collaborative network approach may increase the use of such practices. Our objective is to evaluate the effectiveness of a novel knowledge translation program for increasing the proportion of patients who appropriately receive the following six evidence-based care practices: venous thromboembolism prophylaxis; ventilator-associated pneumonia prevention; spontaneous breathing trials; catheter-related bloodstream infection prevention; decubitus ulcer prevention; and early enteral nutrition. Methods and design We will conduct a pragmatic cluster randomized active control trial in 15 community ICUs and one academic ICU in Ontario, Canada. The intervention is a multifaceted videoconferenced educational and problem-solving forum to organize knowledge translation strategies, including comparative audit and feedback, educational sessions from content experts, and dissemination of algorithms. Fifteen individual ICUs (clusters will be randomized to receive quality improvement interventions targeting one of the best practices during each of six study phases. Each phase lasts four months during the first study year and three months during the second. At the end of each study phase, ICUs are assigned to an intervention for a best practice not yet received according to a random schedule. The primary analysis will use patient-level process-of-care data to measure the intervention's effect on rates of adoption and adherence of each best practice in the targeted ICU clusters versus controls. Discussion This study design evaluates a new system for knowledge translation and quality improvement across six common ICU problems. All participating ICUs receive quality improvement initiatives during every study phase, improving buy-in. This study design

  2. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  3. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  4. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  5. Effect of Hydroxyapatite Nanoparticles on the Degradability of Random Poly(butylene terephthalate-co-aliphatic dicarboxylates Having a High Content of Terephthalic Units

    Directory of Open Access Journals (Sweden)

    Nina Heidarzadeh

    2016-07-01

    Full Text Available Copolyesters derived from 1,4-butanediol and constituted also of aliphatic and aromatic dicarboxylate units in a molar ratio of 3:7 were synthesized by a two-step polycondensation procedure. Succinic, adipic, and sebacic acids were specifically selected as the aliphatic component whereas terephthalic acid was chosen as the aromatic moiety. The second synthesis step was a thermal transesterification between the corresponding homopolymers, always attaining a random distribution as verified by NMR spectroscopy. Hybrid polymer composites containing 2.5 wt % of hydroxyapatite (HAp were also prepared by in situ polymerization. Hydroxyl groups on the nanoparticle surface allowed the grafting of polymer chains in such a way that composites were mostly insoluble in the typical solvents of the parent copolyesters. HAp had some influence on crystallization from the melt, thermal stability, and mechanical properties. HAp also improved the biocompatibility of samples due to the presence of Ca2+ cations and the damping effect of phosphate groups. Interestingly, HAp resulted in a significant increase in the hydrophilicity of samples, which considerably affected both enzymatic and hydrolytic degradability. Slight differences were also found in the function of the dicarboxylic component, as the lowest degradation rates was found for the sample constituted of the most hydrophobic sebacic acid units.

  6. A simple device unit consisting of all NiO storage and switch elements for multilevel terabit nonvolatile random access memory.

    Science.gov (United States)

    Lee, Myoung-Jae; Ahn, Seung-Eon; Lee, Chang Bum; Kim, Chang-Jung; Jeon, Sanghun; Chung, U-In; Yoo, In-Kyeong; Park, Gyeong-Su; Han, Seungwu; Hwang, In Rok; Park, Bae-Ho

    2011-11-01

    Present charge-based silicon memories are unlikely to reach terabit densities because of scaling limits. As the feature size of memory shrinks to just tens of nanometers, there is insufficient volume available to store charge. Also, process temperatures higher than 800 °C make silicon incompatible with three-dimensional (3D) stacking structures. Here we present a device unit consisting of all NiO storage and switch elements for multilevel terabit nonvolatile random access memory using resistance switching. It is demonstrated that NiO films are scalable to around 30 nm and compatible with multilevel cell technology. The device unit can be a building block for 3D stacking structure because of its simple structure and constituent, high performance, and process temperature lower than 300 °C. Memory resistance switching of NiO storage element is accompanied by an increase in density of grain boundary while threshold resistance switching of NiO switch element is controlled by current flowing through NiO film.

  7. Occupational therapy for delirium management in elderly patients without mechanical ventilation in an intensive care unit: A pilot randomized clinical trial.

    Science.gov (United States)

    Álvarez, Evelyn A; Garrido, Maricel A; Tobar, Eduardo A; Prieto, Stephanie A; Vergara, Sebastian O; Briceño, Constanza D; González, Francisco J

    2017-02-01

    Delirium has negative consequences such as increased mortality, hospital expenses and decreased cognitive and functional status. This research aims to determine the impact of occupational therapy intervention in duration, incidence and severity of delirium in elderly patients in the intensive care unit; secondary outcome was to assess functionality at hospital discharge. This is a pilot randomized clinical trial of patients without mechanical ventilation for 60 years. Patients were assigned to a control group that received standard strategies of prevention (n=70) or to an experimental group that received standard strategies plus occupational therapy twice a day for 5 days (n=70). Delirium was valued with Confusion Assessment Method and Delirium Rating Scale, and functional outcomes at discharge with Functional Independence Measure, Hand Dynamometer, and Mini-Mental State Examination. A total of 140 participants were recruited. The experimental group had lower duration (risk incidence ratios, 0.15 [P=.000; 95% confidence interval, 0.12-0.19] vs 6.6 [P=.000, 95% confidence interval, 5.23-8.3]) and incidence of delirium (3% vs 20%, P=.001), and had higher scores in Motor Functional Independence Measure (59 vs 40 points, POccupational therapy is effective in decreasing duration and incidence of delirium in nonventilated elderly patients in the intensive care unit and improved functionality at discharge. Copyright © 2016 Elsevier Inc. All rights reserved.

  8. A randomized comparison of hemoglobin content-based versus standard (unit-based) red blood cell transfusion policy.

    Science.gov (United States)

    Atilla, Erden; Toprak, Selami Koçak; Civriz Bozdağ, Sinem; Topçuoğlu, Pervin; Arslan, Önder

    2015-02-20

    Amaç: Eritrosit süspansiyonu (ES) ünitelerinin hacimleri standart kriterlerle belirlenmişse de hemoglobin (Hb) içerikleri farklıdır. Halen klinik rutin transfüzyon uygulamaları, eritrosit süspansiyonlarının ünite sayısına dayanmaktadır. Biz bu çalışma ile iki yöntemin etkinliklerini karşılaştırmayı amaçladık. Materyal ve Metod: Ortanca yaşı 46 (19-75) olan 89 hastaya (55 erkek; 34 kadın) 178 transfüzyon epizodu; 92’ si çalışma, 86’ sı kontrol kolun olarak randomize edildi. 51 hasta 1, 38 hasta ≥2 epizotta değerlendirildi (ortanca 3; 1-7). Hesaplamalar kan bankalarımızda kullanılan, Hemosoft İşletim Sistemi’yle yapıldı. Çalışma kolunda alıcı; boy, güncel kilo, güncel ve hedef Hb verileri ile gerekli Hb miktarı hesaplandı. Uygun ünite bulunamayanlarda (başarısız) ve kontrol kolunda istenen sayıda ES ünitesi gönderildi. Bulgular: Çalışma kolunda 38 epizotta ES ünitesi isteme göre %19.8 olarak azaldı. Uygun Hb içeriğinde ünite bulma başarısı; düşük kilolu, kısa boylu hastalarda ve ES stok sayısı fazla olduğunda; daha yüksek bulundu. Hedeflenen Hb değerine ulaşma oranları; çalışma ve kontrol kolunda (p=0,1), başarılı ve başarısız gruplarda (p=0,3), kontrol kolu ve başarısız grupta (p= 0,4); istatistiksel olarak benzer bulundu. Ünite Hb içeriği ve hedef Hb’e ulaşma ilişkisinin, anlamlı olduğu gösterildi (p=0,01). Raf ömrü ve hedef Hb’e ulaşma ilişkisi anlamsızdı (p=0,7). Sonuç: Hb içeriğine dayalı ve ünite sayısına dayalı ES transfüzyonlarının, etkinliklerinin benzerdir ve Hb içeriğine dayalı transfüzyon ile ünite sayısı azaltılabilir.

  9. A Fast SVD-Hidden-nodes based Extreme Learning Machine for Large-Scale Data Analytics.

    Science.gov (United States)

    Deng, Wan-Yu; Bai, Zuo; Huang, Guang-Bin; Zheng, Qing-Hua

    2016-05-01

    Big dimensional data is a growing trend that is emerging in many real world contexts, extending from web mining, gene expression analysis, protein-protein interaction to high-frequency financial data. Nowadays, there is a growing consensus that the increasing dimensionality poses impeding effects on the performances of classifiers, which is termed as the "peaking phenomenon" in the field of machine intelligence. To address the issue, dimensionality reduction is commonly employed as a preprocessing step on the Big dimensional data before building the classifiers. In this paper, we propose an Extreme Learning Machine (ELM) approach for large-scale data analytic. In contrast to existing approaches, we embed hidden nodes that are designed using singular value decomposition (SVD) into the classical ELM. These SVD nodes in the hidden layer are shown to capture the underlying characteristics of the Big dimensional data well, exhibiting excellent generalization performances. The drawback of using SVD on the entire dataset, however, is the high computational complexity involved. To address this, a fast divide and conquer approximation scheme is introduced to maintain computational tractability on high volume data. The resultant algorithm proposed is labeled here as Fast Singular Value Decomposition-Hidden-nodes based Extreme Learning Machine or FSVD-H-ELM in short. In FSVD-H-ELM, instead of identifying the SVD hidden nodes directly from the entire dataset, SVD hidden nodes are derived from multiple random subsets of data sampled from the original dataset. Comprehensive experiments and comparisons are conducted to assess the FSVD-H-ELM against other state-of-the-art algorithms. The results obtained demonstrated the superior generalization performance and efficiency of the FSVD-H-ELM. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. The hidden X suture: a technical note on a novel suture technique for alveolar ridge preservation

    Science.gov (United States)

    2016-01-01

    Purpose The present study investigated the impact of 2 different suture techniques, the conventional crossed mattress suture (X suture) and the novel hidden X suture, for alveolar ridge preservation (ARP) with an open healing approach. Methods This study was a prospective randomized controlled clinical trial. Fourteen patients requiring extraction of the maxillary or mandibular posterior teeth were enrolled and allocated into 2 groups. After extraction, demineralized bovine bone matrix mixed with 10% collagen (DBBM-C) was grafted and the socket was covered by porcine collagen membrane in a double-layer fashion. No attempt to obtain primary closure was made. The hidden X suture and conventional X suture techniques were performed in the test and control groups, respectively. Cone-beam computed tomographic (CBCT) images were taken immediately after the graft procedure and before implant surgery 4 months later. Additionally, the change in the mucogingival junction (MGJ) position was measured and was compared after extraction, after suturing, and 4 months after the operation. Results All sites healed without any complications. Clinical evaluations showed that the MGJ line shifted to the lingual side immediately after the application of the X suture by 1.56±0.90 mm in the control group, while the application of the hidden X suture rather pushed the MGJ line slightly to the buccal side by 0.25±0.66 mm. It was demonstrated that the amount of keratinized tissue (KT) preserved on the buccal side was significantly greater in the hidden X suture group 4 months after the procedure (Pclinical and radiographic verification of the efficacy of the hidden X suture in preserving the width of KT and the dimensions of the alveolar ridge after ARP. PMID:28050319

  11. Inferring hidden states in Langevin dynamics on large networks: Average case performance

    Science.gov (United States)

    Bravi, B.; Opper, M.; Sollich, P.

    2017-01-01

    We present average performance results for dynamical inference problems in large networks, where a set of nodes is hidden while the time trajectories of the others are observed. Examples of this scenario can occur in signal transduction and gene regulation networks. We focus on the linear stochastic dynamics of continuous variables interacting via random Gaussian couplings of generic symmetry. We analyze the inference error, given by the variance of the posterior distribution over hidden paths, in the thermodynamic limit and as a function of the system parameters and the ratio α between the number of hidden and observed nodes. By applying Kalman filter recursions we find that the posterior dynamics is governed by an "effective" drift that incorporates the effect of the observations. We present two approaches for characterizing the posterior variance that allow us to tackle, respectively, equilibrium and nonequilibrium dynamics. The first appeals to Random Matrix Theory and reveals average spectral properties of the inference error and typical posterior relaxation times; the second is based on dynamical functionals and yields the inference error as the solution of an algebraic equation.

  12. Randomised intervention study to assess the prevalence of subclinical vascular disease and hidden kidney disease and its impact on morbidity and mortality: The ILERVAS project.

    Science.gov (United States)

    Betriu, Àngels; Farràs, Cristina; Abajo, María; Martinez-Alonso, Montserrat; Arroyo, David; Barbé, Ferran; Buti, Miquel; Lecube, Albert; Portero, Manuel; Purroy, Francisco; Torres, Gerard; Valdivielso, José Manuel; Fernández, Elvira

    2016-01-01

    Chronic kidney disease (CKD) and atherosclerosis are 2 interrelated diseases that increase the risk of cardiovascular morbidity and mortality. The objectives of the ILERVAS project are: 1) to determine the prevalence of subclinical arterial disease and hidden kidney disease; 2) to assess the impact of early diagnosis of both diseases on cardiovascular morbidity and mortality and also on the progression of CKD; 3) to have a platform of data and biological samples. Randomized intervention study. From 2015 to 2017, 19,800 people (9,900 in the intervention group and 9,900 in the control group) aged between 45 and 70 years without previous history of cardiovascular disease and with at least one cardiovascular risk factor will be randomly selected from the primary health care centres across the province of Lérida. A team of experts will travel around in a mobile unit to carry out the following baseline tests on the intervention group: Artery ultrasound; (carotid, femoral, transcranial and abdominal aorta); ankle-brachial index; spirometry; determination of advanced glycation end products; dried blood spot and urine spot tests. Additionally, blood and urine samples will be collected and stored in the biobank to identify new biomarkers using omics studies. Participants will be followed up until 2025 for identification of cardiovascular events, treatment changes and changes in lifestyle. The ILERVAS project will reveal the prevalence of subclinical vascular disease and hidden kidney disease, determine whether or not their early diagnosis brings health benefits and will also allow investigation of new risk factors. Copyright © 2016 Sociedad Española de Nefrología. Published by Elsevier España, S.L.U. All rights reserved.

  13. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  14. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  15. A Hidden Markov Movement Model for rapidly identifying behavioral states from animal tracks

    DEFF Research Database (Denmark)

    Whoriskey, Kim; Auger-Méthé, Marie; Albertsen, Christoffer Moesgaard

    2017-01-01

    1. Electronic telemetry is frequently used to document animal movement through time. Methods that can identify underlying behaviors driving specific movement patterns can help us understand how and why animals use available space, thereby aiding conservation and management efforts. For aquatic....... 2. We developed a new Hidden Markov Model (HMM) for identifying behavioral states from animal tracks with negligible error, which we called the Hidden Markov Movement Model (HMMM). We implemented as the basis for the HMMM the process equation of the DCRWS, but we used the method of maximum...... animal tracking data with significant measurement error, a Bayesian state-space model called the first-Difference Correlated Random Walk with Switching (DCRWS) has often been used for this purpose. However, for aquatic animals, highly accurate tracking data of animal movement are now becoming more common...

  16. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  17. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  18. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  19. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  20. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  1. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  2. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  3. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  4. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  5. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  6. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  7. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  8. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  9. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  10. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  11. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  12. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  13. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  14. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  15. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  16. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  17. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  18. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  19. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  20. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  1. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  2. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  3. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  4. Comparison of oral psoralen-UV-A with a portable tanning unit at home vs hospital-administered bath psoralen-UV-A in patients with chronic hand eczema - An open-label randomized controlled trial of efficacy

    NARCIS (Netherlands)

    van Coevorden, AM; Kamphof, WG; van Sonderen, E; Bruynzeel, DP; Coenraads, PJ

    2004-01-01

    Objective: To study whether oral psoralen-UV-A (PUVA) with a portable tanning unit at home is as effective as hospital-administered bath PUVA in patients with chronic hand eczema. Design: Open-label randomized controlled trial, with a 10-week treatment period and an 8-week follow-up period. Setting:

  5. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  6. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  7. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  8. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  9. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  10. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  11. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  12. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  13. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  14. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  15. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  16. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  17. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  18. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  19. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  20. Wavelet-based SAR images despeckling using joint hidden Markov model

    Science.gov (United States)

    Li, Qiaoliang; Wang, Guoyou; Liu, Jianguo; Chen, Shaobo

    2007-11-01

    In the past few years, wavelet-domain hidden Markov models have proven to be useful tools for statistical signal and image processing. The hidden Markov tree (HMT) model captures the key features of the joint probability density of the wavelet coefficients of real-world data. One potential drawback to the HMT framework is the deficiency for taking account of intrascale correlations that exist among neighboring wavelet coefficients. In this paper, we propose to develop a joint hidden Markov model by fusing the wavelet Bayesian denoising technique with an image regularization procedure based on HMT and Markov random field (MRF). The Expectation Maximization algorithm is used to estimate hyperparameters and specify the mixture model. The noise-free wavelet coefficients are finally estimated by a shrinkage function based on local weighted averaging of the Bayesian estimator. It is shown that the joint method outperforms lee filter and standard HMT techniques in terms of the integrative measure of the equivalent number of looks (ENL) and Pratt's figure of merit(FOM), especially when dealing with speckle noise in large variance.

  1. Chloroatranol, an extremely potent allergen hidden in perfumes

    DEFF Research Database (Denmark)

    Johansen, Jeanne Duus; Andersen, Klaus Ejner; Svedman, Cecilia

    2003-01-01

    Oak moss absolute is a long-known, popular natural extract widely used in perfumes. It is reported as the cause of allergic reactions in a significant number of those with perfume allergy. Oak moss absolute has been the target of recent research to identify its allergenic components. Recently...... an open test simulating the use of perfumes on the volar aspect of the forearms in a randomized and double-blinded design. A solution with 5 p.p.m. chloroatranol was used for 14 days, and, in case of no reaction, the applications were continued for another 14 days with a solution containing 25 p.p.m. All....... The dose eliciting a reaction in 50% of the test subjects at patch testing was 0.2 p.p.m. In conclusion, the hidden exposure to a potent allergen widely used in perfumes has caused a highly sensitized cohort of individuals. Judged from the elicitation profile, chloroatranol is the most potent allergen...

  2. Hidden Connectivity in Networks with Vulnerable Classes of Nodes

    Science.gov (United States)

    Krause, Sebastian M.; Danziger, Michael M.; Zlatić, Vinko

    2016-10-01

    In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a "color-avoiding" percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.

  3. Human taeniasis in the Republic of Korea: hidden or gone?

    Science.gov (United States)

    Chai, Jong-Yil

    2013-02-01

    History and current status of human taeniasis in the Republic of Korea, due to Taenia solium, Taenia asiatica, and Taenia saginata, are briefly reviewed. Until the 1980s, human taeniasis had been quite common in various localities of Korea. A study from 1924 reported 12.0% egg prevalence in fecal examinations. Thereafter, the prevalence of Taenia spp. ranged from 3% to 14% depending on the time and locality. Jeju-do, where pigs were reared in a conventional way, was the highest endemic area of taeniasis. An analysis of internal transcribed spacer 2 and mitochondrial cytochrome c oxidase 1 genes of 68 taeniasis cases reported from 1935 to 2005 in Korea by a research group revealed the relative occurrence of the 3 Taenia spp. as follows: T. solium (4.4%), T. asiatica (75.0%), and T. saginata (20.6%). However, national surveys on intestinal helminths conducted every 5 years on randomly selected people revealed that the Taenia egg prevalence dropped from 1.9% in 1971 to 0.02% in 1997 and finally to 0.0% in 2004. With the exception of 3 egg-positive cases reported in 2008 and 2 worm-proven cases in 2011, no more cases have been officially recorded. Based on these surveys and also on other literature, it can be concluded that taeniasis has virtually disappeared from Korea, although a few sporadic cases may remain hidden. Human cysticercosis is also expected to disappear within a couple of decades in Korea.

  4. Hidden Connectivity in Networks with Vulnerable Classes of Nodes

    Directory of Open Access Journals (Sweden)

    Sebastian M. Krause

    2016-10-01

    Full Text Available In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a “color-avoiding” percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.

  5. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  6. A randomized controlled clinical trial of 3-unit posterior zirconia-ceramic fixed dental prostheses (FDP) with layered or pressed veneering ceramics: 3-year results.

    Science.gov (United States)

    Naenni, Nadja; Bindl, Andreas; Sax, Caroline; Hämmerle, Christoph; Sailer, Irena

    2015-11-01

    The aim of the present pilot study was to test whether or not posterior zirconia-ceramic fixed dental prostheses (FDPs) with pressed veneering ceramic exhibit less chipping than FDPs with layered veneering ceramics. Forty patients (13 female, 27 male; mean age 54 years (range 26.1-80.7 years) in need of one maxillary or mandibular three-unit FDP in the second premolar or molar region were recruited and treated at two separate centers at the University of Zurich according to the same study protocol. The frameworks were made out of zirconia using a CAD/CAM system (Cerec Sirona, Bensheim, Germany). The patients were randomly assigned to either the test group (zirconia frameworks veneered with pressed ceramic; IPS e.max ZirPress, Ivoclar Vivadent AG, Schaan, Liechtenstein; n=20) or the control group (layered veneering ceramic; IPS e.max Ceram, Ivoclar Vivadent AG, Schaan, Liechtenstein; n=20). All FDPs were adhesively cemented and evaluated at baseline (i.e., cementation), at 6 months and at 1 and 3 years of clinical service. The survival of the reconstruction was recorded. The technical outcome was assessed using modified United States Public Health Services (USPHS) criteria. The biologic parameters analyzed at abutment teeth and analogous non-restored teeth included probing pocket depth (PPD), plaque control record (PCR), bleeding on probing (BOP), and tooth vitality (CO2). Data was descriptively analyzed and survival was calculated using Kaplan-Meier statistics. 36 patients (25 female, 11 male; mean age 52.3 years) with 18 test and 18 control FDPs were examined after a mean follow-up of 36 months (95% CI: 32.6-39.1 months). Comparison of groups was done by Crosstabulation showing even distribution of the respective restored teeth amidst the groups. Survival rate was 100% for both test and control FDPs. Chipping of the veneering ceramic tended to occur more frequently in test (n=8; 40%) than in control (n=4; 20%) FDPs, albeit not significantly (p=0.3). No further

  7. Web-Based STAR E-Learning Course Increases Empathy and Understanding in Dementia Caregivers: Results from a Randomized Controlled Trial in the Netherlands and the United Kingdom

    Science.gov (United States)

    Meiland, Franka; van der Roest, Henriëtte; Kevern, Peter; Abiuso, Francesca; Bengtsson, Johan; Giuliano, Angele; Duca, Annalise; Sanders, Jennifer; Basnett, Fern; Nugent, Chris; Kingston, Paul; Dröes, Rose-Marie

    2015-01-01

    Background The doubling of the number of people with dementia in the coming decades coupled with the rapid decline in the working population in our graying society is expected to result in a large decrease in the number of professionals available to provide care to people with dementia. As a result, care will be supplied increasingly by untrained informal caregivers and volunteers. To promote effective care and avoid overburdening of untrained and trained caregivers, they must become properly skilled. To this end, the European Skills Training and Reskilling (STAR) project, which comprised experts from the domains of education, technology, and dementia care from 6 countries (the Netherlands, Sweden, Italy, Malta, Romania, and the United Kingdom), worked together to create and evaluate a multilingual e-learning tool. The STAR training portal provides dementia care training both for informal and formal caregivers. Objective The objective of the current study was to evaluate the user friendliness, usefulness, and impact of STAR with informal caregivers, volunteers, and professional caregivers. Methods For 2 to 4 months, the experimental group had access to the STAR training portal, a Web-based portal consisting of 8 modules, 2 of which had a basic level and 6 additional modules at intermediate and advanced levels. The experimental group also had access to online peer and expert communities for support and information exchange. The control group received free access to STAR after the research had ended. The STAR training portal was evaluated in a randomized controlled trial among informal caregivers and volunteers in addition to professional caregivers (N=142) in the Netherlands and the United Kingdom. Assessments were performed with self-assessed, online, standardized questionnaires at baseline and after 2 to 4 months. Primary outcome measures were user friendliness, usefulness, and impact of STAR on knowledge, attitudes, and approaches of caregivers regarding dementia

  8. Random Walks Estimate Land Value

    CERN Document Server

    Blanchard, Ph

    2010-01-01

    Expected urban population doubling calls for a compelling theory of the city. Random walks and diffusions defined on spatial city graphs spot hidden areas of geographical isolation in the urban landscape going downhill. First--passage time to a place correlates with assessed value of land in that. The method accounting the average number of random turns at junctions on the way to reach any particular place in the city from various starting points could be used to identify isolated neighborhoods in big cities with a complex web of roads, walkways and public transport systems.

  9. Comparing effects between music intervention and aromatherapy on anxiety of patients undergoing mechanical ventilation in the intensive care unit: a randomized controlled trial.

    Science.gov (United States)

    Lee, Chiu-Hsiang; Lai, Chiung-Ling; Sung, Yi-Hui; Lai, Mei Yu; Lin, Chung-Ying; Lin, Long-Yau

    2017-07-01

    Using patient-reported outcomes and physiological indicators to test the effects of music intervention and aromatherapy on reducing anxiety for intensive care unit (ICU) patients undergoing mechanical ventilation. Patients with ICU admission duration >24 h were randomly assigned to a Music intervention group (n = 41), Aromatherapy group (n = 47), or Control group (rest only; n = 44). Each patient in the Music group listened to music; each patient in the Aromatherapy group received lavender essential oil massage on his/her back for 5 min; each patient in the Control group wore noise-canceling headphones. Anxiety was measured using the Chinese version of the Stage-Trait Anxiety Inventory (C-STAI) and the Visual Analogue Scale for Anxiety (VAS-A) at baseline, post-test, and 30-min follow-up. Heart rate, breathing rate, and blood pressure were measured every 10 min from baseline to the 30-min follow-up. The Music group had significantly better post-test VAS-A and C-STAI scores, and had lower heart rate and blood pressure than the Control group. The Aromatherapy group had significantly better VAS-A score and lower heart rate than the Control group. The 30-min follow-up showed that both Music and Aromatherapy groups had lower heart rate and blood pressure than the Control group. Music and aromatherapy interventions were both effective for ICU patients. The effects of music intervention were greater than that of aromatherapy; both interventions maintained the effects for at least 30 min.

  10. [Prevention of heel pressure sores with a foam body-support device. A randomized controlled trial in a medical intensive care unit].

    Science.gov (United States)

    Cadue, Jean-François; Karolewicz, Stéphane; Tardy, Catherine; Barrault, Claudie; Robert, René; Pourrat, Olivier

    2008-01-01

    To assess in a prospective controlled study the efficacy and safety of a specific foam body-support device designed as to prevent heel pressure ulcers. A randomization table was used to allocate 70 patients into 2 groups. The control group was treated with our standard pressure sore prevention protocol (half-seated position, water-mattress and preventive massages 6 times a day); the experimental group was treated with the same standard protocol as well as with the foam body-support device being evaluated. Patients were included if their Waterlow score was >10, indicating a high risk of developing pressure ulcers and if they had no skin lesion on the heels. Foam devices, covered with jersey, were constructed for the legs and allowed the heels to be free of any contact with the bed; another foam block was arranged perpendicularly to the first, in contact with the soles, to prevent ankles from assuming an equinus position (to prevent a dropfoot condition). The principal criterion for efficacy was the number of irreversible skin lesions on the heel (that is, beyond the stage of blanching hyperemia, reversible after finger pressure); these lesions were assessed every day until the end of the study (up to 30 days). The number of irreversible heel pressure ulcers was lower in the experimental (3 patients, 8.6%) than in the control group (19 patients, 55.4%) (ppressure ulcer was higher in the experimental group (5.6 days, compared with 2.8 days, p=0.01). The groups did not differ in the number of pressure sores on the sacrum and leg. An anatomical foam body-support is effective in preventing heel pressure ulcers in patients on a medical intensive care unit and is well tolerated.

  11. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  12. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  13. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  14. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  15. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  16. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  17. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  18. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  19. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...

  20. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  1. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions...... within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004) and is Colb (1975) still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004) claims that we...... investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic...

  2. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  3. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  4. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  5. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  6. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  7. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  8. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  9. Modeling Movement Primitives with Hidden Markov Models for Robotic and Biomedical Applications.

    Science.gov (United States)

    Karg, Michelle; Kulić, Dana

    2017-01-01

    Movement primitives are elementary motion units and can be combined sequentially or simultaneously to compose more complex movement sequences. A movement primitive timeseries consist of a sequence of motion phases. This progression through a set of motion phases can be modeled by Hidden Markov Models (HMMs). HMMs are stochastic processes that model time series data as the evolution of a hidden state variable through a discrete set of possible values, where each state value is associated with an observation (emission) probability. Each motion phase is represented by one of the hidden states and the sequential order by their transition probabilities. The observations of the MP-HMM are the sensor measurements of the human movement, for example, motion capture or inertial measurements. The emission probabilities are modeled as Gaussians. In this chapter, the MP-HMM modeling framework is described and applications to motion recognition and motion performance assessment are discussed. The selected applications include parametric MP-HMMs for explicitly modeling variability in movement performance and the comparison of MP-HMMs based on the loglikelihood, the Kullback-Leibler divergence, the extended HMM-based F-statistic, and gait-specific reference-based measures.

  10. Hidden Markov models and other machine learning approaches in computational molecular biology

    Energy Technology Data Exchange (ETDEWEB)

    Baldi, P. [California Inst. of Tech., Pasadena, CA (United States)

    1995-12-31

    This tutorial was one of eight tutorials selected to be presented at the Third International Conference on Intelligent Systems for Molecular Biology which was held in the United Kingdom from July 16 to 19, 1995. Computational tools are increasingly needed to process the massive amounts of data, to organize and classify sequences, to detect weak similarities, to separate coding from non-coding regions, and reconstruct the underlying evolutionary history. The fundamental problem in machine learning is the same as in scientific reasoning in general, as well as statistical modeling: to come up with a good model for the data. In this tutorial four classes of models are reviewed. They are: Hidden Markov models; artificial Neural Networks; Belief Networks; and Stochastic Grammars. When dealing with DNA and protein primary sequences, Hidden Markov models are one of the most flexible and powerful alignments and data base searches. In this tutorial, attention is focused on the theory of Hidden Markov Models, and how to apply them to problems in molecular biology.

  11. Predicting nucleosome positioning using a duration Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Widom Jonathan

    2010-06-01

    Full Text Available Abstract Background The nucleosome is the fundamental packing unit of DNAs in eukaryotic cells. Its detailed positioning on the genome is closely related to chromosome functions. Increasing evidence has shown that genomic DNA sequence itself is highly predictive of nucleosome positioning genome-wide. Therefore a fast software tool for predicting nucleosome positioning can help understanding how a genome's nucleosome organization may facilitate genome function. Results We present a duration Hidden Markov model for nucleosome positioning prediction by explicitly modeling the linker DNA length. The nucleosome and linker models trained from yeast data are re-scaled when making predictions for other species to adjust for differences in base composition. A software tool named NuPoP is developed in three formats for free download. Conclusions Simulation studies show that modeling the linker length distribution and utilizing a base composition re-scaling method both improve the prediction of nucleosome positioning regarding sensitivity and false discovery rate. NuPoP provides a user-friendly software tool for predicting the nucleosome occupancy and the most probable nucleosome positioning map for genomic sequences of any size. When compared with two existing methods, NuPoP shows improved performance in sensitivity.

  12. Optical character recognition of handwritten Arabic using hidden Markov models

    Energy Technology Data Exchange (ETDEWEB)

    Aulama, Mohannad M. [University of Jordan; Natsheh, Asem M. [University of Jordan; Abandah, Gheith A. [University of Jordan; Olama, Mohammed M [ORNL

    2011-01-01

    The problem of optical character recognition (OCR) of handwritten Arabic has not received a satisfactory solution yet. In this paper, an Arabic OCR algorithm is developed based on Hidden Markov Models (HMMs) combined with the Viterbi algorithm, which results in an improved and more robust recognition of characters at the sub-word level. Integrating the HMMs represents another step of the overall OCR trends being currently researched in the literature. The proposed approach exploits the structure of characters in the Arabic language in addition to their extracted features to achieve improved recognition rates. Useful statistical information of the Arabic language is initially extracted and then used to estimate the probabilistic parameters of the mathematical HMM. A new custom implementation of the HMM is developed in this study, where the transition matrix is built based on the collected large corpus, and the emission matrix is built based on the results obtained via the extracted character features. The recognition process is triggered using the Viterbi algorithm which employs the most probable sequence of sub-words. The model was implemented to recognize the sub-word unit of Arabic text raising the recognition rate from being linked to the worst recognition rate for any character to the overall structure of the Arabic language. Numerical results show that there is a potentially large recognition improvement by using the proposed algorithms.

  13. Optical character recognition of handwritten Arabic using hidden Markov models

    Science.gov (United States)

    Aulama, Mohannad M.; Natsheh, Asem M.; Abandah, Gheith A.; Olama, Mohammed M.

    2011-04-01

    The problem of optical character recognition (OCR) of handwritten Arabic has not received a satisfactory solution yet. In this paper, an Arabic OCR algorithm is developed based on Hidden Markov Models (HMMs) combined with the Viterbi algorithm, which results in an improved and more robust recognition of characters at the sub-word level. Integrating the HMMs represents another step of the overall OCR trends being currently researched in the literature. The proposed approach exploits the structure of characters in the Arabic language in addition to their extracted features to achieve improved recognition rates. Useful statistical information of the Arabic language is initially extracted and then used to estimate the probabilistic parameters of the mathematical HMM. A new custom implementation of the HMM is developed in this study, where the transition matrix is built based on the collected large corpus, and the emission matrix is built based on the results obtained via the extracted character features. The recognition process is triggered using the Viterbi algorithm which employs the most probable sequence of sub-words. The model was implemented to recognize the sub-word unit of Arabic text raising the recognition rate from being linked to the worst recognition rate for any character to the overall structure of the Arabic language. Numerical results show that there is a potentially large recognition improvement by using the proposed algorithms.

  14. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  15. The perception of the hidden curriculum on medical education: an exploratory study

    Directory of Open Access Journals (Sweden)

    Murakami Manabu

    2009-12-01

    Full Text Available Abstract Background Major curriculum reform of undergraduate medical education occurred during the past decades in the United Kingdom (UK; however, the effects of the hidden curriculum, which influence the choice of primary care as a career, have not been sufficiently recognized. While Japan, where traditionally few institutions systematically foster primary care physicians and very few have truly embraced family medicine as their guiding discipline, has also experienced meaningful curriculum reform, the effect of the hidden curriculum is not well known. The aim of this study is to identify themes pertaining to the students' perceptions of the hidden curriculum affecting undergraduate medical education in bedside learning in Japan. Methods Semi-structured interviews with thematic content analysis were implemented. Undergraduate year-5 students from a Japanese medical school at a Japanese teaching hospital were recruited. Interview were planned to last between 30 to 60 minutes each, over an 8-month period in 2007. The interviewees' perceptions concerning the quality of teaching in their bedside learning and related experiences were collected and analysed thematically. Results Twenty five medical students (18 males and 7 females, mean age 25 years old consented to participate in the interviews, and seven main themes emerged: "the perception of education as having a low priority," "the prevalence of positive/negative role models," "the persistence of hierarchy and exclusivity," "the existence of gender issues," "an overburdened medical knowledge," "human relationships with colleagues and medical team members," and "first experience from the practical wards and their patients." Conclusions Both similarities and differences were found when comparing the results to those of previous studies in the UK. Some effects of the hidden curriculum in medical education likely exist in common between the UK and Japan, despite the differences in their demographic

  16. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  17. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  18. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  19. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  20. Applying the Integrated Practice Unit Concept to a Modified Virtual Ward Model of Care for Patients at Highest Risk of Readmission: A Randomized Controlled Trial

    Science.gov (United States)

    Ng, Matthew Joo Ming; Balasubramaniam, Kanchana; Towle, Rachel Marie

    2017-01-01

    Background Emerging evidence from the virtual ward care model showed that multidisciplinary case management are inadequate to reduce readmissions or death for high risk patients. There is consensus that interventions should encompass both pre-hospital discharge and post-discharge transitional care to be effective. Integrated practice units (IPU) had been proposed as an approach of restructuring the organization and work processes of multidisciplinary teams to achieve value in healthcare. Our primary objective is to evaluate if the novel application of the IPU concept to organize a modified virtual ward model incorporating pre-hospital discharge transitional care can reduce readmissions of patients at highest risk for readmission. Methods We conducted an open label, assessor blinded randomized controlled trial on patients with one or more unscheduled readmissions in the prior 90 days and LACE score ≥ 10. 840 patients were randomized in 1:1 ratio and blocks of 6 to the intervention program (n = 420) or control (n = 420). Allocation concealment was effected via an off-site telephone service maintained by a hospital administrator. Intervention patients received discharge planning, medication reconciliation, coaching on self-management of chronic diseases using standardized action plans and an individualized care plan complete with written discharge instructions, appointments schedule, medication changes and the contact information of the outpatient VW nurse before discharge. At discharge, care is handed over to the outpatient VW team. Patients were closely monitored in the VW for three months that included a telephone review within 72 hours of discharge, home assessment, regular telephone reviews to identify early complications and early review clinics for patients who destabilize. The VW meet daily to discuss new patients and review care plans for patients. Control patients received standard hospital care that included a standardized patient copy of the hospital

  1. Computational analysis of the mechanism of chemical reactions in terms of reaction phases: hidden intermediates and hidden transition States.

    Science.gov (United States)

    Kraka, Elfi; Cremer, Dieter

    2010-05-18

    Computational approaches to understanding chemical reaction mechanisms generally begin by establishing the relative energies of the starting materials, transition state, and products, that is, the stationary points on the potential energy surface of the reaction complex. Examining the intervening species via the intrinsic reaction coordinate (IRC) offers further insight into the fate of the reactants by delineating, step-by-step, the energetics involved along the reaction path between the stationary states. For a detailed analysis of the mechanism and dynamics of a chemical reaction, the reaction path Hamiltonian (RPH) and the united reaction valley approach (URVA) are an efficient combination. The chemical conversion of the reaction complex is reflected by the changes in the reaction path direction t(s) and reaction path curvature k(s), both expressed as a function of the path length s. This information can be used to partition the reaction path, and by this the reaction mechanism, of a chemical reaction into reaction phases describing chemically relevant changes of the reaction complex: (i) a contact phase characterized by van der Waals interactions, (ii) a preparation phase, in which the reactants prepare for the chemical processes, (iii) one or more transition state phases, in which the chemical processes of bond cleavage and bond formation take place, (iv) a product adjustment phase, and (v) a separation phase. In this Account, we examine mechanistic analysis with URVA in detail, focusing on recent theoretical insights (with a variety of reaction types) from our laboratories. Through the utilization of the concept of localized adiabatic vibrational modes that are associated with the internal coordinates, q(n)(s), of the reaction complex, the chemical character of each reaction phase can be identified via the adiabatic curvature coupling coefficients, A(n,s)(s). These quantities reveal whether a local adiabatic vibrational mode supports (A(n,s) > 0) or resists

  2. Comparison of patient-ventilator asynchrony during pressure support ventilation and proportional assist ventilation modes in surgical Intensive Care Unit: A randomized crossover study

    Directory of Open Access Journals (Sweden)

    Parshotam Lal Gautam

    2016-01-01

    Full Text Available Background: The patient-ventilator asynchrony is almost observed in all modes of ventilation, and this asynchrony affects lung mechanics adversely resulting in deleterious outcome. Innovations and advances in ventilator technology have been trying to overcome this problem by designing newer modes of ventilation. Pressure support ventilation (PSV is a commonly used flow-cycled mode where a constant pressure is delivered by ventilator. Proportional assist ventilation (PAV is a new dynamic inspiratory pressure assistance and is supposed to be better than PSV for synchrony and tolerance, but reports are still controversial. Moreover, most of these studies are conducted in chronic obstructive pulmonary disease patients with respiratory failure; the results of these studies may not be applicable to surgical patients. Thus, we proposed to do compare these two modes in surgical Intensive Care Unit (ICU patients as a randomized crossover study. Aims: Comparison of patient-ventilator asynchrony between PSV and PAV plus (PAV+ in surgical patients while weaning. Subjects and Methods: After approval by the Hospital Ethics Committee, we enrolled twenty patients from surgical ICU of tertiary care institute. The patients were ventilated with pressure support mode (PSV and PAV+ for 12 h as a crossover from one mode to another after 6 h while weaning. Results: Average age and weight of patients were 41.80 ± 15.20 years (mean ± standard deviation [SD] and 66.50 ± 12.47 (mean ± SD kg, respectively. Comparing the asynchronies between the two modes, the mean number of total asynchronous recorded breaths in PSV was 7.05 ± 0.83 and 4.35 ± 5.62, respectively, during sleep and awake state, while the same were 6.75 ± 112.24 and 10.85 ± 11.33 in PAV+. Conclusion: Both PSV and PAV+ modes of ventilation performed similarly for patient-ventilator synchrony in surgical patients. In surgical patients with acute respiratory failure, dynamic inspiratory pressure

  3. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  4. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  5. Modelling proteins' hidden conformations to predict antibiotic resistance

    Science.gov (United States)

    Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.

    2016-10-01

    TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.

  6. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  7. Self-similarity of complex networks and hidden metric spaces

    CERN Document Server

    Serrano, M Angeles; Boguna, Marian

    2007-01-01

    We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

  8. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  9. Dark matter in the nonabelian hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2015-01-01

    We discuss the dark matter in the hidden gauge theory. We propose a scenario where the mini-inflation dilutes the dark matter density. This scenario is consistent with the current baryon number asymmetry.

  10. Hidden Symmetry from Supersymmetry in One-Dimensional Quantum Mechanics

    Directory of Open Access Journals (Sweden)

    Alexander A. Andrianov

    2009-06-01

    Full Text Available When several inequivalent supercharges form a closed superalgebra in Quantum Mechanics it entails the appearance of hidden symmetries of a Super-Hamiltonian. We examine this problem in one-dimensional QM for the case of periodic potentials and potentials with finite number of bound states. After the survey of the results existing in the subject the algebraic and analytic properties of hidden-symmetry differential operators are rigorously elaborated in the Theorems and illuminated by several examples.

  11. Extracting hidden trails and roads under canopy using LIDAR

    OpenAIRE

    Krougios, Prokopios

    2008-01-01

    The field of Remote Sensing has been greatly benefited by the development of LIDAR. The extraction of bare earth under tree canopies and especially the identification of hidden trails are important tools for military and civilian operations in dense forests. LIDAR data from Sequoia National Park in California (2008) and Fort Belvoir Military Base in Virginia (2007) were two areas that were selected for analysis. Quick Terrain Modeler software was used in order to recognize hidden trails....

  12. Physical nature of a hidden mass in the Universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Yu. (AN SSSR, Moscow. Inst. Prikladnoj Matematiki)

    1984-04-01

    The problem of an origin of the hidden mass of the Universe is discussed. Observation astronomic data on large-scale Universe structure and hidden mass distribution within the framework of the adiabatic theory of galaxies formation point out the dominance in nowadays Universe of weakly-interacting particles with 15-60 eV mass. Restrictions are obtained for a possible admixture of other relict particles.

  13. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  14. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  15. Modification of Hidden Layer Weight in Extreme Learning Machine Using Gain Ratio

    Directory of Open Access Journals (Sweden)

    Anggraeny Fetty Tri

    2016-01-01

    Full Text Available Extreme Learning Machine (ELM is a method of learning feed forward neural network quickly and has a fairly good accuracy. This method is devoted to a feed forward neural network with one hidden layer where the parameters (i.e. weight and bias are adjusted one time randomly at the beginning of the learning process. In neural network, the input layer is connected to all characteristics/features, and the output layer is connected to all classes of species. This research used three datasets from UCI database, which were Iris, Breast Wisconsin, and Dermatology, with each dataset having several features. Each characteristic/feature of the data has a role in the process of classification levels, starting from the most influencing role to non-influencing at all. Gain ratio was used to extract each feature role on each datasets. Gain ratio is a method to extract feature role in order to develop a decision tree structure. In this study, ELM structure has been modified, where the random weights of the hidden layer were adjusted to the level of each feature role in determining the species class, so as to improve the level of training and testing accuracy. The proposed method has higher classification accuracy rate than basic ELM on all three datasets, which were 99%, 96%, and 82%, respectively.

  16. Reduced-Rank Hidden Markov Models

    CERN Document Server

    Siddiqi, Sajid M; Gordon, Geoffrey J

    2009-01-01

    We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-...

  17. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  18. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  19. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  20. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  1. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  2. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  3. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  4. Stochastic precipitation generator with hidden state covariates

    Science.gov (United States)

    Kim, Yongku; Lee, GyuWon

    2017-08-01

    Time series of daily weather such as precipitation, minimum temperature and maximum temperature are commonly required for various fields. Stochastic weather generators constitute one of the techniques to produce synthetic daily weather. The recently introduced approach for stochastic weather generators is based on generalized linear modeling (GLM) with covariates to account for seasonality and teleconnections (e.g., with the El Niño). In general, stochastic weather generators tend to underestimate the observed interannual variance of seasonally aggregated variables. To reduce this overdispersion, we incorporated time series of seasonal dry/wet indicators in the GLM weather generator as covariates. These seasonal time series were local (or global) decodings obtained by a hidden Markov model of seasonal total precipitation and implemented in the weather generator. The proposed method is applied to time series of daily weather from Seoul, Korea and Pergamino, Argentina. This method provides a straightforward translation of the uncertainty of the seasonal forecast to the corresponding conditional daily weather statistics.

  5. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  6. Coulomb gauge model for hidden charm tetraquarks

    Science.gov (United States)

    Xie, W.; Mo, L. Q.; Wang, Ping; Cotanch, Stephen R.

    2013-08-01

    The spectrum of tetraquark states with hidden charm is studied within an effective Coulomb gauge Hamiltonian approach. Of the four independent color schemes, two are investigated, the (qcbar)1(cqbar)1 singlet-singlet (molecule) and the (qc)3(qbarcbar)3 triplet-triplet (diquark), for selected JPC states using a variational method. The predicted masses of triplet-triplet tetraquarks are roughly a GeV heavier than the singlet-singlet states. There is also an interesting flavor dependence with (qqbar)1 (ccbar1) states about half a GeV lighter than (qcbar)1(qbarc)1. The lightest 1++ and 1-- predictions are in agreement with the observed X (3872) and Y (4008) masses suggesting they are molecules with ωJ / ψ and ηhc, rather than D*Dbar* and DDbar, type structure, respectively. Similarly, the lightest isovector 1++ molecule, having a ρJ / ψ flavor composition, has mass near the recently observed charged Zc (3900) value. These flavor configurations are consistent with observed X, Y and Zc decays to ππJ / ψ.

  7. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  8. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  9. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  10. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  11. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  12. A randomized controlled trial on early physiotherapy intervention versus usual care in acute care unit for elderly: potential benefits in light of dietary intakes.

    NARCIS (Netherlands)

    Blanc-Bisson, C.; Dechamps, A.A.; Gouspillou, G.; Dehail, P.; Bourdel-Marchasson, I.

    2008-01-01

    OBJECTIVE: To evaluate effects of early intensive physiotherapy during acute illness on post hospitalization activity daily living autonomy (ADL). DESIGN: Prospective randomized controlled trial of intensive physiotherapy rehabilitation on day 1 to 2 after admission until clinical stability or usual

  13. Reflection on the Role of Artists: A Case Study on the Hidden Visual Curriculum of the School of the Art Institute of Chicago

    Science.gov (United States)

    Baker, Marissa H.; Ng-He, Carol; Lopez-Bosch, Maria Acaso

    2008-01-01

    In 2005, Maria Acaso, professor in Art Education at the Universidad Complutense Madrid in Spain and a co-author of this article, conducted a comparative research project on visual configurations at different art schools in Europe and the United States. The study of hidden visual curriculum examines how knowledge and cultural/political/social…

  14. Reflection on the Role of Artists: A Case Study on the Hidden Visual Curriculum of the School of the Art Institute of Chicago

    Science.gov (United States)

    Baker, Marissa H.; Ng-He, Carol; Lopez-Bosch, Maria Acaso

    2008-01-01

    In 2005, Maria Acaso, professor in Art Education at the Universidad Complutense Madrid in Spain and a co-author of this article, conducted a comparative research project on visual configurations at different art schools in Europe and the United States. The study of hidden visual curriculum examines how knowledge and cultural/political/social…

  15. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  16. A Fractional Random Wavelet Transform Based Image Steganography

    OpenAIRE

    G.K. Rajini; RAMACHANDRA REDDY G.

    2015-01-01

    This study presents a novel technique for image steganography based on Fractional Random Wavelet Transform. This transform has all the features of wavelet transform with randomness and fractional order built into it. The randomness and fractional order in the algorithm brings in robustness and additional layers of security to steganography. The stegano image generated by this algorithm contains both cover image and hidden image and image degradation is not observed in it. The steganography st...

  17. Random Vibration Analysis of an Integrated Airborne Aid Unit on Ambulance Helicopter%救护直升机机载急救单元随机振动分析

    Institute of Scientific and Technical Information of China (English)

    刘孝辉; 徐新喜; 白松; 谭树林; 杨猛

    2013-01-01

    为了解某救护直升机机载综合急救单元随机振动响应特性,针对载机平台振动特点,将载机宽带随机叠加正弦振动激励谱转换为ANSYS软件可用的纯随机振动谱,在ANSYS软件中建立了机载综合急救单元有限元模型,通过模态分析,获取了机载综合急救单元固有频率和振型。在此基础上施加转换后的载机振动谱并进行随机振动分析,得到了机载综合急救单元不同部位在激励频带范围内的动力响应及危险频率点,并对单元结构动强度进行了校核。仿真分析结果可为机载综合急救单元的抗减振设计提供参考依据。%To understand the random vibration reponse characteristics of the integrated airborne aid unit on ambulance helicopter, the finite element model of the unit was built by using ANSYS software. According to the vibration characteris-tics of the airborne platform of the ambulance helicopter, the randomly superimposed sinusoidal excitation spectrum of the airborne broadband was converted into a pure random vibration spectrum useable directly for ANSYS. The natural frequen-cies and modals of the unit were obtained by modal analysis. On this basis, the converted vibration spectrum was exerted so that the dynamic response and the critical frequencies in different positions of the integrated airborne aid unit were derived by the random vibration analysis. Meanwhile, the dynamic strength of the unit structure was checked up. The result of the analysis has provided a reference for anti-vibration design of the integrated airborne aid unit.

  18. Disease surveillance using a hidden Markov model

    Directory of Open Access Journals (Sweden)

    Wright Graeme

    2009-08-01

    Full Text Available Abstract Background Routine surveillance of disease notification data can enable the early detection of localised disease outbreaks. Although hidden Markov models (HMMs have been recognised as an appropriate method to model disease surveillance data, they have been rarely applied in public health practice. We aimed to develop and evaluate a simple flexible HMM for disease surveillance which is suitable for use with sparse small area count data and requires little baseline data. Methods A Bayesian HMM was designed to monitor routinely collected notifiable disease data that are aggregated by residential postcode. Semi-synthetic data were used to evaluate the algorithm and compare outbreak detection performance with the established Early Aberration Reporting System (EARS algorithms and a negative binomial cusum. Results Algorithm performance varied according to the desired false alarm rate for surveillance. At false alarm rates around 0.05, the cusum-based algorithms provided the best overall outbreak detection performance, having similar sensitivity to the HMMs and a shorter average time to detection. At false alarm rates around 0.01, the HMM algorithms provided the best overall outbreak detection performance, having higher sensitivity than the cusum-based Methods and a generally shorter time to detection for larger outbreaks. Overall, the 14-day HMM had a significantly greater area under the receiver operator characteristic curve than the EARS C3 and 7-day negative binomial cusum algorithms. Conclusion Our findings suggest that the HMM provides an effective method for the surveillance of sparse small area notifiable disease data at low false alarm rates. Further investigations are required to evaluation algorithm performance across other diseases and surveillance contexts.

  19. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  20. Foundational Forces & Hidden Variables in Technology Commercialization

    Science.gov (United States)

    Barnett, Brandon

    2011-03-01

    The science of physics seems vastly different from the process of technology commercialization. Physics strives to understand our world through the experimental deduction of immutable laws and dependent variables and the resulting macro-scale phenomenon. In comparison, the~goal of business is to make a profit by addressing the needs, preferences, and whims of individuals in a market. It may seem that this environment is too dynamic to identify all the hidden variables and deduct the foundational forces that impact a business's ability to commercialize innovative technologies. One example of a business ``force'' is found in the semiconductor industry. In 1965, Intel co-founder Gordon Moore predicted that the number of transistors incorporated in a chip will approximately double every 24 months. Known as Moore's Law, this prediction has become the guiding principle for the semiconductor industry for the last 40 years. Of course, Moore's Law is not really a law of nature; rather it is the result of efforts by Intel and the entire semiconductor industry. A closer examination suggests that there are foundational principles of business that underlie the macro-scale phenomenon of Moore's Law. Principles of profitability, incentive, and strategic alignment have resulted in a coordinated influx of resources that has driven technologies to market, increasing the profitability of the semiconductor industry and optimizing the fitness of its participants. New innovations in technology are subject to these same principles. So, in addition to traditional market forces, these often unrecognized forces and variables create challenges for new technology commercialization. In this talk, I will draw from ethnographic research, complex adaptive theory, and industry data to suggest a framework with which to think about new technology commercialization. Intel's bio-silicon initiative provides a case study.

  1. Next generation sequencing reveals the hidden diversity of zooplankton assemblages.

    Directory of Open Access Journals (Sweden)

    Penelope K Lindeque

    Full Text Available BACKGROUND: Zooplankton play an important role in our oceans, in biogeochemical cycling and providing a food source for commercially important fish larvae. However, difficulties in correctly identifying zooplankton hinder our understanding of their roles in marine ecosystem functioning, and can prevent detection of long term changes in their community structure. The advent of massively parallel next generation sequencing technology allows DNA sequence data to be recovered directly from whole community samples. Here we assess the ability of such sequencing to quantify richness and diversity of a mixed zooplankton assemblage from a productive time series site in the Western English Channel. METHODOLOGY/PRINCIPLE FINDINGS: Plankton net hauls (200 µm were taken at the Western Channel Observatory station L4 in September 2010 and January 2011. These samples were analysed by microscopy and metagenetic analysis of the 18S nuclear small subunit ribosomal RNA gene using the 454 pyrosequencing platform. Following quality control a total of 419,041 sequences were obtained for all samples. The sequences clustered into 205 operational taxonomic units using a 97% similarity cut-off. Allocation of taxonomy by comparison with the National Centre for Biotechnology Information database identified 135 OTUs to species level, 11 to genus level and 1 to order, <2.5% of sequences were classified as unknowns. By comparison a skilled microscopic analyst was able to routinely enumerate only 58 taxonomic groups. CONCLUSIONS: Metagenetics reveals a previously hidden taxonomic richness, especially for Copepoda and hard-to-identify meroplankton such as Bivalvia, Gastropoda and Polychaeta. It also reveals rare species and parasites. We conclude that Next Generation Sequencing of 18S amplicons is a powerful tool for elucidating the true diversity and species richness of zooplankton communities. While this approach allows for broad diversity assessments of plankton it may

  2. Bayesian inversion of seismic attributes for geological facies using a Hidden Markov Model

    Science.gov (United States)

    Nawaz, Muhammad Atif; Curtis, Andrew

    2017-02-01

    Markov chain Monte-Carlo (McMC) sampling generates correlated random samples such that their distribution would converge to the true distribution only as the number of samples tends to infinity. In practice, McMC is found to be slow to converge, convergence is not guaranteed to be achieved in finite time, and detection of convergence requires the use of subjective criteria. Although McMC has been used for decades as the algorithm of choice for inference in complex probability distributions, there is a need to seek alternative approaches, particularly in high dimensional problems. Walker & Curtis (2014) developed a method for Bayesian inversion of 2-D spatial data using an exact sampling alternative to McMC which always draws independent samples of the target distribution. Their method thus obviates the need for convergence and removes the concomitant bias exhibited by finite sample sets. Their algorithm is nevertheless computationally intensive and requires large memory. We propose a more efficient method for Bayesian inversion of categorical variables, such as geological facies that requires no sampling at all. The method is based on a 2-D Hidden Markov Model (2D-HMM) over a grid of cells where observations represent localized data constraining each cell. The data in our example application are seismic attributes such as P- and S-wave impedances and rock density; our categorical variables are the hidden states and represent the geological rock types in each cell-facies of distinct subsets of lithology and fluid combinations such as shale, brine-sand and gas-sand. The observations at each location are assumed to be generated from a random function of the hidden state (facies) at that location, and to be distributed according to a certain probability distribution that is independent of hidden states at other locations - an assumption referred to as `localized likelihoods'. The hidden state (facies) at a location cannot be determined solely by the observation at that

  3. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  4. Double hidden layer RBF process neural network based online prediction of steam turbine exhaust enthalpy

    Institute of Scientific and Technical Information of China (English)

    GONG Huanchun

    2014-01-01

    In order to diagnose the unit economic performance online,the radial basis function (RBF) process neural network with two hidden layers was introduced to online prediction of steam turbine exhaust enthalpy.Thus,the model reflecting complicated relationship between the steam turbine exhaust enthalpy and the relative operation parameters was established.Moreover,the enthalpy of final stage extraction steam and exhaust from a 300 MW unit turbine was taken as the example to perform the online calculation. The results show that,the average relative error of this method is less than 1%,so the accuracy of this al-gorithm is higher than that of the BP neutral network.Furthermore,this method has advantages of high convergence rate,simple structure and high accuracy.

  5. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  6. Riboswitch Detection Using Profile Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Krishnamachari A

    2009-10-01

    Full Text Available Abstract Background Riboswitches are a type of noncoding RNA that regulate gene expression by switching from one structural conformation to another on ligand binding. The various classes of riboswitches discovered so far are differentiated by the ligand, which on binding induces a conformational switch. Every class of riboswitch is characterized by an aptamer domain, which provides the site for ligand binding, and an expression platform that undergoes conformational change on ligand binding. The sequence and structure of the aptamer domain is highly conserved in riboswitches belonging to the same class. We propose a method for fast and accurate identification of riboswitches using profile Hidden Markov Models (pHMM. Our method exploits the high degree of sequence conservation that characterizes the aptamer domain. Results Our method can detect riboswitches in genomic databases rapidly and accurately. Its sensitivity is comparable to the method based on the Covariance Model (CM. For six out of ten riboswitch classes, our method detects more than 99.5% of the candidates identified by the much slower CM method while being several hundred times faster. For three riboswitch classes, our method detects 97-99% of the candidates relative to the CM method. Our method works very well for those classes of riboswitches that are characterized by distinct and conserved sequence motifs. Conclusion Riboswitches play a crucial role in controlling the expression of several prokaryotic genes involved in metabolism and transport processes. As more and more new classes of riboswitches are being discovered, it is important to understand the patterns of their intra and inter genomic distribution. Understanding such patterns will enable us to better understand the evolutionary history of these genetic regulatory elements. However, a complete picture of the distribution pattern of riboswitches will emerge only after accurate identification of riboswitches across genomes

  7. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  8. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  9. Randomization tests

    CERN Document Server

    Edgington, Eugene

    2007-01-01

    Statistical Tests That Do Not Require Random Sampling Randomization Tests Numerical Examples Randomization Tests and Nonrandom Samples The Prevalence of Nonrandom Samples in Experiments The Irrelevance of Random Samples for the Typical Experiment Generalizing from Nonrandom Samples Intelligibility Respect for the Validity of Randomization Tests Versatility Practicality Precursors of Randomization Tests Other Applications of Permutation Tests Questions and Exercises Notes References Randomized Experiments Unique Benefits of Experiments Experimentation without Mani

  10. Recent Progress in Search for Hidden/Dark Photon

    CERN Document Server

    Deliyergiyev, M A

    2015-01-01

    We will try to communicate the many difficulties that we encounter when attempting to pinpoint a common origin for the several observed anomalies, or assessing their tension with existing exclusion limits. These include systematics affecting the operation of the detectors, our knowledge of their response, astrophysical uncertainties, and the broad range of particle couplings that can mediate the interaction with a detector target. The interesting astrophysical evidence that motivates a search for dark-photon and focuses our attention on a Hidden Valleys model with a GeV-scale dark sector that produces the exciting signatures, which may include the possible constituent of dark matter, the possible existence of extra gauge groups. Results from the recent underground experiments are also considered. Many models of new physics beyond the Standard Model contain a 'light' hidden sector (dark sector) with a colorful spectrum of new particles. Recently, it has been shown that the hidden sector can give rise to unique...

  11. Applications of hidden symmetries to black hole physics

    Energy Technology Data Exchange (ETDEWEB)

    Frolov, Valeri, E-mail: vfrolov@ualberta.ca [Institute of Theoretical Physics, Department of Physics University of Alberta, Edmonton, Alberta, T6G 2G7 (Canada)

    2011-02-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  12. The hidden-charm pentaquark and tetraquark states

    CERN Document Server

    Chen, Hua-Xing; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like $Z_c$ states and bottomonium-like $Z_b$ states can not be accommodated within the naive quark model. These charged $Z_c$ states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.

  13. Ontology-based Knowledge Extraction from Hidden Web

    Institute of Scientific and Technical Information of China (English)

    SONG Hui; MA Fan-yuan; LIU Xiao-qiang

    2004-01-01

    Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly.

  14. Applications of hidden symmetries to black hole physics

    CERN Document Server

    Frolov, Valeri

    2010-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set (`tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  15. Using the hidden curriculum to teach professionalism in nursing students.

    Science.gov (United States)

    Karimi, Zohreh; Ashktorab, Tahereh; Mohammadi, Easa; Abedi, Heidar Ali

    2014-03-01

    Professionalism in nursing is critical for creating credibility and a positive image. This study was carried out to explain the use of hidden curriculum in teaching professionalism in nursing students. This qualitative study was conducted through purposeful sampling strategy by the participation of 32 nursing students. The data were collected by using semi-structured interviews, and this process was continued until achieving data saturation and themes' emergence. Content analysis method was used for data analysis. DATA ANALYSIS REVEALED THREE MAIN THEMES: Development of understanding the professionalism elements, Variety of influenceability strategies, and Influenceability to various resources. Each theme consisted of some subthemes. The nursing students learnt the professionalism elements by different methods from different resources through the hidden curriculum. Therefore, exploration of the currently administered hidden curricula is suggested.

  16. Evidence of an odd-parity hidden order in a spin-orbit coupled correlated iridate

    Science.gov (United States)

    Zhao, L.; Torchinsky, D. H.; Chu, H.; Ivanov, V.; Lifshitz, R.; Flint, R.; Qi, T.; Cao, G.; Hsieh, D.

    2016-01-01

    A rare combination of strong spin-orbit coupling and electron-electron correlations makes the iridate Mott insulator Sr2IrO4 a promising host for novel electronic phases of matter. The resemblance of its crystallographic, magnetic and electronic structures to La2CuO4, as well as the emergence on doping of a pseudogap region and a low-temperature d-wave gap, has particularly strengthened analogies to cuprate high-Tc superconductors. However, unlike the cuprate phase diagram, which features a plethora of broken symmetry phases in a pseudogap region that includes charge density wave, stripe, nematic and possibly intra-unit-cell loop-current orders, no broken symmetry phases proximate to the parent antiferromagnetic Mott insulating phase in Sr2IrO4 have been observed so far, making the comparison of iridate to cuprate phenomenology incomplete. Using optical second-harmonic generation, we report evidence of a hidden non-dipolar magnetic order in Sr2IrO4 that breaks both the spatial inversion and rotational symmetries of the underlying tetragonal lattice. Four distinct domain types corresponding to discrete 90°-rotated orientations of a pseudovector order parameter are identified using nonlinear optical microscopy, which is expected from an electronic phase that possesses the symmetries of a magneto-electric loop-current order. The onset temperature of this phase is monotonically suppressed with bulk hole doping, albeit much more weakly than the Néel temperature, revealing an extended region of the phase diagram with purely hidden order. Driving this hidden phase to its quantum critical point may be a path to realizing superconductivity in Sr2IrO4.

  17. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  18. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  19. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  20. Detecting Gait Phases from RGB-D Images Based on Hidden Markov Model.

    Science.gov (United States)

    Heravi, Hamed; Ebrahimi, Afshin; Olyaee, Ehsan

    2016-01-01

    Gait contains important information about the status of the human body and physiological signs. In many medical applications, it is important to monitor and accurately analyze the gait of the patient. Since walking shows the reproducibility signs in several phases, separating these phases can be used for the gait analysis. In this study, a method based on image processing for extracting phases of human gait from RGB-Depth images is presented. The sequence of depth images from the front view has been processed to extract the lower body depth profile and distance features. Feature vector extracted from image is the same as observation vector of hidden Markov model, and the phases of gait are considered as hidden states of the model. After training the model using the images which are randomly selected as training samples, the phase estimation of gait becomes possible using the model. The results confirm the rate of 60-40% of two major phases of the gait and also the mid-stance phase is recognized with 85% precision.

  1. Fragile Watermarking Based on Robust Hidden Information

    Institute of Scientific and Technical Information of China (English)

    张新鹏; 王朔中

    2003-01-01

    Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked data. To defeat this type of counter-feit attack, a novel fragile watermarking technique is proposed in which different pseudo-random data are selected for different host products, and the generated fragile watermark is dependent upon the selected information. While inserting the fragile watermark, the pseudo-random information is also robustly embedded into the host data. Because of the difference between the selected information,different watermarked data cannot be used to forge illegal contents containing a valid fragile watermark.

  2. Effects of music therapy on self- and experienced stigma in patients on an acute care psychiatric unit: a randomized three group effectiveness study.

    Science.gov (United States)

    Silverman, Michael J

    2013-10-01

    Stigma is a major social barrier that can restrict access to and willingness to seek psychiatric care. Psychiatric consumers may use secrecy and withdrawal in an attempt to cope with stigma. The purpose of this study was to determine the effects of music therapy on self- and experienced stigma in acute care psychiatric inpatients using a randomized design with wait-list control. Participants (N=83) were randomly assigned by cluster to one of three single-session group-based conditions: music therapy, education, or wait-list control. Participants in the music therapy and education conditions completed only posttests while participants in the wait-list control condition completed only pretests. The music therapy condition was a group songwriting intervention wherein participants composed lyrics for "the stigma blues." Results indicated significant differences in measures of discrimination (experienced stigma), disclosure (self-stigma), and total stigma between participants in the music therapy condition and participants in the wait-list control condition. From the results of this randomized controlled investigation, music therapy may be an engaging and effective psychosocial technique to treat stigma. Limitations, suggestions for future research, and implications for clinical practice and psychiatric music therapy research are provided.

  3. Reheating the Standard Model from a hidden sector

    Science.gov (United States)

    Tenkanen, Tommi; Vaskonen, Ville

    2016-10-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before big bang nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful big bang nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  4. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-01-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  5. Backward causation, hidden variables and the meaning of completeness

    Indian Academy of Sciences (India)

    Huw Price

    2001-02-01

    Bell’s theorem requires the assumption that hidden variables are independent of future measurement settings. This independence assumption rests on surprisingly shaky ground. In particular, it is puzzlingly time-asymmetric. The paper begins with a summary of the case for considering hidden variable models which, in abandoning this independence assumption, allow a degree of ‘backward causation’. The remainder of the paper clarifies the physical significance of such models, in relation to the issue as to whether quantum mechanics provides a complete description of physical reality.

  6. Dynamically Generated Open and Hidden Charm Meson Systems

    CERN Document Server

    Gamermann, D; Strottman, D D; Vacas, M J V

    2006-01-01

    The lowest order chiral Lagrangian successfully applied to study the interaction of the SU(3) octet of pseudo-scalar mesons is generalized to include all mesons from the SU(4) 15-plet of pseudo-scalar mesons. Exchanges of heavy vector mesons, which are indirectly taken into account via this approach, are suppressed. Unitarization in coupled channels leads to dynamical generation of resonances in the open and hidden charm sectors. In particular, for reasonable values of the input, a new narrow scalar resonance in the hidden charm sector appears with a mass of 3.7 GeV.

  7. Reheating the Standard Model from a Hidden Sector

    CERN Document Server

    Tenkanen, Tommi

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  8. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-02-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  9. Image Coding using Markov Models with Hidden States

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto

    1999-01-01

    The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same.......The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same....

  10. How to Find a Hidden World at the LHC

    CERN Document Server

    Wells, James D

    2008-01-01

    I discuss how the Large Hadron Collider era should broaden our view of particle physics research, and apply this thinking to the case of Hidden Worlds. I focus on one of the simplest representative cases of a Hidden World, and detail the rich implications it has for LHC physics, including universal suppression of Higgs boson production, trans-TeV heavy Higgs boson signatures, heavy-to-light Higgs boson decays, weakly coupled exotic gauge bosons, and Higgs boson decays to four fermions via light exotic gauge bosons. Some signatures may be accessible in the very early stages of collider operation, whereas others motivate a later high-lumonosity upgrade.

  11. Procalcitonin-guided interventions against infections to increase early appropriate antibiotics and improve survival in the intensive care unit: a randomized trial

    DEFF Research Database (Denmark)

    Jensen, Jens U; Hein, Lars; Lundgren, Bettina;

    2011-01-01

    For patients in intensive care units, sepsis is a common and potentially deadly complication and prompt initiation of appropriate antimicrobial therapy improves prognosis. The objective of this trial was to determine whether a strategy of antimicrobial spectrum escalation, guided by daily...

  12. Light-Emitting Diodes: A Hidden Treasure

    Science.gov (United States)

    Planinšic, Gorazd; Etkina, Eugenia

    2014-01-01

    LEDs, or light-emitting diodes, are cheap, easy to purchase, and thus commonly used in physics instruction as indicators of electric current or as sources of light (Fig. 1). In our opinion LEDs represent a unique piece of equipment that can be used to collect experimental evidence, and construct and test new ideas in almost every unit of a general…

  13. Light-Emitting Diodes: A Hidden Treasure

    Science.gov (United States)

    Planinšic, Gorazd; Etkina, Eugenia

    2014-01-01

    LEDs, or light-emitting diodes, are cheap, easy to purchase, and thus commonly used in physics instruction as indicators of electric current or as sources of light (Fig. 1). In our opinion LEDs represent a unique piece of equipment that can be used to collect experimental evidence, and construct and test new ideas in almost every unit of a general…

  14. Hidden Agendas in the War on Drugs.

    Science.gov (United States)

    Marshall, Jonathan

    1991-01-01

    Concludes that drug enforcement abroad serves a broader agenda of helping achieve political control in developing nations, rather than simply disrupting the drug trade. Suggests that, because other issues take precedence, the United States often aids corrupt governments that allow narcotic exports. Argues the government should admit that…

  15. Hidden Agendas in the War on Drugs.

    Science.gov (United States)

    Marshall, Jonathan

    1991-01-01

    Concludes that drug enforcement abroad serves a broader agenda of helping achieve political control in developing nations, rather than simply disrupting the drug trade. Suggests that, because other issues take precedence, the United States often aids corrupt governments that allow narcotic exports. Argues the government should admit that…

  16. Randomness as an Equilibrium. Potential and Probability Density

    OpenAIRE

    2002-01-01

    Randomness is viewed through an analogy between a physical quantity, density of gas, and a mathematical construct -- probability density. Boltzmann's deduction of equilibrium distribution of ideal gas placed in an external potential field than provides a way of viewing probability density from a perspective of forces/potentials, hidden behind it.

  17. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Maya: Hidden Worlds Revealed... determine that the objects to be included in the exhibition ``Maya: Hidden Worlds Revealed,'' imported...

  18. The Function and the Utilization of Hidden Curriculum in College English Teaching

    Institute of Scientific and Technical Information of China (English)

    张英

    2013-01-01

    Explore the nature of the hidden curriculum, and utilize the positive functions of hidden curriculum with theory on English teaching and psychological linguistics to obtain desirable effects in College English teaching.

  19. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    Indian Academy of Sciences (India)

    H Itoh; N Okada; T Yamashita

    2007-11-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden.

  20. Coarse-grained hidden entropy production in partially inaccessible quantum jump trajectories

    OpenAIRE

    Frenzel, Max F.; Sagawa, Takahiro

    2016-01-01

    We consider an open quantum system for which only a subset of all possible transitions are accessible, while the remaining ones are hidden from direct observation. Using a modification of the notion of quantum jump trajectories we introduce the coarse-grained hidden entropy, which quantifies the entropy production in the hidden subsystem conditioned on our observations of the visible part. The entropy production consisting of the sum of visible and coarse-grained hidden entropy is shown to sa...

  1. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  2. A Pragmatic Randomized Controlled Trial of 6-Step vs 3-Step Hand Hygiene Technique in Acute Hospital Care in the United Kingdom.

    Science.gov (United States)

    Reilly, Jacqui S; Price, Lesley; Lang, Sue; Robertson, Chris; Cheater, Francine; Skinner, Kirsty; Chow, Angela

    2016-06-01

    OBJECTIVE To evaluate the microbiologic effectiveness of the World Health Organization's 6-step and the Centers for Disease Control and Prevention's 3-step hand hygiene techniques using alcohol-based handrub. DESIGN A parallel group randomized controlled trial. SETTING An acute care inner-city teaching hospital (Glasgow). PARTICIPANTS Doctors (n=42) and nurses (n=78) undertaking direct patient care. INTERVENTION Random 1:1 allocation of the 6-step (n=60) or the 3-step (n=60) technique. RESULTS The 6-step technique was microbiologically more effective at reducing the median log10 bacterial count. The 6-step technique reduced the count from 3.28 CFU/mL (95% CI, 3.11-3.38 CFU/mL) to 2.58 CFU/mL (2.08-2.93 CFU/mL), whereas the 3-step reduced it from 3.08 CFU/mL (2.977-3.27 CFU/mL) to 2.88 CFU/mL (-2.58 to 3.15 CFU/mL) (P=.02). However, the 6-step technique did not increase the total hand coverage area (98.8% vs 99.0%, P=.15) and required 15% (95% CI, 6%-24%) more time (42.50 seconds vs 35.0 seconds, P=.002). Total hand coverage was not related to the reduction in bacterial count. CONCLUSIONS Two techniques for hand hygiene using alcohol-based handrub are promoted in international guidance, the 6-step by the World Health Organization and 3-step by the Centers for Disease Control and Prevention. The study provides the first evidence in a randomized controlled trial that the 6-step technique is superior, thus these international guidance documents should consider this evidence, as should healthcare organizations using the 3-step technique in practice. Infect Control Hosp Epidemiol 2016;37:661-666.

  3. Exploring longitudinal shifts in international nurse migration to the United States between 2003 and 2013 through a random effects panel data analysis

    OpenAIRE

    Squires, Allison; Ojemeni, Melissa T.; Jones, Simon

    2016-01-01

    Background No study has examined the longitudinal trends in National Council Licensure Exam for Registered Nurse (NCLEX-RN) applicants and pass rates among internationally-educated nurses (IENs) seeking to work in the United States, nor has any analysis explored the impact of specific events on these trends, including changes to the NCLEX-RN exam, the role of the economic crisis, or the passing of the WHO Code on the International Recruitment of Health Personnel. This study seeks to understan...

  4. Comparison the Effects of Shallow and Deep Endotracheal Tube Suctioning on Respiratory Rate, Arterial Blood Oxygen Saturation and Number of Suctioning in Patients Hospitalized in the Intensive Care Unit: A Randomized Controlled Trial

    Directory of Open Access Journals (Sweden)

    Mohammad Abbasinia

    2014-09-01

    Full Text Available Introduction: Endotracheal tube suctioning is essential for improve oxygenation in the patients undergoing mechanical ventilation. There are two types of shallow and deep endotracheal tube suctioning. This study aimed to evaluate the effect of shallow and deep suctioning methods on respiratory rate (RR, arterial blood oxygen saturation (SpO2 and number of suctioning in patients hospitalized in the intensive care units of Al-Zahra Hospital, Isfahan, Iran. Methods: In this randomized controlled trial, 74 patients who hospitalized in the intensive care units of Isfahan Al-Zahra Hospital were randomly allocated to the shallow and deep suctioning groups. RR and SpO2 were measured immediately before, immediately after, 1 and 3 minute after each suctioning. Number of suctioning was also noted in each groups. Data were analyzed using repeated measures analysis of variance (RMANOVA, chi-square and independent t-tests. Results: RR was significantly increased and SpO2 was significantly decreased after each suctioning in the both groups. However, these changes were not significant between the two groups. The numbers of suctioning was significantly higher in the shallow suctioning group than in the deep suctioning group. Conclusion: Shallow and deep suctioning had a similar effect on RR and SpO2. However, shallow suctioning caused further manipulation of patient’s trachea than deep suctioning method. Therefore, it seems that deep endotracheal tube suctioning method can be used to clean the airway with lesser manipulation of the trachea.

  5. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  6. A Duration Hidden Markov Model for the Identification of Regimes in Stock Market Returns

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    This paper introduces a Duration Hidden Markov Model to model bull and bear market regime switches in the stock market; the duration of each state of the Markov Chain is a random variable that depends on a set of exogenous variables. The model not only allows the endogenous determination...... of the different regimes and but also estimates the effect of the explanatory variables on the regimes' durations. The model is estimated here on NYSE returns using the short-term interest rate and the interest rate spread as exogenous variables. The bull market regime is assigned to the identified state...... with the higher mean and lower variance; bull market duration is found to be negatively dependent on short-term interest rates and positively on the interest rate spread, while bear market duration depends positively the short-term interest rate and negatively on the interest rate spread....

  7. Early discharge and home intervention reduces unit costs after total hip replacement: results of a cost analysis in a randomized study.

    Science.gov (United States)

    Sigurdsson, Eyjolfur; Siggeirsdottir, Kristin; Jonsson, Halldor; Gudnason, Vilmundur; Matthiasson, Thorolfur; Jonsson, Brynjolfur Y

    2008-09-01

    Total hip replacement (THR) is a common and costly procedure. The number of THR is expected to increase over the coming years. Two pathways of postoperative treatment were compared in a randomized study. Fifty patients from two hospitals were randomized into a study group (SG) of 27 patients receiving preoperative and postoperative education programs, as well as home visits from an outpatient team. A control group (CG) of 23 patients received "conventional" rehabilitation augmented by a stay at a rehabilitation center if needed. All costs for the two groups both in hospitals and after discharge were collected and analyzed. On average total costs for the SG were $8,550 and $11,952 for the CG, a 28% cost reduction. Total inpatient costs were $5,225 for the SG and $6,515 for the CG. In a regression analysis the group difference is statistically significant. Adjusting for changes in the Oxford Hip Score gives effective costs (C/E). The ratio of the SGs C/E to the CGs is 0.60. That is a cost-effectiveness gain of 40%. A shorter hospital stay augmented with better preoperative education and home treatment appears to be more effective and costs less than the traditional in hospital pathway of treatment.

  8. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De...

  9. Searching for a hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Sanchis-Lozano Miguel-Angel

    2016-01-01

    Full Text Available A hidden sector beyond the Standard Model can show up in multiparticle production altering inclusive correlations and factorial cumulants of multiplicity distributions. In this report such a study is advocated with a special emphasis on the searches at LHC.

  10. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  11. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  12. Is the Hidden Curriculum a Relevant Issue in Educational Processes

    Directory of Open Access Journals (Sweden)

    Patarroyo Esther

    2004-08-01

    Full Text Available This paper explores some ideas about the hidden curriculum as an amount of ideas and beliefs which are implicit in an indirect way into the scholar life. Those ideas are regarding to gender equality, social status and racial difference, among others. We consider teachers are able to integrate the hidden curriculum as a pedagogical strategy in the classroom. Examples of integration include activities such as observation techniques, role-plays, peer modeling and particularly, the portfolio as a useful tool for reflection which reveals the hidden curriculum. Key words: Hidden Curriculum, Pedagogical Strategy, Portfolio, ELT Processes, Stereotypes Este documento explora algunas ideas acerca del currículo oculto como una suma de ideas y creencias que están implícitos de una forma indirecta dentro de la vida escolar. Estas ideas están relacionadas con la equidad de género, diferencias sociales y raciales, entre otros. Consideramos que es posible para los docentes integrar el currículo como estrategia pedagógica en el aula. Ejemplos de esta integración incluyen técnicas de observación, juegos de roles, modelamiento en parejas y particularmente, el portafolio como herramienta de reflexión que permita hacer evidente el currículo oculto. Palabras claves: Currículo Oculto, Estrategia Pedagógica, Estereotipos, Enseñanza de Inglés, Portafolio

  13. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.

    2015-01-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the nei...

  14. The Hidden Curriculum of Youth Policy: A Dutch Example

    NARCIS (Netherlands)

    Hopman, M.; De Winter, M.; Koops, W.

    2014-01-01

    Youth policy is more than a mere response to the actual behavior of children, but it is equally influenced by values and beliefs of policy makers. These values are however rarely made explicit and, therefore, the authors refer to them as “the hidden curriculum” of youth policy. The study investigati

  15. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel

    2016-01-01

    Most signatures of new physics in colliders have been studied so far on the transverse plane with respect to the beam direction. In this work however we study the impact of a hidden sector beyond the Standard Model (SM) on inclusive (pseudo)rapidity correlations and moments of the multiplicity distributions, with special emphasis in the LHC results.

  16. From epistemology to hidden curriculum: Critical vs. 'commercial' pedagogic perspective

    Directory of Open Access Journals (Sweden)

    Marojević Jovana C.

    2016-01-01

    Full Text Available Knowledge or, more precisely, its power is one of central themes in critical pedagogy. Since they are interested in school as the site of social critique, aimed at social transformations, critically oriented pedagogues pay special attention to the relation of knowledge and power or, to simplify it, the function of knowledge in the reproduction of the existing (often oppressive social relations. Not recognizing school as a mere site of social, economic or cultural preservation, they often study epistemology on which modern school is founded (positivistic epistemology and its hidden curriculum who function so that they legitimate social reproductive function of the school in a continuous cycle of self-justification. Since a certain understanding of knowledge and its function reveals the hidden curriculum of a certain educational philosophy, and since this consequently changes school into a site of social transformation or social transmission, viewed from the critical position this is the subject of the analysis of our paper. By final sublimation and contrasting the opposite positivistic and critical positions we conclude that the hidden curriculum of the first is the curriculum of the soliloquies while the curriculum of the second, critical tendency is entirely of a dialogue nature. It is clear that uni-directedness of the hidden curriculum formed according the postulates of positivistic epistemology can contribute only to positivistic transmission and regeneration of the existing social order, while the discursivity of critically oriented school defines the relation towards society as two-way, transformational, active and emancipatory.

  17. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  18. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...

  19. Thermoelectric generator hidden in a shirt with a fabric radiator

    Science.gov (United States)

    Leonov, Vladimir; Vullers, Ruud J. M.; Hoof, Chris Van

    2012-06-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers of a shirt and its characteristics are reported.

  20. Discriminative training of self-structuring hidden control neural models

    DEFF Research Database (Denmark)

    Sørensen, Helge Bjarup Dissing; Hartmann, Uwe; Hunnerup, Preben

    1995-01-01

    This paper presents a new training algorithm for self-structuring hidden control neural (SHC) models. The SHC models were trained non-discriminatively for speech recognition applications. Better recognition performance can generally be achieved, if discriminative training is applied instead. Thus...

  1. Old, New and Hidden Causes of Perioperative Hypersensitivity.

    Science.gov (United States)

    Garvey, Lene Heise

    2016-01-01

    Perioperative hypersensitivity reactions are rare, often life-threatening events, and subsequent investigations to identify the culprit are important to avoid re-exposure. All exposures in the perioperative setting may potentially be the cause of a hypersensitivity reaction, but drugs administered intravenously such as neuromuscular blocking agents (NMBA), induction agents and antibiotics have traditionally been reported to be implicated most commonly. It has recently become apparent that there are geographical differences in sensitization patterns related to variation in exposures, referral patterns and performance and interpretation of investigations. Differences in sensitization to NMBAs are partly explained by cross sensitization to pholcodine, an ingredient in cough-medicines available in some countries. While NMBAs are the most common causes of perioperative hypersensitivity in some countries, this may not necessarily be the case in all countries. New and hidden allergens have emerged as causes of perioperative hypersensitivity such as blue dyes, chlorhexidine and excipients. Detailed knowledge of the events at the time of reaction is necessary to identify potential culprits including rare and hidden allergens. Cooperation between allergists and anaesthetists, or other staff present perioperatively, is often needed to identify hidden or even undocumented exposures. The objectives of this review are to provide an overview of the history of investigation of perioperative hypersensitivity, to describe the differences in causes of perioperative hypersensitivity emerging over time and to increase awareness about the "hidden allergens" in the perioperative setting. Some practical advice on how to approach the patient testing negative on all initial investigations is also included.

  2. Beyond the hidden curriculum: The challenging search for authentic ...

    African Journals Online (AJOL)

    2013-11-01

    Nov 1, 2013 ... [6] It was erroneously assumed that medical students ... hidden curriculum, therefore, demands an authentic and comprehensive enquiry into the concept of human dignity, ... reasoning that underpins the desirable values-based healthcare. ... and highly interpersonal form of teaching and learning that takes.

  3. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    2014-01-01

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated S-lemma

  4. Recognizing Strokes in Tennis Videos Using Hidden Markov Models

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, W.; Zivkovic, Z.

    2001-01-01

    This paper addresses content-based video retrieval with an emphasis on recognizing events in tennis game videos. In particular, we aim at recognizing different classes of tennis strokes using automatic learning capability of Hidden Markov Models. Driven by our domain knowledge, a robust player segme

  5. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving...

  6. Evolving the Topology of Hidden Markov Models using Evolutionary Algorithms

    DEFF Research Database (Denmark)

    Thomsen, Réne

    2002-01-01

    Hidden Markov models (HMM) are widely used for speech recognition and have recently gained a lot of attention in the bioinformatics community, because of their ability to capture the information buried in biological sequences. Usually, heuristic algorithms such as Baum-Welch are used to estimate...

  7. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a techniqu

  8. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  9. Optical Test of Local Hidden-Variable Model

    Institute of Scientific and Technical Information of China (English)

    WU XiaoHua; ZONG HongShi; PANG HouRong

    2001-01-01

    An inequality is deduced from local realism and a supplementary assumption. This inequality defines an experiment that can be actually performed with the present technology to test local hidden-variable models, and it is violated by quantum mechanics with a factor 1.92, while it can be simplified into a form where just two measurements are required.``

  10. New Caledonian crows reason about hidden causal agents.

    Science.gov (United States)

    Taylor, Alex H; Miller, Rachael; Gray, Russell D

    2012-10-02

    The ability to make inferences about hidden causal mechanisms underpins scientific and religious thought. It also facilitates the understanding of social interactions and the production of sophisticated tool-using behaviors. However, although animals can reason about the outcomes of accidental interventions, only humans have been shown to make inferences about hidden causal mechanisms. Here, we show that tool-making New Caledonian crows react differently to an observable event when it is caused by a hidden causal agent. Eight crows watched two series of events in which a stick moved. In the first set of events, the crows observed a human enter a hide, a stick move, and the human then leave the hide. In the second, the stick moved without a human entering or exiting the hide. The crows inspected the hide and abandoned probing with a tool for food more often after the second, unexplained series of events. This difference shows that the crows can reason about a hidden causal agent. Comparative studies with the methodology outlined here could aid in elucidating the selective pressures that led to the evolution of this cognitive ability.

  11. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  12. Search for dark photons from supersymmetric hidden valleys

    NARCIS (Netherlands)

    Abazov, V.M.; et al., [Unknown; Ancu, L.S.; de Jong, S.J.; Filthaut, F.; Galea, C.F.; Hegeman, J.G.; Houben, P.; Meijer, M.M.; Svoisky, P.; van den Berg, P.J.; van Leeuwen, W.M.

    2009-01-01

    We search for a new light gauge boson, a dark photon, with the D0 experiment. In the model we consider, supersymmetric partners are pair produced and cascade to the lightest neutralinos that can decay into the hidden sector state plus either a photon or a dark photon. The dark photon decays through

  13. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  14. Simple yet Hidden Counterexamples in Undergraduate Real Analysis

    Science.gov (United States)

    Shipman, Barbara A.; Shipman, Patrick D.

    2013-01-01

    We study situations in introductory analysis in which students affirmed false statements as true, despite simple counterexamples that they easily recognized afterwards. The study draws attention to how simple counterexamples can become hidden in plain sight, even in an active learning atmosphere where students proposed simple (as well as more…

  15. On local-hidden-variable no-go theorems

    Science.gov (United States)

    Methot, A. A.

    2006-06-01

    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky, and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimately doomed in 1964 with the work of Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus, we will discuss here the three principal forms of no-go theorems for local hidden variable theories of Nature. We will define Bell theorems, Bell theorems without inequalities, and pseudo-telepathy. A discussion of the similarities and differences will follow.

  16. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  17. Isovector and hidden-beauty partners of the X(3872)

    CERN Document Server

    Hogaasen, Hallstein; Richard, Jean-Marc; Sorba, Paul

    2014-01-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks (H. Hogaasen, J-M. Richard and P. Sorba, Phys. Rev. D73, 054013, 2006). The extension to the hidden-beauty sector is discussed.

  18. Bayesian online algorithms for learning in discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2008-01-01

    We propose and analyze two different Bayesian online algorithms for learning in discrete Hidden Markov Models and compare their performance with the already known Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalization we draw learning curves in simplified situations for these algorithms and compare their performances.

  19. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  20. Coding deficits in noise-induced hidden hearing loss may stem from incomplete repair of ribbon synapses in the cochlea

    Directory of Open Access Journals (Sweden)

    Lijuan eShi

    2016-05-01

    Full Text Available Recent evidence has shown that noise-induced damage to the synapse between inner hair cells (IHCs and type I afferent auditory nerve fibers (ANFs may occur in the absence of permanent threshold shift (PTS, and that synapses connecting IHCs with low spontaneous rate (SR ANFs are disproportionately affected. Due to the functional importance of low-SR ANF units for temporal processing and signal coding in noisy backgrounds, deficits in cochlear coding associated with noise-induced damage may result in significant difficulties with temporal processing and hearing in noise (i.e., hidden hearing loss. However, significant noise-induced coding deficits have not been reported at the single unit level following the loss of low-SR units. We have found evidence to suggest that some aspects of neural coding are not significantly changed with the initial loss of low-SR ANFs, and that further coding deficits arise in association with the subsequent reestablishment of the synapses. This suggests that synaptopathy in hidden hearing loss may be the result of insufficient repair of disrupted synapses, and not simply due to the loss of low-SR units. These coding deficits include decreases in driven spike rate for intensity coding as well as several aspects of temporal coding: spike latency, peak-to-sustained spike ratio and the recovery of spike rate as a function of click-interval.

  1. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  2. Hidden Owners, Hidden Profits, and Poor Nursing Home Care: A Case Study.

    Science.gov (United States)

    Harrington, Charlene; Ross, Leslie; Kang, Taewoon

    2015-01-01

    The study examined the ownership transparency, financial accountability, and quality indicators of a regional for-profit nursing home chain in California, using a case study methodology to analyze data on the chain's ownership and management structure, financial data, staffing levels, deficiencies and complaints, and litigation. Secondary data were obtained from regulatory and cost reports and litigation cases. Qualitative descriptions of ownership and management were presented and quantitative analyses were conducted by comparing financial and quality indicators with other California for-profit chains, for-profit non-chains, and nonprofit nursing home groups in 2011. The chain's complex, interlocking individual and corporate owners and property companies obscured its ownership structure and financial arrangements. Nursing and support services expenditures were lower than nonprofits and administrative costs were higher than for-profit non-chains. The chain's nurse staffing was lower than expected staffing levels; its deficiencies and citations were higher than in nonprofits; and a number of lawsuits resulted in bankruptcy. Profits were hidden in the chain's management fees, lease agreements, interest payments to owners, and purchases from related-party companies. Greater ownership transparency and financial accountability requirements are needed to ensure regulatory oversight and quality of care.

  3. Prevention of Heel Pressure Injuries and Plantar Flexion Contractures With Use of a Heel Protector in High-Risk Neurotrauma, Medical, and Surgical Intensive Care Units: A Randomized Controlled Trial.

    Science.gov (United States)

    Meyers, Tina

    The purpose of this study was to compare the use of a heel protector to standard of care (pillows) in the prevention of hospital-acquired pressure injuries (HAPI) of the heels and prevention of plantar flexion contractures. Randomized controlled trial. The study took place on a surgical intensive care unit, medical intensive care unit, and neurotrauma intensive care unit. Inclusion criteria were a minimum of 5 days of sedation related to care for a critical illness, immobility for 6 to 8 hours before study initiation, a Braden Scale for Pressure Sore Risk score 18 or less, and a mobility subscale score 2 or less. Patients were included if they had preexisting heel pressure injury or plantar flexion contracture. The sample comprised 54 subjects; 37 were randomly allocated to the intervention group and 17 to the control group. Their average age-mean (standard deviation)-was 40.7 (14.96) years in the control group and 44.6 (17.15) years in the intervention group. Data were collected from patients' electronic medical records. We recorded subject demographics, presence of diabetes mellitus or peripheral vascular disease, Glasgow Coma Scale scores (every shift), Braden Scale for Pressure Sore Risk scores (every shift), heel skin assessments (every shift), goniometric measurements (every other day), and adverse events (every shift). Assessments and measurements were continued until the patient was discharged from the study. None of the patients in the intervention group developed HAPI of the heels, as compared to 7 in the control group (0% vs 41%, P prevention of HAPI of the heel and contractures as compared to standard care using pillows to position the heel and redistribute pressure.

  4. Randomized trial to compare the safety and immunogenicity of CSL Limited's 2009 trivalent inactivated influenza vaccine to an established vaccine in United States children.

    Science.gov (United States)

    Brady, Rebecca C; Hu, Wilson; Houchin, Vonda G; Eder, Frank S; Jackson, Kenneth C; Hartel, Gunter F; Sawlwin, Daphne C; Albano, Frank R; Greenberg, Michael

    2014-12-12

    A trivalent inactivated influenza vaccine (CSL's TIV, CSL Limited) was licensed under USA accelerated approval regulations for use in persons≥18 years. We performed a randomized, observer-blind study to assess the safety and immunogenicity of CSL's TIV versus an established US-licensed vaccine in a population≥6 months to loss of appetite (for Cohort A) and malaise (for Cohort B) were also significantly higher for CSL's TIV compared to the established vaccine. Post-vaccination geometric mean titers (GMTs) for CSL's TIV versus the established vaccine were 385.49 vs. 382.45 for H1N1; 669.13 vs. 705.61 for H3N2; and 100.65 vs. 93.72 for B. CSL's TIV demonstrated immunological non-inferiority to the established vaccine in all cohorts.

  5. 基于随机振动时可靠性约束的商用室外机管路优化%Pipes Optimization of Outdoor Unit of Commercial Air Conditioner Based on Reliability Constraint during Random Vibration

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

      应用ANSYS对随机振动下商用室外机管路的响应进行分析,应用Miner线性疲劳累计损伤理论和材料的S-N曲线,估算室外机的疲劳寿命,结合正交试验表,确定商用室外机管路最佳尺寸组合,提升室外机的疲劳寿命。%In this article, the FEA software ANSYS is used to simulate the stress distribution of the outdoor unit of commercial air conditioner caused by the random vibration. The Miner’s linear fatigue accumulation rule and the S-N curve of the materials are used to estimate the fatigue life of the outdoor unit of the commercial air conditioner. The orthogonal experiment is used to analyze the optimum size of pipe structure, so as to improve the fatigue life of outdoor unit.

  6. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model

    Science.gov (United States)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao

    2014-11-01

    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  7. Autoregressive hidden Markov models for the early detection of neonatal sepsis.

    Science.gov (United States)

    Stanculescu, Ioan; Williams, Christopher K I; Freer, Yvonne

    2014-09-01

    Late onset neonatal sepsis is one of the major clinical concerns when premature babies receive intensive care. Current practice relies on slow laboratory testing of blood cultures for diagnosis. A valuable research question is whether sepsis can be reliably detected before the blood sample is taken. This paper investigates the extent to which physiological events observed in the patient's monitoring traces could be used for the early detection of neonatal sepsis. We model the distribution of these events with an autoregressive hidden Markov model (AR-HMM). Both learning and inference carefully use domain knowledge to extract the baby's true physiology from the monitoring data. Our model can produce real-time predictions about the onset of the infection and also handles missing data. We evaluate the effectiveness of the AR-HMM for sepsis detection on a dataset collected from the Neonatal Intensive Care Unit at the Royal Infirmary of Edinburgh.

  8. Hidden degrees of freedom in aperiodic materials.

    Science.gov (United States)

    Toudic, Bertrand; Garcia, Pilar; Odin, Christophe; Rabiller, Philippe; Ecolivet, Claude; Collet, Eric; Bourges, Philippe; McIntyre, Garry J; Hollingsworth, Mark D; Breczewski, Tomasz

    2008-01-04

    Numerous crystalline materials, including those of bioorganic origin, comprise incommensurate sublattices whose mutual arrangement is described in a superspace framework exceeding three dimensions. We report direct observation by neutron diffraction of superspace symmetry breaking in a solid-solid phase transition of an incommensurate host-guest system: the channel inclusion compound of nonadecane/urea. Strikingly, this phase transition generates a unit cell doubling that concerns only the modulation of one substructure by the other-an internal variable available only in superspace. This unanticipated pathway for degrees of freedom to rearrange leads to a second phase transition, which again is controlled by the higher dimensionality of superspace. These results reveal nature's capacity to explore the increased number of phases allowed in aperiodic crystals.

  9. Effect of Spike Lavender Lakhlakhe on Pain Intensity Due to Phlebotomy Procedure in Premature Infants Hospitalized in Neonatal Intensive Care Unit: A Randomized Clinical Trial

    Directory of Open Access Journals (Sweden)

    Noushin Beheshtipoor

    2017-06-01

    Full Text Available Background: A Premature infants undergo multiple painful procedures during treatment; thus, it must be tried to limit complications caused by diagnostic and treatment procedures using simple and practical methods. This study was performed to evaluate the effect of spike lavender lakhlakhe on pain intensity due to phlebotomy in hospitalized premature infants.Methods: This single-arm, randomized clinical trial was performed on 30 infants chosen through convenience sampling method. Each newborn was considered as its own control. For the test group, one drop of pure (100% spike lavender lakhlakhe was taken by a standard dropper and diluted with 4 ml of warm distilled water by the research assistant. This mixture was stirred at 2-3 cm distance of the newborns’ nose from 60 minutes before until 2 minutes after phlebotomy, such that it could be smelled by the newborns. In both groups, heart rate and blood oxygen saturation were measured by a standard portable device, and the corresponding data was recorded in data collection sheets. Moreover, the infants’ facial expression changes were recorded by a camera and the intensity of pain was measured by Premature Infant Pain Profile before and after the procedure. Finally, the data was analyzed by paired comparison analysis test in SPSS, version 17.Results: Comparison of mean pain intensity caused by phlebotomy in the control and test groups showed a significant difference (7.667±0.311 vs. 4.882±0.311; P

  10. Random duality

    Institute of Scientific and Technical Information of China (English)

    GUO TieXin; CHEN XinXiang

    2009-01-01

    The purpose of this paper is to provide a random duality theory for the further development of the theory of random conjugate spaces for random normed modules.First,the complicated stratification structure of a module over the algebra L(μ,K) frequently makes our investigations into random duality theory considerably different from the corresponding ones into classical duality theory,thus in this paper we have to first begin in overcoming several substantial obstacles to the study of stratification structure on random locally convex modules.Then,we give the representation theorem of weakly continuous canonical module homomorphisms,the theorem of existence of random Mackey structure,and the random bipolar theorem with respect to a regular random duality pair together with some important random compatible invariants.

  11. Random duality

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The purpose of this paper is to provide a random duality theory for the further development of the theory of random conjugate spaces for random normed modules. First, the complicated stratification structure of a module over the algebra L(μ, K) frequently makes our investigations into random duality theory considerably difierent from the corresponding ones into classical duality theory, thus in this paper we have to first begin in overcoming several substantial obstacles to the study of stratification structure on random locally convex modules. Then, we give the representation theorem of weakly continuous canonical module homomorphisms, the theorem of existence of random Mackey structure, and the random bipolar theorem with respect to a regular random duality pair together with some important random compatible invariants.

  12. Random complex fewnomials, I

    CERN Document Server

    Shiffman, Bernard

    2010-01-01

    We introduce several notions of `random fewnomials', i.e. random polynomials with a fixed number f of monomials of degree N. The f exponents are chosen at random and then the coefficients are chosen to be Gaussian random, mainly from the SU(m + 1) ensemble. The results give limiting formulas as N goes to infinity for the expected distribution of complex zeros of a system of k random fewnomials in m variables. When k = m, for SU(m + 1) polynomials, the limit is the Monge-Ampere measure of a toric Kaehler potential on CP^m obtained by averaging a `discrete Legendre transform' of the Fubini-Study symplectic potential at f points of the unit simplex in R^m.

  13. Study on Accelerating Random Linear Network Coding on Graphics Processors Units%GPU加速随机线性网络编码的研究

    Institute of Scientific and Technical Information of China (English)

    潘晓辉

    2012-01-01

    网络编码近年来被广泛用于各种分布式系统以提高吞吐量,并且能在网络发生动态变化时的数据传输提供弹性.但是,网络编码引起的大量的额外计算量和编码时间成为了实际应用的障碍.在这个研究中,我们使用GPU的强大计算能力来加速网络编码.通过将大量可并行的计算安排到GPU上执行,有效地缩短了网络编码所需要的时间,为网络编码的实际应用提供了帮助.%Network coding has recently been widely applied in various distributed systems for throughput improvement and/or resilience to network dynamics. However, the computational overhead introduced by network coding operations is not negligible and has become the obstacle for practical deployment of network coding. In this study, we exploit the computing power of commodity many-core Graphic Processing Units (GPUs) and multi-core CPUs to accelerate the network coding operations. With the implementation of the algorithms, it is able to achieve significant encoding and decoding throughput, providing a solution for the practical use of network coding.

  14. Optimal Decision of Unit Carbon Capture Rate Using Multiple Random Variable Superquantile%采用多随机变量超分位数方法的机组碳捕集率优化决策

    Institute of Scientific and Technical Information of China (English)

    周任军; 刘志勇; 李献梅; 陈瑞先; 闵雄帮; 尹权

    2014-01-01

    The benefit of carbon capture unit closely relates with electricity price and price of carbon emission permit, in the optimization model of unit carbon capture rate, in which the cost of electricity selling, the cost of carbon emission permit transaction cost and the fuel cost are taken as variables in objective function, the randomness of the electricity price and the price of carbon emission permit are considered simultaneously, and a multiple random variable superquantile method is proposed and derived to turn the optimization model of unit carbon capture rate into the optimization model of unit carbon capture rate in the form of random function that is easy to solve by toolbox. Three kinds of calculation results, namely the price fluctuations of both electricity and carbon emission permit are not considered, only the price fluctuation of carbon emission permit is considered and the price fluctuations of both electricity and carbon emission permit are considered, are contrasted and analyzed. Case simulation results show that considering the price randomness of both electricity and carbon emission permit the flexibility of power grid to adjust the carbon capture rate is enhanced; the mechanism of electricity market and carbon trading market is actively responded, thus the overall operating cost of carbon capture system can be reduced.%碳捕集机组的效益与电价、碳排放权价格密切相关,在售电损失费用、碳排放权交易费用和燃料费用为目标函数的机组碳捕集率优化模型中,同时考虑电价与碳排放权价格的随机性,提出并推导了多随机变量超分位数方法,将机组碳捕集率优化模型变为机组碳捕集率随机函数型的优化模型,便于利用工具箱求解。对比分析了不考虑电价和碳排放权价格波动,仅考虑碳排放权价格波动以及考虑电价与碳排放权价格波动的机组碳捕集率优化模型的3种计算结果。算例仿真结果表明,同

  15. [Intel random number generator-based true random number generator].

    Science.gov (United States)

    Huang, Feng; Shen, Hong

    2004-09-01

    To establish a true random number generator on the basis of certain Intel chips. The random numbers were acquired by programming using Microsoft Visual C++ 6.0 via register reading from the random number generator (RNG) unit of an Intel 815 chipset-based computer with Intel Security Driver (ISD). We tested the generator with 500 random numbers in NIST FIPS 140-1 and X(2) R-Squared test, and the result showed that the random number it generated satisfied the demand of independence and uniform distribution. We also compared the random numbers generated by Intel RNG-based true random number generator and those from the random number table statistically, by using the same amount of 7500 random numbers in the same value domain, which showed that the SD, SE and CV of Intel RNG-based random number generator were less than those of the random number table. The result of u test of two CVs revealed no significant difference between the two methods. Intel RNG-based random number generator can produce high-quality random numbers with good independence and uniform distribution, and solves some problems with random number table in acquisition of the random numbers.

  16. Hidden symmetries enhance quantum transport in Light Harvesting systems

    CERN Document Server

    Zech, Tobias; Wellens, Thomas; Buchleitner, Andreas

    2012-01-01

    For more than 50 years we have known that photosynthetic systems harvest solar energy with almost unit {\\it quantum efficiency}. However, recent experimental evidence of {\\it quantum coherence} during the excitonic energy transport in photosynthetic organisms challenges our understanding of this fundamental biological function. Currently, and despite numerous efforts, the causal connection between coherence and efficiency is still a matter of debate. We show, through the study of extensive simulations of quantum coherent transport on networks, that three dimensional structures characterized by centro-symmetric Hamiltonians are statistically more efficient than random arrangements. Moreover, we demonstrate that the experimental data available for the electronic Hamiltonians of the Fenna-Mathew-Olson (FMO) complex of sulfur bacteria and of the crypophyte PC645 complex of marine algae are consistent with this strong correlation of centro-symmetry with quantum efficiency. These results show that what appears to b...

  17. Engineering of Algorithms for Hidden Markov models and Tree Distances

    DEFF Research Database (Denmark)

    Sand, Andreas

    grown exponentially because of drastic improvements in the technology behind DNA and RNA sequencing, and focus on the research field has increased due to its potential to expand our knowledge about biological mechanisms and to improve public health. There has therefore been a continuously growing demand...... of the algorithms to exploit the parallel architecture of modern computers. In this PhD dissertation, I present my work with algorithmic optimizations and parallelizations in primarily two areas in algorithmic bioinformatics: algorithms for analyzing hidden Markov models and algorithms for computing distance...... measures between phylogenetic trees. Hidden Markov models is a class of probabilistic models that is used in a number of core applications in bioinformatics such as modeling of proteins, gene finding and reconstruction of species and population histories. I show how a relatively simple parallelization can...

  18. Extraction of hidden information by efficient community detection in networks

    CERN Document Server

    Lee, Juyong; Lee, Jooyoung

    2012-01-01

    Currently, we are overwhelmed by a deluge of experimental data, and network physics has the potential to become an invaluable method to increase our understanding of large interacting datasets. However, this potential is often unrealized for two reasons: uncovering the hidden community structure of a network, known as community detection, is difficult, and further, even if one has an idea of this community structure, it is not a priori obvious how to efficiently use this information. Here, to address both of these issues, we, first, identify optimal community structure of given networks in terms of modularity by utilizing a recently introduced community detection method. Second, we develop an approach to use this community information to extract hidden information from a network. When applied to a protein-protein interaction network, the proposed method outperforms current state-of-the-art methods that use only the local information of a network. The method is generally applicable to networks from many areas.

  19. Effectiveness of AODV Protocol under Hidden Node Environment

    Science.gov (United States)

    Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit

    IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.

  20. Perpetual points and hidden attractors in dynamical systems

    Energy Technology Data Exchange (ETDEWEB)

    Dudkowski, Dawid, E-mail: dawid.dudkowski@p.lodz.pl [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland); Prasad, Awadhesh [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India); Kapitaniak, Tomasz [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland)

    2015-10-23

    We discuss the use of perpetual points for tracing the hidden and the rare attractors of dynamical systems. The analysis of perpetual points and their co-existence due to the parameters values is presented and the impact of these points on the behavior of the systems is shown. The results are obtained for single as well as coupled externally excited van der Pol–Duffing oscillators. The presented results can be generalized to other systems having different dynamics. - Highlights: • Computation of perpetual points in forced nonlinear dynamical systems. • Locating the hidden and rare attractors using perpetual points. • Analysis of states and different types of synchronization in coupled systems. • Understanding the complexity in coupled and uncoupled forced van der Pol–Duffing oscillator.

  1. Penta-Quark States with Strangeness, Hidden Charm and Beauty

    Science.gov (United States)

    Wu, Jia-Jun; Zou, Bing-Song

    The classical quenched quark models with three constituent quarks provide a good description for the baryon spatial ground states, but fail to reproduce the spectrum of baryon excited states. More and more evidences suggest that unquenched effects with multi-quark dynamics are necessary ingredients to solve the problem. Several new hyperon resonances reported recently could fit in the picture of penta-quark states. Based on this picture, some new hyperon excited states were predicted to exist; meanwhile with extension from strangeness to charm and beauty, super-heavy narrow N* and Λ* resonances with hidden charm or beauty were predicted to be around 4.3 and 11 GeV, respectively. Recently, two of such N* with hidden charm might have been observed by the LHCb experiment. More of those states are expected to be observed in near future. This opens a new window in order to study hadronic dynamics for the multi-quark states.

  2. Penta-quark States with Strangeness, Hidden Charm and Beauty

    CERN Document Server

    Wu, Jia-Jun

    2015-01-01

    The classical quenched quark models with three constituent quarks provide a good description for the baryon spatial ground states, but fail to reproduce the spectrum of baryon excited states. More and more evidences suggest that unquenched effects with multi-quark dynamics are necessary ingredients to solve the problem. Several new hyperon resonances reported recently could fit in the picture of penta-quark states. Based on this picture, some new hyperon excited states were predicted to exist; meanwhile with extension from strangeness to charm and beauty, super-heavy narrow $N^*$ and $\\Lambda^*$ resonances with hidden charm or beauty were predicted to be around 4.3 and 11 GeV, respectively. Recently, two of such $N^*$ with hidden charm might have been observed by the LHCb experiment. More of those states are expected to be observed in near future. This opens a new window in order to study hadronic dynamics for the multi-quark states.

  3. Markov chain Monte Carlo simulation for Bayesian Hidden Markov Models

    Science.gov (United States)

    Chan, Lay Guat; Ibrahim, Adriana Irawati Nur Binti

    2016-10-01

    A hidden Markov model (HMM) is a mixture model which has a Markov chain with finite states as its mixing distribution. HMMs have been applied to a variety of fields, such as speech and face recognitions. The main purpose of this study is to investigate the Bayesian approach to HMMs. Using this approach, we can simulate from the parameters' posterior distribution using some Markov chain Monte Carlo (MCMC) sampling methods. HMMs seem to be useful, but there are some limitations. Therefore, by using the Mixture of Dirichlet processes Hidden Markov Model (MDPHMM) based on Yau et. al (2011), we hope to overcome these limitations. We shall conduct a simulation study using MCMC methods to investigate the performance of this model.

  4. Wikipedia mining of hidden links between political leaders

    CERN Document Server

    Frahm, Klaus M; Shepelyansky, Dima L

    2016-01-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  5. Attribute-Based Encryption with Partially Hidden Ciphertext Policies

    Science.gov (United States)

    Nishide, Takashi; Yoneyama, Kazuki; Ohta, Kazuo

    We propose attribute-based encryption schemes where encryptor-specified policies (called ciphertext policies) are hidden. By using our schemes, an encryptor can encrypt data with a hidden access control policy. A decryptor obtains her secret key associated with her attributes from a trusted authority in advance and if the attributes associated with the decryptor's secret key do not satisfy the access control policy associated with the encrypted data, the decryptor cannot decrypt the data or guess even what access control policy was specified by the encryptor. We prove security of our construction based on the Decisional Bilinear Diffie-Hellman assumption and the Decision Linear assumption. In our security notion, even the legitimate decryptor cannot obtain the information about the access control policy associated with the encrypted data more than the fact that she can decrypt the data.

  6. Inhomogeneous spatial point processes with hidden second-order stationarity

    DEFF Research Database (Denmark)

    Hahn, Ute; Jensen, Eva B. Vedel

    correlation function g(u, v) is a function of u −˘ v, where −˘ is a generalized subtraction operator. For the reweighted second-order stationary processes, the subtraction operator is simply u −˘ v = u − v. The processes in the extended class are called hidden second-order stationary because, in many cases......Modelling of inhomogeneous spatial point patterns is a challenging research area with numerous applications in diverse areas of science. In recent years, the focus has mainly been on the class of reweighted second-order stationary point processes that is characterized by the mathematically...... attractive property of a translation invariant pair correlation function. Motivated by examples where this model class is not adequate, we extend the class of reweighted second-order stationary processes. The extended class consists of hidden second-order stationary point processes for which the pair...

  7. Hidden Wounds? Inflammatory Links Between Childhood Trauma and Psychopathology.

    Science.gov (United States)

    Danese, Andrea; Baldwin, Jessie R

    2017-01-03

    Childhood trauma is a key risk factor for psychopathology. However, little is known about how exposure to childhood trauma is translated into biological risk for psychopathology. Observational human studies and experimental animal models suggest that childhood exposure to stress can trigger an enduring systemic inflammatory response not unlike the bodily response to physical injury. In turn, these "hidden wounds" of childhood trauma can affect brain development, key behavioral domains (e.g., cognition, positive valence systems, negative valence systems), reactivity to subsequent stressors, and, ultimately, risk for psychopathology. Further research is needed to better characterize the inflammatory links between childhood trauma and psychopathology. Detecting and healing these hidden wounds may help prevent and treat psychopathology emerging after childhood trauma.

  8. A Sequence of Relaxations Constraining Hidden Variable Models

    CERN Document Server

    Steeg, Greg Ver

    2011-01-01

    Many widely studied graphical models with latent variables lead to nontrivial constraints on the distribution of the observed variables. Inspired by the Bell inequalities in quantum mechanics, we refer to any linear inequality whose violation rules out some latent variable model as a "hidden variable test" for that model. Our main contribution is to introduce a sequence of relaxations which provides progressively tighter hidden variable tests. We demonstrate applicability to mixtures of sequences of i.i.d. variables, Bell inequalities, and homophily models in social networks. For the last, we demonstrate that our method provides a test that is able to rule out latent homophily as the sole explanation for correlations on a real social network that are known to be due to influence.

  9. Wikipedia mining of hidden links between political leaders

    Science.gov (United States)

    Frahm, Klaus M.; Jaffrès-Runser, Katia; Shepelyansky, Dima L.

    2016-12-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  10. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  11. Perpetual points and hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Prasad, Awadhesh; Kapitaniak, Tomasz

    2015-10-01

    We discuss the use of perpetual points for tracing the hidden and the rare attractors of dynamical systems. The analysis of perpetual points and their co-existence due to the parameters values is presented and the impact of these points on the behavior of the systems is shown. The results are obtained for single as well as coupled externally excited van der Pol-Duffing oscillators. The presented results can be generalized to other systems having different dynamics.

  12. Uncovering Hidden Mathematics of the Multiplication Table Using Spreadsheets

    Directory of Open Access Journals (Sweden)

    Sergei Abramovich

    2007-05-01

    Full Text Available This paper reveals a number of learning activities emerging from a spreadsheetgenerated multiplication table. These activities are made possible by using such features of the software as conditional formatting, circular referencing, calculation through iteration, scroll bars, and graphing. The paper is a reflection on a mathematics content course designed for prospective elementary teachers using the hidden mathematics curriculum framework. It is written in support of standards for teaching and recommendations for teachers in North America.

  13. Blind Extraction and Security Analysis of Spread Spectrum Hidden Watermarks

    Science.gov (United States)

    2012-04-01

    DATES COVERED (From - To) JAN 2009 – DEC 2010 4. TITLE AND SUBTITLE BLIND EXTRACTION AND SECURITY ANALYSIS OF SPREAD SPECTRUM HIDDEN WATERMARKS ...Multi Signature Embedding, Watermarking , DSSS. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 15 19a... watermarks John A. Marsh*a,b, and Gerard F. Wohlrabc aSUNY Institute of Technology, 100 Seymour Dr., Utica, NY 13502; bAssured Information

  14. Hidden Markov Model Based Automated Fault Localization for Integration Testing

    OpenAIRE

    Ge, Ning; NAKAJIMA, SHIN; Pantel, Marc

    2013-01-01

    International audience; Integration testing is an expensive activity in software testing, especially for fault localization in complex systems. Model-based diagnosis (MBD) provides various benefits in terms of scalability and robustness. In this work, we propose a novel MBD approach for the automated fault localization in integration testing. Our method is based on Hidden Markov Model (HMM) which is an abstraction of system's component to simulate component's behaviour. The core of this metho...

  15. Information- Theoretic Analysis for the Difficulty of Extracting Hidden Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wei-ming; LI Shi-qu; CAO Jia; LIU Jiu-fen

    2005-01-01

    The difficulty of extracting hidden information,which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the theoretic conclusion is used to analyze the actual extracting attack on Least Significant Bit(LSB) steganographic algorithms.

  16. Abdominal candidiasis is a hidden reservoir of echinocandin resistance.

    Science.gov (United States)

    Shields, Ryan K; Nguyen, M Hong; Press, Ellen G; Clancy, Cornelius J

    2014-12-01

    FKS mutant Candida isolates were recovered from 24% (6/25) of abdominal candidiasis patients exposed to echinocandin. Candida glabrata (29%) and Candida albicans (14%) mutants were identified. Multidrug-resistant bacteria were recovered from 83% of FKS mutant infections. Mutations were associated with prolonged echinocandin exposure (P = 0.01), breakthrough infections (P = 0.03), and therapeutic failures despite source control interventions (100%). Abdominal candidiasis is a hidden reservoir for the emergence of echinocandin-resistant Candida.

  17. Drum Sound Detection in Polyphonic Music with Hidden Markov Models

    OpenAIRE

    Jouni Paulus; Anssi Klapuri

    2009-01-01

    This paper proposes a method for transcribing drums from polyphonic music using a network of connected hidden Markov models (HMMs). The task is to detect the temporal locations of unpitched percussive sounds (such as bass drum or hi-hat) and recognise the instruments played. Contrary to many earlier methods, a separate sound event segmentation is not done, but connected HMMs are used to perform the segmentation and recognition jointly. Two ways of using HMMs are studied: modelling combination...

  18. Consistent histories, quantum truth functionals, and hidden variables

    Science.gov (United States)

    Griffiths, Robert B.

    2000-01-01

    A central principle of consistent histories quantum theory, the requirement that quantum descriptions be based upon a single framework (or family), is employed to show that there is no conflict between consistent histories and a no-hidden-variables theorem of Bell, and Kochen and Specker, contrary to a recent claim by Bassi and Ghirardi. The argument makes use of `truth functionals' defined on a Boolean algebra of classical or quantum properties.

  19. Consistent histories, quantum truth functionals, and hidden variables

    CERN Document Server

    Griffiths, R B

    1999-01-01

    A central principle of consistent histories quantum theory, the requirement that quantum descriptions be based upon a single framework (or family), is employed to show that there is no conflict between consistent histories and a no-hidden-variables theorem of Bell, and Kochen and Specker, contrary to a recent claim by Bassi and Ghirardi. The argument makes use of ``truth functionals'' defined on a Boolean algebra of classical or quantum properties.

  20. Physical nature of the hidden mass of the universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Y.

    1984-04-01

    Astronomical observational data on the large-scale structure of the Universe and on the distribution of hidden mass, interpreted within the framework of the adiabatic theory of galaxy formation, point to a dominance of weakly interacting particles with a mass in the range of 15--60 eV in the present Universe. Bounds are derived on the admissible admixtures of other relic particles.

  1. What are the Hidden Quantum Processes Behind Newton's Laws?

    OpenAIRE

    Ostoma, Tom; Trushyk, Mike

    1999-01-01

    We investigate the hidden quantum processes that are responsible for Newton's laws of motion and Newton's universal law of gravity. We apply Electro-Magnetic Quantum Gravity or EMQG to investigate Newtonian classical physics. EQMG is a quantum gravity theory that is manifestly compatible with Cellular Automata (CA) theory, a new paradigm for physical reality. EMQG is also based on a theory of inertia proposed by R. Haisch, A. Rueda, and H. Puthoff, which we modified and called Quantum Inertia...

  2. Hidden blazars and emission line variability of high redshift quasars

    Directory of Open Access Journals (Sweden)

    Feng Ma

    2001-01-01

    Full Text Available We have carried out a survey to search for hidden blazars in a sample of z 2 radio{loud quasars. The idea is based on our prediction that we should be able to see large C IV line variability not associated with observed continuum variations or most other emission lines in every radio{loud quasar. Here we report the initial results including the discovery of large C IV line variations in two quasars.

  3. Analysis of animal accelerometer data using hidden Markov models

    OpenAIRE

    2016-01-01

    Use of accelerometers is now widespread within animal biotelemetry as they provide a means of measuring an animal's activity in a meaningful and quantitative way where direct observation is not possible. In sequential acceleration data there is a natural dependence between observations of movement or behaviour, a fact that has been largely ignored in most analyses. Analyses of acceleration data where serial dependence has been explicitly modelled have largely relied on hidden Markov models (H...

  4. Early rehabilitation using a passive cycle ergometer on muscle morphology in mechanically ventilated critically ill patients in the Intensive Care Unit (MoVe-ICU study): study protocol for a randomized controlled trial.

    Science.gov (United States)

    dos Santos, Laura Jurema; de Aguiar Lemos, Fernando; Bianchi, Tanara; Sachetti, Amanda; Dall' Acqua, Ana Maria; da Silva Naue, Wagner; Dias, Alexandre Simões; Vieira, Silvia Regina Rios

    2015-08-28

    Patients in Intensive Care Units (ICU) are often exposed to prolonged immobilization which, in turn, plays an important role in neuromuscular complications. Exercise with a cycle ergometer is a treatment option that can be used to improve the rehabilitation of patients on mechanical ventilation (MV) in order to minimize the harmful effects of immobility. A single-blind randomized controlled trial (the MoVe ICU study) will be conducted to evaluate and compare the effects of early rehabilitation using a bedside cycle ergometer with conventional physical therapy on the muscle morphology of the knee extensors and diaphragm in critical ill patients receiving MV. A total of 28 adult patients will be recruited for this study from among those admitted to the intensive care department at the Hospital de Clínicas de Porto Alegre. Eligible patients will be treated with MV from a period of 24 to 48 h, will have spent maximum of 1 week in hospital and will not exhibit any characteristics restricting lower extremity mobility. These subjects will be randomized to receive either conventional physiotherapy or conventional physiotherapy with an additional cycle ergometer intervention. The intervention will be administered passively for 20 min, at 20 revolutions per minute (rpm), once per day, 7 days a week, throughout the time the patients remain on MV. Outcomes will be cross-sectional quadriceps thickness, length of fascicle, pennation angle of fascicles, thickness of vastus lateralis muscle, diaphragm thickness and excursion of critical ICU patients on MV measured with ultrasound. The MoVe-ICU study will be the first randomized controlled trial to test the hypothesis that early rehabilitation with a passive cycle ergometer can preserve the morphology of knee extensors and diaphragm in critical patients on MV in ICUs. NCT02300662 (25 November 2014).

  5. The hidden mortality of imperforate anus

    Directory of Open Access Journals (Sweden)

    Nikki Beudeker

    2013-01-01

    Full Text Available Background: Anorectal malformations (ARMs affect 1 in 4000-5000 births and are a big challenge in western countries. However, little is known about ARMs in Africa. The aim of this study is to evaluate the incidence, treatment and outcome of ARMs in Malawi. Materials and Methods: Over a 4-year period (2006-2009, data was extracted from patients up to and including the age of 5 years or less who underwent a colostomy, posterior sagittal anorectoplasty or colostomy closure. Results: Of the data that could be retrieved 46 patients met the criteria of congenital ARMs; 65.2% were female (N = 30 and 34.8% were male (N = 16. The median distance from patient to the hospital was 79 km and the median age at presentation was 24 days. In female patients: The most common ARM was the vestibular fistula (N = 21; 70%, a recto-vaginal fistula was found four times, a cloaca was found three times and a perineal fistula or no fistula were both found once each. The most common ARM among boys was the recto-urethral fistula (N = 10. Two boys had no fistula. A perineal fistula and a recto-vesical fistula were both found once each. Nearly, half of the patients (N = 22 had complications. Complications occurred less often in the group, which lived closest to the Surgical Unit (25%. Associated anomalies were found in one patient. Conclusion: This study shows a skewed distribution of age at presentation and type of ARM. The most likely explanations are (1 the distance to the hospital: Because none of the male patients presented after 4 weeks and many may have passed away before arriving at the tertiary care centre; (2 lack of knowledge among primary caregivers since very few patients with rectoperineal fistulas were seen. The rate of complications was high, probably also related to advance age at presentation. Therefore, Malawi needs more awareness for earlier detection and quicker intervention.

  6. [Hidden allergens in processed food. The consumer perspective].

    Science.gov (United States)

    Schnadt, S

    2012-03-01

    Despite improved allergen-labeling and careful avoidance strategies, hidden allergens in food are a substantial risk for unintended reactions in food allergy sufferers. Unpublished data from a survey of the German Allergy and Asthma Association (Deutscher Allergie- und Asthmabund, DAAB) show that 85% of 738 questioned food allergic patients have experienced at least one allergic reaction from each prepacked products as well as food sold loose. Almost half of the participants said to have not received information of a food allergen as an ingredient or possible trace on the label. Different possibilities are discussed under which food allergens can be hidden in processed products, like incomprehensible labeling, labeling gaps, unexpected occurrence of allergens as well as cross contaminations or allergens in loose products. To each of the seven highlighted sources of hidden allergens in food, practical examples are given as well as proposals for the improvement of the situation from consumer view. The aim is to indicate possibilities and measures for politics and industry by which allergic consumers and their social circle are able to make an informed choice concerning the safe consumption of a certain product and to protect themselves from unintentional reactions.

  7. Hidden charm octet tetraquarks from a diquark-antidiquark model

    CERN Document Server

    Zhu, Ruilin

    2016-01-01

    Four exotic charmonium-like states, i.e. $X(4140)$, $X(4274)$, $X(4500)$, and $X(4700)$, have been observed very recently by LHCb Collaboration in the decay process $B^+\\to J/\\psi \\phi K^+$ using the 3${\\rm fb}^{-1}$ data of $p\\bar p$ collision at $\\sqrt s= 7$ and $8$ TeV. In this paper, we investigate systematically the hidden charm tetraquark states. The hidden charm tetraquarks form an octet and a singlet representation according to flavor $SU(3)$ symmetry. Based on a diquark-antidiquark model, the hidden charm tetraquarks spectra are given. The previous XYZ exotic states altogether with the newly ones $X(4140)$, $X(4274)$, $X(4500)$, and $X(4700)$, can be well classified into certain representations. The spin-parities and masses of the XYZ are predicted, most of which are in agreement with the data. We particularly find that $Z_c(4430)$ can be treated as the first radial excitation of $Z_c(3900)$, while the $Y(1^{--})$ states can be obtained by the first orbital excitation of $X/Z$. Besides, we calculate ...

  8. Hidden symmetries of the Higgs oscillator and the conformal algebra

    Science.gov (United States)

    Evnin, Oleg; Nivesvivat, Rongvoram

    2017-01-01

    We give a solution to the long-standing problem of constructing the generators of hidden symmetries of the quantum Higgs oscillator, a particle on a d-sphere moving in a central potential varying as the inverse cosine-squared of the polar angle. This superintegrable system is known to possess a rich algebraic structure, including a hidden SU(d) symmetry that can be deduced from classical conserved quantities and degeneracies of the quantum spectrum. The quantum generators of this SU(d) have not been constructed thus far, except at d  =  2, and naive quantization of classical conserved quantities leads to deformed Lie algebras with quadratic terms in the commutation relations. The nonlocal generators we obtain here satisfy the standard su(d) Lie algebra, and their construction relies on a recently discovered realization of the conformal algebra, which contains a complete set of raising and lowering operators for the Higgs oscillator. This operator structure has emerged from a relation between the Higgs oscillator Schrödinger equation and the Klein-Gordon equation in Anti-de Sitter spacetime. From such a point-of-view, constructing the hidden symmetry generators reduces to manipulations within the abstract conformal algebra so(d, 2).

  9. Ontology-Based Automatically Hidden Web Portal Index

    Institute of Scientific and Technical Information of China (English)

    SONGHui; PANLeyun; MAFanyuan

    2004-01-01

    Many valuable databases on the Web have non-crawlable contents that are “hidden” behind the search forms. Information is available only by filling out HTML forms manually to query the underlying databases. For accessing data behind forms by automated agents, the critical task is having the corresponding query interfaces of the hidden databases that can be understood by machine. This paper presents an automatic approach of hidden Web portal index for various domains. It discovers and scrapes the query forms from Web pages based the tag-tree presentation, and then interpret them into the uniform mediate interfaces with the aid of domain ontology definition. To achieve high transformation accuracy, the domain ontology is also used to filter out the interfaces that are not related to the specific domain. The query interfaces gained finally represented with common concepts can automatically be indexed and retrieved by program. The experiments indicate that the algorithms used are efficient and the system is materially useful for information system or personalized Web search system to retrieval contents from hidden Web.

  10. On local-hidden-variable no-go theorems

    CERN Document Server

    Méthot, A A

    2005-01-01

    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimatly doomed in 1964 with the work of Bell Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus we will discuss here the three principal fo...

  11. Hidden Markov model tracking of continuous gravitational waves from a neutron star with wandering spin

    CERN Document Server

    Suvorova, S; Melatos, A; Moran, W; Evans, R J

    2016-01-01

    Gravitational wave searches for continuous-wave signals from neutron stars are especially challenging when the star's spin frequency is unknown a priori from electromagnetic observations and wanders stochastically under the action of internal (e.g. superfluid or magnetospheric) or external (e.g. accretion) torques. It is shown that frequency tracking by hidden Markov model (HMM) methods can be combined with existing maximum likelihood coherent matched filters like the F-statistic to surmount some of the challenges raised by spin wandering. Specifically it is found that, for an isolated, biaxial rotor whose spin frequency walks randomly, HMM tracking of the F-statistic output from coherent segments with duration T_drift = 10d over a total observation time of T_obs = 1yr can detect signals with wave strains h0 > 2e-26 at a noise level characteristic of the Advanced Laser Interferometer Gravitational Wave Observatory (Advanced LIGO). For a biaxial rotor with randomly walking spin in a binary orbit, whose orbital...

  12. Scale invariant extension of the standard model with a strongly interacting hidden sector.

    Science.gov (United States)

    Hur, Taeil; Ko, P

    2011-04-08

    We present a scale invariant extension of the standard model with a new QCD-like strong interaction in the hidden sector. A scale Λ(H) is dynamically generated in the hidden sector by dimensional transmutation, and chiral symmetry breaking occurs in the hidden sector. This scale is transmitted to the SM sector by a real singlet scalar messenger S and can trigger electroweak symmetry breaking. Thus all the mass scales in this model arise from the hidden sector scale Λ(H), which has quantum mechanical origin. Furthermore, the lightest hadrons in the hidden sector are stable by the flavor conservation of the hidden sector strong interaction, and could be the cold dark matter (CDM). We study collider phenomenology, relic density, and direct detection rates of the CDM of this model.

  13. Analysis on hidden blood loss of total knee arthroplasty in treating knee osteoarthritis

    Institute of Scientific and Technical Information of China (English)

    SHEN Hui-liang; LI Zheng; FENG Ming-li; CAO Guang-le

    2011-01-01

    Background Total knee arthroplasty (TKA) is an important therapy for the treatment of various late-stage knee diseases. However, it has been observed that patients have lower hemoglobin (HB) counts postoperatively, which are significantly inconsistent with the measured blood loss. Although the concept of hidden blood loss has been presented in 2000, very little clinical attention has been paid since then. In this study, we investigated the characteristics and influential factor of hidden blood loss after TKA in treating knee osteoarthritis.Methods One hundred and eight patients, with 42 males and 66 females, were retrospectively analyzed. The perioperative blood loss and the hidden blood loss following TKA were calculated by Gross formula. Potential factors affecting perioperative and hidden blood loss included gender, surgical time, tourniquet time, hemostasis (during operation with deflating tourniquet), and reinfusion of salvaged blood.Results The average perioperative blood loss was found to be (1553±356) ml and the average hidden blood loss was (793±223) ml. The hidden blood loss of the male was significantly higher than that of the female, and was reduced by hemostasis during the operation with a deflating tourniquet. Hidden blood loss was not affected by postoperative blood salvage and reinfusion, surgical time, or tourniquet time.Conclusions When calculating the value of hidden blood loss by Gross formula, the lowest value of hematocrit should be chosen as the parameter so that hidden blood loss would not be underestimated. No significant differences could be found in hidden blood loss for males compared to females. Hidden blood loss can be reduced by hemostasis during operation with a deflating tourniquet. Although reinfusion of salvaged blood could not reduce the perioperative blood loss or hidden blood loss, it was still an effective method to reduce transfusion rate.

  14. Hidden Markov Model Application to Transfer The Trader Online Forex Brokers

    Directory of Open Access Journals (Sweden)

    Farida Suharleni

    2012-05-01

    Full Text Available Hidden Markov Model is elaboration of Markov chain, which is applicable to cases that can’t directly observe. In this research, Hidden Markov Model is used to know trader’s transition to broker forex online. In Hidden Markov Model, observed state is observable part and hidden state is hidden part. Hidden Markov Model allows modeling system that contains interrelated observed state and hidden state. As observed state in trader’s transition to broker forex online is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online, whereas as hidden state is broker forex online Marketiva, Masterforex, Instaforex, FBS and Others. First step on application of Hidden Markov Model in this research is making construction model by making a probability of transition matrix (A from every broker forex online. Next step is making a probability of observation matrix (B by making conditional probability of five categories, that is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online and also need to determine an initial state probability (π from every broker forex online. The last step is using Viterbi algorithm to find hidden state sequences that is broker forex online sequences which is the most possible based on model and observed state that is the five categories. Application of Hidden Markov Model is done by making program with Viterbi algorithm using Delphi 7.0 software with observed state based on simulation data. Example: By the number of observation T = 5 and observed state sequences O = (2,4,3,5,1 is found hidden state sequences which the most possible with observed state O as following : where X1 = FBS, X2 = Masterforex, X3 = Marketiva, X4 = Others, and X5 = Instaforex.

  15. Generation of Hidden Optical-Polarization: Squeezing and Non-Classicality

    OpenAIRE

    Gupta, Gyaneshwar K.; Kumar, Akhilesh; Singh, Ravi S

    2010-01-01

    A monochromatic double-mode coherent light endowed with orthogonally polarized photons propagating collinearly is studied in Degenerate Parametric Amplification. Generation of Hidden Optical- Polarized States is shown by non-zero values of Index of Hidden Optical-Polarization. Squeezing in HOPS is demonstrated by recognizing a Squeezing function. The Non-Classical feature of HOPS is observed by 'degree of Hidden Optical-Polarization' which attains non-classical value 'greater than unity'. The...

  16. Hidden Semi Markov Models for Multiple Observation Sequences: The mhsmm Package for R

    DEFF Research Database (Denmark)

    O'Connell, Jarad Michael; Højsgaard, Søren

    2011-01-01

    This paper describes the R package mhsmm which implements estimation and prediction methods for hidden Markov and semi-Markov models for multiple observation sequences. Such techniques are of interest when observed data is thought to be dependent on some unobserved (or hidden) state. Hidden Markov...... models only allow a geometrically distributed sojourn time in a given state, while hidden semi-Markov models extend this by allowing an arbitrary sojourn distribution. We demonstrate the software with simulation examples and an application involving the modelling of the ovarian cycle of dairy cows...

  17. To the point: reviews in medical education-taking control of the hidden curriculum.

    Science.gov (United States)

    Chuang, Alice W; Nuthalapaty, Francis S; Casey, Petra M; Kaczmarczyk, Joseph M; Cullimore, Amie J; Dalrymple, John L; Dugoff, Lorraine; Espey, Eve L; Hammoud, Maya M; Hueppchen, Nancy A; Katz, Nadine T; Peskin, Edward G

    2010-10-01

    This article, the ninth in the "To the Point" series that is prepared by the Association of Professors of Gynecology and Obstetrics Undergraduate Medical Education Committee, discusses the role of the "hidden curriculum" in shaping the professional identity of doctors in training. The characteristics that distinguish the formal curriculum and hidden curriculum are defined. Specific examples of hidden curricula in clinical environments and the positive and negative impacts that may result are highlighted. Techniques to evaluate clinical training environments and to identify the hidden curriculum are provided and are followed by methods to promote its positive messages and lessen its negative ones.

  18. Detection versus location judgments in a hidden pattern task: functional MRI and behavioral correlates.

    Science.gov (United States)

    Bolster, R Bruce; D'Arcy, Ryan C N; Song, Xiaowei; Runke, Dwayne S; Ryner, Lawrence

    2011-08-01

    We used functional magnetic resonance imaging (fMRI) to assess cortical involvement in a hidden pattern task. The experimental and control conditions involved judgment of the presence/absence versus the position of a complex pattern. Activation specific to hidden pattern identification was concentrated on frontal, dorsal parietal, and mesolimbic cortex. This was consistent not only across individual subjects, but with hidden figures tasks used in previous fMRI investigations. Results suggest that pattern identification relies on a relatively stable neural network controlling selective attention. In combination with fMRI, hidden pattern tasks may be useful in neuropsychological assessment of visual search and object identification.

  19. Placing Hidden Surface Removal within the CORE Graphics Standard: An Example.

    Science.gov (United States)

    1983-12-07

    index; coorcnt :- sidea ; new(Bptr); hidden :* Bptr; for i 1 to side a do (* transfer the point values *) with Bptre do begin hidden x_coor[i] :=x a[i...side-b + 1; x_a [ sidea ] : =-hidden_x coor[p2]; y_a[ sidea ] •= hiddenjY_coor [p2] ; z alside a] -= hiddenz_coor(p2]; w-a[side-a] := hidden.w_coor[p21...lists *) side a -= side a + 1; sideb := side b + 1; x a[side a] :::i-x intersection; x b[side b] : x intersection; y_--a[ sidea ] : y-intersection; y

  20. Adalimumab improves health-related quality of life in patients with moderate to severe plaque psoriasis compared with the United States general population norms: Results from a randomized, controlled Phase III study

    Directory of Open Access Journals (Sweden)

    Harnam Neesha

    2008-10-01

    Full Text Available Abstract Objective To evaluate the impact of adalimumab on health-related quality of life (HRQOL for patients with moderate to severe plaque psoriasis. Background Psoriasis is a chronic, inflammatory, immune-mediated disease that has a significant impact on patients' HRQOL. Adalimumab is a fully human monoclonal antibody that blocks tumor necrosis factor, a pro-inflammatory cytokine, and is effective and well-tolerated for patients with moderate to severe psoriasis. Methods Data were obtained for a secondary analysis of patients in a randomized, controlled Phase III trial evaluating the effect of adalimumab in patients with psoriasis (N = 1,205. Patients with moderate to severe psoriasis were randomized in a 2:1 ratio to adalimumab 80 mg (two 40 mg injections administered subcutaneously at baseline followed by one 40 mg injection every other week from Week 1 to Week 15 or placebo. Short Form-36 (SF-36 Health Survey scores of psoriasis patients were used to assess HRQOL and were compared with United States (US population norms at baseline and Week 16. Results Baseline Physical Component Summary (PCS scores for the placebo and adalimumab groups were similar to the general US population. Baseline mean Mental Component Summary (MCS scores were significantly lower for the adalimumab and placebo groups compared with the general population (47.4, 47.7, and 50.8 points, respectively; p Conclusion Psoriasis has a broad impact on patient functioning and well-being. Improvement in skin lesions and joint symptoms associated with adalimumab treatment was accompanied by improvements in HRQOL to levels that were similar to or greater than those of the general US population. Trial registration Clinicaltrials.gov NCT00237887

  1. Finding an apprenticeship: hidden curriculum and social consequences.

    Science.gov (United States)

    Goastellec, Gaële; Ruiz, Guillaume

    2015-01-01

    In Switzerland, the majority of students are oriented toward professional training after compulsory schooling. At this stage, one of the biggest challenges for them is to find an apprenticeship position. Matching supply and demand is a complex process that not only excludes some students from having direct access to professional training but also forces them to make early choices regarding their future sector of employment. So, how does one find an apprenticeship? And what do the students' descriptions of their search for apprenticeships reveal about the institutional determinants of social inequalities at play in the system? Based on 29 interviews conducted in 2014 with 23 apprentices and 6 recruiters in the Canton of Vaud, this article interrogates how the dimensions of educational and social trajectories combine to affect access to apprenticeships and are accentuated by recruiters using a "hidden curriculum" during the recruitment process. A hidden curriculum consists of knowledge and skills not taught by the educational institution but which appear decisive in obtaining an apprenticeship. By analyzing the contrasting experiences of students in their search for an apprenticeship, we identify four types of trajectories that explain different types of school-to-apprenticeship transitions. We show how these determinants are reinforced by the "hidden curriculum" of recruitment based on the soft skills of feeling, autonomy, anticipation, and reflexivity that are assessed in the context of recruitment interactions. The discussion section debates how the criteria that appear to be used to identify the "right apprentice" tend to (re)produce inequalities between students. This not only depends on their academic results but also on their social and cultural skills, their ability to anticipate their choices and, more widely, their ability to be a subject in their recruitment search. "The Subject is neither the individual, nor the self, but the work through which an

  2. Geophysical Investigations at Hidden Dam, Raymond, California Flow Simulations

    Science.gov (United States)

    Minsley, Burke J.; Ikard, Scott

    2010-01-01

    Numerical flow modeling and analysis of observation-well data at Hidden Dam are carried out to supplement recent geophysical field investigations at the site (Minsley and others, 2010). This work also is complementary to earlier seepage-related studies at Hidden Dam documented by Cedergren (1980a, b). Known seepage areas on the northwest right abutment area of the downstream side of the dam was documented by Cedergren (1980a, b). Subsequent to the 1980 seepage study, a drainage blanket with a sub-drain system was installed to mitigate downstream seepage. Flow net analysis provided by Cedergren (1980a, b) suggests that the primary seepage mechanism involves flow through the dam foundation due to normal reservoir pool elevations, which results in upflow that intersects the ground surface in several areas on the downstream side of the dam. In addition to the reservoir pool elevations and downstream surface topography, flow is also controlled by the existing foundation geology as well as the presence or absence of a horizontal drain in the downstream portion of the dam. The current modeling study is aimed at quantifying how variability in dam and foundation hydrologic properties influences seepage as a function of reservoir stage. Flow modeling is implemented using the COMSOL Multiphysics software package, which solves the partially saturated flow equations in a two-dimensional (2D) cross-section of Hidden Dam that also incorporates true downstream topography. Use of the COMSOL software package provides a more quantitative approach than the flow net analysis by Cedergren (1980a, b), and allows for rapid evaluation of the influence of various parameters such as reservoir level, dam structure and geometry, and hydrogeologic properties of the dam and foundation materials. Historical observation-well data are used to help validate the flow simulations by comparing observed and predicted water levels for a range of reservoir elevations. The flow models are guided by, and

  3. New ALPS results on hidden-sector lightweights

    Energy Technology Data Exchange (ETDEWEB)

    Ehret, Klaus [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Frede, Maik [Laser Zentrum Hannover e.V., Hollerithallee 8, D-30419 Hannover (Germany); Ghazaryan, Samvel [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Hildebrandt, Matthias [Laser Zentrum Hannover e.V., Hollerithallee 8, D-30419 Hannover (Germany); Knabbe, Ernst-Axel [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Kracht, Dietmar [Laser Zentrum Hannover e.V., Hollerithallee 8, D-30419 Hannover (Germany); Lindner, Axel, E-mail: axel.lindner@desy.d [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); List, Jenny [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Meier, Tobias [Max-Planck-Institute for Gravitational Physics, Albert-Einstein-Institute, Institut fuer Gravitationsphysik, Leibniz Universitaet, Hannover, Callinstrasse 38, D-30167 Hannover (Germany); Meyer, Niels; Notz, Dieter; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Wiedemann, Guenter [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany); Willke, Benno [Max-Planck-Institute for Gravitational Physics, Albert-Einstein-Institute, Institut fuer Gravitationsphysik, Leibniz Universitaet, Hannover, Callinstrasse 38, D-30167 Hannover (Germany)

    2010-05-31

    The ALPS Collaboration runs a 'Light Shining through a Wall' (LSW) experiment to search for photon oscillations into 'Weakly Interacting Sub-eV Particles' (WISPs) often predicted by extensions of the Standard Model. The experiment is set up around a superconducting HERA dipole magnet at the site of DESY. Due to several upgrades of the experiment we are able to place limits on the probability of photon-WISP-photon conversions of a fewx10{sup -25}. These limits result in today's most stringent laboratory constraints on the existence of low mass axion-like particles, hidden photons and minicharged particles.

  4. New ALPS Results on Hidden-Sector Lightweights

    CERN Document Server

    Ehret, Klaus; Ghazaryan, Samvel; Hildebrandt, Matthias; Knabbe, Ernst-Axel; Kracht, Dietmar; Lindner, Axel; List, Jenny; Meier, Tobias; Meyer, Niels; Notz, Dieter; Redondo, Javier; Ringwald, Andreas; Wiedemann, Günter; Willke, Benno

    2010-01-01

    The ALPS collaboration runs a "Light Shining through a Wall" (LSW) experiment to search for photon oscillations into "Weakly Interacting Sub-eV Particles" (WISPs) often predicted by extensions of the Standard Model. The experiment is set up around a superconducting HERA dipole magnet at the site of DESY. Due to several upgrades of the experiment we are able to place limits on the probability of photon-WISP-photon conversions of a few 10^{-25}. These limits result in today's most stringent laboratory constraints on the existence of low mass axion-like particles, hidden photons and minicharged particles.

  5. AIRWAY LABELING USING A HIDDEN MARKOV TREE MODEL

    Science.gov (United States)

    Ross, James C.; Díaz, Alejandro A.; Okajima, Yuka; Wassermann, Demian; Washko, George R.; Dy, Jennifer; San José Estépar, Raúl

    2014-01-01

    We present a novel airway labeling algorithm based on a Hidden Markov Tree Model (HMTM). We obtain a collection of discrete points along the segmented airway tree using particles sampling [1] and establish topology using Kruskal’s minimum spanning tree algorithm. Following this, our HMTM algorithm probabilistically assigns labels to each point. While alternative methods label airway branches out to the segmental level, we describe a general method and demonstrate its performance out to the subsubsegmental level (two generations further than previously published approaches). We present results on a collection of 25 computed tomography (CT) datasets taken from a Chronic Obstructive Pulmonary Disease (COPD) study. PMID:25436039

  6. The Research on Hidden Failures of Civil Aircraft

    Directory of Open Access Journals (Sweden)

    Lin Lie Shu

    2016-01-01

    Full Text Available The hidden failure is often appear on civil aircraft, and it is a big risk for normal safe operation. The reason for this failure is the instability of the resistance of the electrical contact. The study on electrical contact is applied science of the reliability, the contact resistance is an important parameter of the reliability of the electrical contact system. In this paper, It also Produces the latest research results from factors that affect contact resistance and contact resistance microscopic model, and then it produces the method of the calculating and measuring engineering about the contact resistance. Lastly, it is point out the future direction of the electrical contacts.

  7. Quantum hidden Markov models based on transition operation matrices

    Science.gov (United States)

    Cholewa, Michał; Gawron, Piotr; Głomb, Przemysław; Kurzyk, Dariusz

    2017-04-01

    In this work, we extend the idea of quantum Markov chains (Gudder in J Math Phys 49(7):072105 [3]) in order to propose quantum hidden Markov models (QHMMs). For that, we use the notions of transition operation matrices and vector states, which are an extension of classical stochastic matrices and probability distributions. Our main result is the Mealy QHMM formulation and proofs of algorithms needed for application of this model: Forward for general case and Vitterbi for a restricted class of QHMMs. We show the relations of the proposed model to other quantum HMM propositions and present an example of application.

  8. Inference with Constrained Hidden Markov Models in PRISM

    CERN Document Server

    Christiansen, Henning; Lassen, Ole Torp; Petit, Matthieu

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. Defining HMMs with side-constraints in Constraint Logic Programming have advantages in terms of more compact expression and pruning opportunities during inference. We present a PRISM-based framework for extending HMMs with side-constraints and show how well-known constraints such as cardinality and all different are integrated. We experimentally validate our approach on the biologically motivated problem of global pairwise alignment.

  9. Hidden Markov processes theory and applications to biology

    CERN Document Server

    Vidyasagar, M

    2014-01-01

    This book explores important aspects of Markov and hidden Markov processes and the applications of these ideas to various problems in computational biology. The book starts from first principles, so that no previous knowledge of probability is necessary. However, the work is rigorous and mathematical, making it useful to engineers and mathematicians, even those not interested in biological applications. A range of exercises is provided, including drills to familiarize the reader with concepts and more advanced problems that require deep thinking about the theory. Biological applications are t

  10. Learning Hidden Markov Models using Non-Negative Matrix Factorization

    CERN Document Server

    Cybenko, George

    2008-01-01

    The Baum-Welsh algorithm together with its derivatives and variations has been the main technique for learning Hidden Markov Models (HMM) from observational data. We present an HMM learning algorithm based on the non-negative matrix factorization (NMF) of higher order Markovian statistics that is structurally different from the Baum-Welsh and its associated approaches. The described algorithm supports estimation of the number of recurrent states of an HMM and iterates the non-negative matrix factorization (NMF) algorithm to improve the learned HMM parameters. Numerical examples are provided as well.

  11. Blocking Underhand Attacks by Hidden Coalitions (Extended Version)

    OpenAIRE

    Cristani, Matteo; Karafili, Erisa; Viganò, Luca

    2010-01-01

    Similar to what happens between humans in the real world, in open multi-agent systems distributed over the Internet, such as online social networks or wiki technologies, agents often form coalitions by agreeing to act as a whole in order to achieve certain common goals. However, agent coalitions are not always a desirable feature of a system, as malicious or corrupt agents may collaborate in order to subvert or attack the system. In this paper, we consider the problem of hidden coalitions, wh...

  12. Jim Shaw's The Hidden World as a Book of Poetry

    DEFF Research Database (Denmark)

    Sørensen, Bent

    documents, ’found’ in pulp publications, in thrift stores, on billboards, and on the Internet. These documents are mostly word-image hybrids, and their original functions may have been as commercials or advertisements, religious propaganda, doomsday prophecies, or other forms of naïve “didactic art...... a book of poetry. Drawing on genre theory, as well as recent work by, among others, Martin Glaz Serup and Thomas Hvid Kromann, I propose to read The Hidden World against its own grain, as it were, as a collection of conceptual poetry, participating in the discourses of belief and testimony....

  13. Desiring the Hidden God:Knowledge Without Belief

    OpenAIRE

    Perlmutter, Julian Felix

    2016-01-01

    For many people, the phenomenon of divine hiddenness is so total that it is far from clear to them that God (roughly speaking, the God of Jewish and Christian tradition) exists at all. Reasonably enough, they therefore do not believe that God exists. Yet it is possible, whilst lacking belief in God’s reality, nonetheless to see it as a possibility that is both realistic and attractive; and in this situation, one will likely want to be open to the considerable benefits that would be available ...

  14. Dark matter and dark forces from a supersymmetric hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, S.; Goodsell, M.D.; Ringwald, A.

    2011-09-15

    We show that supersymmetric ''Dark Force'' models with gravity mediation are viable. To this end, we analyse a simple supersymmetric hidden sector model that interacts with the visible sector via kinetic mixing of a light Abelian gauge boson with the hypercharge. We include all induced interactions with the visible sector such as neutralino mass mixing and the Higgs portal term. We perform a detailed parameter space scan comparing the produced dark matter relic abundance and direct detection cross-sections to current experiments. (orig.)

  15. A new `hidden colour hypothesis' in hadron physics

    Indian Academy of Sciences (India)

    Afsar Abbas

    2006-05-01

    A new `hidden colour hypothesis' within the framework of QCD, as an extension of and in keeping with the spirit of the `colour singlet hypothesis' is hereby proposed. As such it should play a role in a consistent description of exotic hadrons, such as diquonia, pentaquarks, dibaryons etc. How these exotic hadrons are affected by this new hypothesis is discussed here. This new hypothesis suggests that the experimentalists may not be looking for single exotics but for composites of two or more of the same.

  16. Hidden Markov Modeling for Weigh-In-Motion Estimation

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Ferragut, Erik M [ORNL; Boone, Shane [ORNL

    2012-01-01

    This paper describes a hidden Markov model to assist in the weight measurement error that arises from complex vehicle oscillations of a system of discrete masses. Present reduction of oscillations is by a smooth, flat, level approach and constant, slow speed in a straight line. The model uses this inherent variability to assist in determining the true total weight and individual axle weights of a vehicle. The weight distribution dynamics of a generic moving vehicle were simulated. The model estimation converged to within 1% of the true mass for simulated data. The computational demands of this method, while much greater than simple averages, took only seconds to run on a desktop computer.

  17. METHODOLOGY FOR DETECTION OF HIDDEN RESERVES OF ENTERPRISE INNOVATION POTENTIAL

    Directory of Open Access Journals (Sweden)

    R. I. Barmutsky

    2010-01-01

    Full Text Available Formation of an enterprise innovation potential requires investments of rather large financial resources, creation of offices and services which are involved in introduction and approbation of state-of-the-art technologies in production process and all these measures are not always properly repaid.Search for efficient production methods, introduction of new technologies which do not presuppose large expenses and intense personnel drawing-away from their direct functional duties are directed on detection and activation of hidden (unused innovation potential at an enterprise.

  18. Constraints on Light Hidden Sector Gauge Bosons from Supernova Cooling

    CERN Document Server

    Dent, James B; Krauss, Lawrence M

    2012-01-01

    We derive new bounds on hidden sector gauge bosons which could produce new energy loss mechanisms in supernovae, enlarging the excluded region in mass-coupling space by a significant factor compared to earlier estimates. Both considerations of trapping and possible decay of these particles need to be incorporated when determining such bounds, as does scattering on both neutrons and protons. For masses and couplings near the region which saturates current bounds, a significant background of such gauge bosons may also be produced due to the cumulative effects of all supernovae over cosmic history.

  19. Exhibiting eugenics: response and resistance to a hidden history.

    Science.gov (United States)

    Brave, Ralph; Sylva, Kathryn

    2007-01-01

    Human Plants, Human Harvest: The Hidden History of California Eugenics is the first-ever exhibition on the history of eugenics in California. The disappearance of this history for half a century, and the consequent absence of a "collective menory", were the primary factors determining the exhibit's sttrcture and content. Responses to the exhibit confirmed that most visitors "never knew" about this history. The exhibit is described in some detail, with selected imagery from the exhibit reproduced. After the initial exhibition, responses of other museums and foundation officials revealed a continuing resistance to this history being publicly displayed, though the sources of resistance varied.

  20. Frustration of total internal reflection by a hidden nanowire

    Science.gov (United States)

    Frumin, Leonid; Nemykin, Anton; Shapiro, David

    2016-12-01

    A metallic wire embedded in the dielectric substrate leads to frustration of the total internal reflection at the interface between dielectric and free space. The scattering by a gold cylinder is studied in order to exploit the light for hidden objects optical diagnostics. The p-wave incidenting by the angle close to total reflection with the frequency near plasmonic resonance is treated by the modified boundary elements method. The magnetic and electric fields at the interface are calculated. The scattering diagrams are found in near and far field.