WorldWideScience

Sample records for neighbor embedding t-sne

  1. The Galah Survey: Classification and Diagnostics with t-SNE Reduction of Spectral Information

    Energy Technology Data Exchange (ETDEWEB)

    Traven, G.; Zwitter, T.; Žerjal, M. [Faculty of Mathematics and Physics, University of Ljubljana, Jadranska 19, 1000 Ljubljana (Slovenia); Matijevič, G. [Leibniz-Institut für Astrophysik Potsdam (AIP), An der Sternwarte 16, D-14482 Potsdam (Germany); Kos, J.; Bland-Hawthorn, J.; De Silva, G.; Sharma, S. [Sydney Institute for Astronomy, School of Physics, A28, The University of Sydney, NSW 2006 (Australia); Asplund, M.; Freeman, K.; Lin, J.; Da Costa, G.; Duong, L. [Research School of Astronomy and Astrophysics, Australian National University, Canberra, ACT 2611 (Australia); Casey, A. R. [Institute of Astronomy, University of Cambridge, Madingley Road, Cambridge CB3 0HA (United Kingdom); Martell, S. L. [School of Physics, University of New South Wales, Sydney, NSW 2052 (Australia); Schlesinger, K. J. [Research School of Astronomy and Astrophysics, Mount Stromlo Observatory, Cotter Road, Weston Creek, ACT 2611 (Australia); Simpson, J. D. [Australian Astronomical Observatory, North Ryde, NSW 2113 (Australia); Zucker, D. B. [Australian Astronomical Observatory, P.O. Box 915, North Ryde, NSW 1670 (Australia); Anguiano, B. [Department of Physics and Astronomy, Macquarie University, North Ryde, NSW 2109 (Australia); Horner, J., E-mail: gregor.traven@fmf.uni-lj.si [Computational Engineering and Science Research Centre, University of Southern Queensland, Towoomba QLD 4350 (Australia); and others

    2017-02-01

    Galah is an ongoing high-resolution spectroscopic survey with the goal of disentangling the formation history of the Milky Way using the fossil remnants of disrupted star formation sites that are now dispersed around the Galaxy. It is targeting a randomly selected magnitude-limited ( V ≤ 14) sample of stars, with the goal of observing one million objects. To date, 300,000 spectra have been obtained. Not all of them are correctly processed by parameter estimation pipelines, and we need to know about them. We present a semi-automated classification scheme that identifies different types of peculiar spectral morphologies in an effort to discover and flag potentially problematic spectra and thus help to preserve the integrity of the survey results. To this end, we employ the recently developed dimensionality reduction technique t-SNE ( t -distributed stochastic neighbor embedding), which enables us to represent the complex spectral morphology in a two-dimensional projection map while still preserving the properties of the local neighborhoods of spectra. We find that the majority (178,483) of the 209,533 Galah spectra considered in this study represents normal single stars, whereas 31,050 peculiar and problematic spectra with very diverse spectral features pertaining to 28,579 stars are distributed into 10 classification categories: hot stars, cool metal-poor giants, molecular absorption bands, binary stars, H α /H β emission, H α /H β emission superimposed on absorption, H α /H β P-Cygni, H α /H β inverted P-Cygni, lithium absorption, and problematic. Classified spectra with supplementary information are presented in the catalog, indicating candidates for follow-up observations and population studies of the short-lived phases of stellar evolution.

  2. Applications and Benefits for Big Data Sets Using Tree Distances and The T-SNE Algorithm

    Science.gov (United States)

    2016-03-01

    BENEFITS FOR BIG DATA SETS USING TREE DISTANCES AND THE T-SNE ALGORITHM by Suyoung Lee March 2016 Thesis Advisor: Samuel E. Buttrey...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE APPLICATIONS AND BENEFITS FOR BIG DATA SETS USING TREE DISTANCES AND THE T-SNE...public release; distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words ) Modern data sets often consist of unstructured data

  3. Classification of molecular structure images by using ANN, RF, LBP, HOG, and size reduction methods for early stomach cancer detection

    Science.gov (United States)

    Aytaç Korkmaz, Sevcan; Binol, Hamidullah

    2018-03-01

    Patients who die from stomach cancer are still present. Early diagnosis is crucial in reducing the mortality rate of cancer patients. Therefore, computer aided methods have been developed for early detection in this article. Stomach cancer images were obtained from Fırat University Medical Faculty Pathology Department. The Local Binary Patterns (LBP) and Histogram of Oriented Gradients (HOG) features of these images are calculated. At the same time, Sammon mapping, Stochastic Neighbor Embedding (SNE), Isomap, Classical multidimensional scaling (MDS), Local Linear Embedding (LLE), Linear Discriminant Analysis (LDA), t-Distributed Stochastic Neighbor Embedding (t-SNE), and Laplacian Eigenmaps methods are used for dimensional the reduction of the features. The high dimension of these features has been reduced to lower dimensions using dimensional reduction methods. Artificial neural networks (ANN) and Random Forest (RF) classifiers were used to classify stomach cancer images with these new lower feature sizes. New medical systems have developed to measure the effects of these dimensions by obtaining features in different dimensional with dimensional reduction methods. When all the methods developed are compared, it has been found that the best accuracy results are obtained with LBP_MDS_ANN and LBP_LLE_ANN methods.

  4. Clustering Professional Basketball Players by Performance

    OpenAIRE

    Patel, Riki

    2017-01-01

    Basketball players are traditionally grouped into five distinct positions, but these designationsare quickly becoming outdated. We attempt to reclassify players into new groupsbased on personal performance in the 2016-2017 NBA regular season. Two dimensionalityreduction techniques, t-Distributed Stochastic Neighbor Embedding (t-SNE) and principalcomponent analysis (PCA), were employed to reduce 18 classic metrics down to two dimensionsfor visualization. k-means clustering discovered four grou...

  5. An enhanced data visualization method for diesel engine malfunction classification using multi-sensor signals.

    Science.gov (United States)

    Li, Yiqing; Wang, Yu; Zi, Yanyang; Zhang, Mingquan

    2015-10-21

    The various multi-sensor signal features from a diesel engine constitute a complex high-dimensional dataset. The non-linear dimensionality reduction method, t-distributed stochastic neighbor embedding (t-SNE), provides an effective way to implement data visualization for complex high-dimensional data. However, irrelevant features can deteriorate the performance of data visualization, and thus, should be eliminated a priori. This paper proposes a feature subset score based t-SNE (FSS-t-SNE) data visualization method to deal with the high-dimensional data that are collected from multi-sensor signals. In this method, the optimal feature subset is constructed by a feature subset score criterion. Then the high-dimensional data are visualized in 2-dimension space. According to the UCI dataset test, FSS-t-SNE can effectively improve the classification accuracy. An experiment was performed with a large power marine diesel engine to validate the proposed method for diesel engine malfunction classification. Multi-sensor signals were collected by a cylinder vibration sensor and a cylinder pressure sensor. Compared with other conventional data visualization methods, the proposed method shows good visualization performance and high classification accuracy in multi-malfunction classification of a diesel engine.

  6. A COMPREHENSIVE PROGENITOR MODEL FOR SNe Ia

    International Nuclear Information System (INIS)

    Meng, X.; Yang, W.

    2010-01-01

    Although the nature of the progenitor of Type Ia supernovae (SNe Ia) is still unclear, the single-degenerate (SD) channel for the progenitor is currently accepted, in which a carbon-oxygen white dwarf (CO WD) accretes hydrogen-rich material from its companion, increases its mass to the Chandrasekhar mass limit, and then explodes as an SN Ia. The companion may be a main sequence or a slightly evolved star (WD + MS), or a red giant star (WD + RG). Incorporating the effect of mass stripping and accretion-disk instability on the evolution of the WD binary, we carried out binary stellar evolution calculations for more than 1600 close WD binaries. As a result, the initial parameter spaces for SNe Ia are presented in an orbital period-secondary mass (log P i , M i 2 ) plane. We confirmed that in a WD + MS system, the initial companion leading to SNe Ia may have mass from 1 M sun to 5 M sun . The initial WD mass for SNe Ia from WD + MS channel is as low as 0.565 M sun , while the lowest WD mass from the WD + RG channel is 1.0 M sun . Adopting the above results, we studied the birth rate of SNe Ia via a binary population synthesis approach. We found that the Galactic SNe Ia birth rate from SD model is (2.55-2.9) x 10 -3 yr -1 (including WD + He star channel), which is slightly smaller than that from observation. If a single starburst is assumed, the distribution of the delay time of SNe Ia from the SD model may be a weak bimodality, where WD + He channel contributes to SNe Ia with delay time shorter than 10 8 yr and WD + RG channel to those with age longer than 6 Gyr.

  7. A tale of two GRB-SNe at a common redshift of ζ = 0.54

    International Nuclear Information System (INIS)

    Cano, Z.; Bersier, D.; Kobayashi, S.; Clay, N.; Mottram, C.; Mundell, C.G.; Small, E.; Smith, R.J.; Steele, I.; Guidorzi, C.; Curran, P.A.

    2011-01-01

    We present ground-based and Hubble Space Telescope optical observations of the optical transients (OTs) of long-duration Gamma Ray Bursts (GRBs) 060729 and 090618, both at a redshift of z=0.54. For GRB 060729, bumps are seen in the optical light curves (LCs), and the late-time broad-band spectral energy distributions (SEDs) of the OT resemble those of local Type Ic supernovae (SNe). For GRB 090618, the dense sampling of our optical observations has allowed us to detect well-defined bumps in the optical LCs, as well as a change in colour, that are indicative of light coming from a core-collapse SN. The accompanying SNe for both events are individually compared with SN1998bw, a known GRB supernova, and SN1994I, a typical Type Ic supernova without a known GRB counterpart, and in both cases the brightness and temporal evolution more closely resemble SN1998bw. We also exploit our extensive optical and radio data for GRB 090618, as well as the publicly available Swift-XRT data, and discuss the properties of the afterglow at early times. In the context of a simple jet-like model, the afterglow of GRB 090618 is best explained by the presence of a jet-break at t - t 0 ≥ 0.5 d. We then compare the rest-frame, peak V-band absolute magnitudes of all of the GRB and X-Ray Flash (XRF)-associated SNe with a large sample of local Type Ibc SNe, concluding that, when host extinction is considered, the peak magnitudes of the GRB/XRF-SNe cannot be distinguished from the peak magnitudes of non-GRB/XRF SNe. (authors)

  8. TYPE Ia SNe ALONG REDSHIFT: THE R(Si II) RATIO AND THE EXPANSION VELOCITIES IN INTERMEDIATE-z SUPERNOVAE

    International Nuclear Information System (INIS)

    Altavilla, G.; Ruiz-Lapuente, P.; Balastegui, A.; Mendez, J.; Espana-Bonet, C.; Irwin, M.; Ellis, R. S.; McMahon, R. M.; Walton, N. A.; Folatelli, G.; Goobar, A.; Nobili, S.; Stanishev, V.; Hillebrandt, W.

    2009-01-01

    We present a study of intermediate-z Type Ia supernovae (SNe Ia) using empirical physical diagrams which permit the investigation of those SNe explosions. This information can be very useful to reduce systematic uncertainties of the Hubble diagram of SNe Ia up to high z. The study of the expansion velocities and the measurement of the ratio R(Si II) allow subtyping of SNe Ia as done in nearby samples. The evolution of this ratio as seen in the diagram R(Si II)-(t) together with R(Si II) max versus (B - V) 0 indicates consistency of the properties at intermediate-z compared with the nearby SNe Ia. At intermediate-z, expansion velocities of Ca II and Si II are found similar to those of the nearby sample. This is found in a sample of six SNe Ia in the range 0.033 ≤z≤ 0.329 discovered within the International Time Programme of SNe Ia for Cosmology and Physics in the spring run of 2002. 7 The program run under Omega and Lambda from Supernovae and the Physics of Supernova Explosions within the International Time Programme at the telescopes of the European Northern Observatory (ENO) at La Palma (Canary Islands, Spain). Two SNe Ia at intermediate-z were of the cool FAINT type, one being an SN1986G-like object highly reddened. The R(Si II) ratio as well as subclassification of the SNe Ia beyond templates help to place SNe Ia in their sequence of brightness and to distinguish between reddened and intrinsically red supernovae. This test can be done with very high z SNe Ia and it will help to reduce systematic uncertainties due to extinction by dust. It should allow to map the high-z sample into the nearby one.

  9. Unsupervised machine learning account of magnetic transitions in the Hubbard model

    Science.gov (United States)

    Ch'ng, Kelvin; Vazquez, Nick; Khatami, Ehsan

    2018-01-01

    We employ several unsupervised machine learning techniques, including autoencoders, random trees embedding, and t -distributed stochastic neighboring ensemble (t -SNE), to reduce the dimensionality of, and therefore classify, raw (auxiliary) spin configurations generated, through Monte Carlo simulations of small clusters, for the Ising and Fermi-Hubbard models at finite temperatures. Results from a convolutional autoencoder for the three-dimensional Ising model can be shown to produce the magnetization and the susceptibility as a function of temperature with a high degree of accuracy. Quantum fluctuations distort this picture and prevent us from making such connections between the output of the autoencoder and physical observables for the Hubbard model. However, we are able to define an indicator based on the output of the t -SNE algorithm that shows a near perfect agreement with the antiferromagnetic structure factor of the model in two and three spatial dimensions in the weak-coupling regime. t -SNE also predicts a transition to the canted antiferromagnetic phase for the three-dimensional model when a strong magnetic field is present. We show that these techniques cannot be expected to work away from half filling when the "sign problem" in quantum Monte Carlo simulations is present.

  10. High-Dimensional Modeling for Cytometry: Building Rock Solid Models Using GemStone™ and Verity Cen-se'™ High-Definition t-SNE Mapping.

    Science.gov (United States)

    Bruce Bagwell, C

    2018-01-01

    This chapter outlines how to approach the complex tasks associated with designing models for high-dimensional cytometry data. Unlike gating approaches, modeling lends itself to automation and accounts for measurement overlap among cellular populations. Designing these models is now easier because of a new technique called high-definition t-SNE mapping. Nontrivial examples are provided that serve as a guide to create models that are consistent with data.

  11. SNE's methodological basis - web-based software in entrepreneurial surveys

    DEFF Research Database (Denmark)

    Madsen, Henning

    This overhead based paper gives an introduction to the research methodology applied in the surveys carried out in the SNE-project.......This overhead based paper gives an introduction to the research methodology applied in the surveys carried out in the SNE-project....

  12. Pre-nebular Light Curves of SNe I

    Energy Technology Data Exchange (ETDEWEB)

    Arnett, W. David [Steward Observatory, University of Arizona, 933 N. Cherry Avenue, Tucson, AZ 85721 (United States); Fryer, Christopher [Los Alamos National Laboratory, Los Alamos, NM (United States); Matheson, Thomas [National Optical Astronomy Observatory, Tucson, AZ (United States)

    2017-09-01

    We compare analytic predictions of supernova light curves with recent high-quality data from SN2011fe (Ia), KSN2011b (Ia), and the Palomar Transient Factory and the La Silla-QUEST variability survey (LSQ) (Ia). Because of the steady, fast cadence of observations, KSN2011b provides unique new information on SNe Ia: the smoothness of the light curve, which is consistent with significant large-scale mixing during the explosion, possibly due to 3D effects (e.g., Rayleigh–Taylor instabilities), and provides support for a slowly varying leakage (mean opacity). For a more complex light curve (SN2008D, SN Ib), we separate the luminosity due to multiple causes and indicate the possibility of a radioactive plume. The early rise in luminosity is shown to be affected by the opacity (leakage rate) for thermal and non-thermal radiation. A general derivation of Arnett’s rule again shows that it depends upon all processes heating the plasma, not just radioactive ones, so that SNe Ia will differ from SNe Ibc if the latter have multiple heating processes.

  13. A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition

    Directory of Open Access Journals (Sweden)

    Junhui He

    2018-01-01

    Full Text Available Steganography is a means of covert communication without revealing the occurrence and the real purpose of communication. The adaptive multirate wideband (AMR-WB is a widely adapted format in mobile handsets and is also the recommended speech codec for VoLTE. In this paper, a novel AMR-WB speech steganography is proposed based on diameter-neighbor codebook partition algorithm. Different embedding capacity may be achieved by adjusting the iterative parameters during codebook division. The experimental results prove that the presented AMR-WB steganography may provide higher and flexible embedding capacity without inducing perceptible distortion compared with the state-of-the-art methods. With 48 iterations of cluster merging, twice the embedding capacity of complementary-neighbor-vertices-based embedding method may be obtained with a decrease of only around 2% in speech quality and much the same undetectability. Moreover, both the quality of stego speech and the security regarding statistical steganalysis are better than the recent speech steganography based on neighbor-index-division codebook partition.

  14. Quantum Thetas on Noncommutative T^d with General Embeddings

    OpenAIRE

    Chang-Young, Ee; Kim, Hoil

    2007-01-01

    In this paper we construct quantum theta functions over noncommutative T^d with general embeddings. Manin has constructed quantum theta functions from the lattice embedding into vector space x finite group. We extend Manin's construction of quantum thetas to the case of general embedding of vector space x lattice x torus. It turns out that only for the vector space part of the embedding there exists the holomorphic theta vector, while for the lattice part there does not. Furthermore, the so-c...

  15. Tension between SNeIa and BAO: current status and future forecasts

    Energy Technology Data Exchange (ETDEWEB)

    Escamilla-Rivera, Celia [Astrophysics, University of Oxford, DWD, Kebble Road, Oxford, OX1 3RH (United Kingdom); Lazkoz, Ruth; Salzano, Vincenzo; Sendra, Irene, E-mail: celia_escamilla@ehu.es, E-mail: ruth.lazkoz@ehu.es, E-mail: vincenzo.salzano@ehu.es, E-mail: irene.sendra@ehu.es [Fisika Teorikoaren eta Zientziaren Historia Saila, Zientzia eta Teknologia Fakultatea, Euskal Herriko Unibertsitatea, 644 Posta Kutxatila, 48080 Bilbao (Spain)

    2011-09-01

    Using real and synthetic Type Ia SNe (SNeIa) and baryon acoustic oscillations (BAO) data representing current observations forecasts, this paper investigates the tension between those probes in the dark energy equation of state (EoS) reconstruction considering the well known CPL model and Wang's low correlation reformulation. In particular, here we present simulations of BAO data from both the the radial and transverse directions. We also explore the influence of priors on Ω{sub m} and Ω{sub b} on the tension issue, by considering 1σ deviations in either one or both of them. Our results indicate that for some priors there is no tension between a single dataset (either SNeIa or BAO) and their combination (SNeIa+BAO). Our criterion to discern the existence of tension (σ-distance) is also useful to establish which is the dataset with most constraining power; in this respect SNeIa and BAO data switch roles when current and future data are considered, as forecasts predict and spectacular quality improvement on BAO data. We also find that the results on the tension are blind to the way the CPL model is addressed: there is a perfect match between the original formulation and that by the correlation optimized proposed in Wang (2008), but the errors on the parameters are much narrower in all cases of our exhaustive exploration, thus serving the purpose of stressing the convenience of this reparametrization.

  16. Tension between SNeIa and BAO: current status and future forecasts

    International Nuclear Information System (INIS)

    Escamilla-Rivera, Celia; Lazkoz, Ruth; Salzano, Vincenzo; Sendra, Irene

    2011-01-01

    Using real and synthetic Type Ia SNe (SNeIa) and baryon acoustic oscillations (BAO) data representing current observations forecasts, this paper investigates the tension between those probes in the dark energy equation of state (EoS) reconstruction considering the well known CPL model and Wang's low correlation reformulation. In particular, here we present simulations of BAO data from both the the radial and transverse directions. We also explore the influence of priors on Ω m and Ω b on the tension issue, by considering 1σ deviations in either one or both of them. Our results indicate that for some priors there is no tension between a single dataset (either SNeIa or BAO) and their combination (SNeIa+BAO). Our criterion to discern the existence of tension (σ-distance) is also useful to establish which is the dataset with most constraining power; in this respect SNeIa and BAO data switch roles when current and future data are considered, as forecasts predict and spectacular quality improvement on BAO data. We also find that the results on the tension are blind to the way the CPL model is addressed: there is a perfect match between the original formulation and that by the correlation optimized proposed in Wang (2008), but the errors on the parameters are much narrower in all cases of our exhaustive exploration, thus serving the purpose of stressing the convenience of this reparametrization

  17. Hole motion in the t-J and Hubbard models: Effect of a next-nearest-neighbor hopping

    International Nuclear Information System (INIS)

    Gagliano, E.; Bacci, S.; Dagotto, E.

    1990-01-01

    Using exact diagonalization techniques, we study one dynamical hole in the two-dimensional t-J and Hubbard models on a square lattice including a next-nearest-neighbor hopping t'. We present the phase diagram in the parameter space (J/t,t'/t), discussing the ground-state properties of the hole. At J=0, a crossing of levels exists at some value of t' separating a ferromagnetic from an antiferromagnetic ground state. For nonzero J, at least four different regions appear where the system behaves like an antiferromagnet or a (not fully saturated) ferromagnet. We study the quasiparticle behavior of the hole, showing that for small values of |t'| the previously presented string picture is still valid. We also find that, for a realistic set of parameters derived from the Cu-O Hamiltonian, the hole has momentum (π/2,π/2), suggesting an enhancement of the p-wave superconducting mode due to the second-neighbor interactions in the spin-bag picture. Results for the t-t'-U model are also discussed with conclusions similar to those of the t-t'-J model. In general we found that t'=0 is not a singular point of these models

  18. A Tool for Interactive Data Visualization: Application to Over 10,000 Brain Imaging and Phantom MRI Data Sets

    Directory of Open Access Journals (Sweden)

    Sandeep R Panta

    2016-03-01

    Full Text Available In this paper we propose a web-based approach for quick visualization of big data from brain magnetic resonance imaging (MRI scans using a combination of an automated image capture and processing system, nonlinear embedding, and interactive data visualization tools. We draw upon thousands of MRI scans captured via the COllaborative Imaging and Neuroinformatics Suite (COINS. We then interface the output of several analysis pipelines based on structural and functional data to a t-distributed stochastic neighbor embedding (t-SNE algorithm which reduces the number of dimensions for each scan in the input data set to two dimensions while preserving the local structure of data sets. Finally, we interactively display the output of this approach via a web-page, based on data driven documents (D3 JavaScript library. Two distinct approaches were used to visualize the data. In the first approach, we computed multiple quality control (QC values from pre-processed data, which were used as inputs to the t-SNE algorithm. This approach helps in assessing the quality of each data set relative to others. In the second case, computed variables of interest (e.g. brain volume or voxel values from segmented gray matter images were used as inputs to the t-SNE algorithm. This approach helps in identifying interesting patterns in the data sets. We demonstrate these approaches using multiple examples including 1 quality control measures calculated from phantom data over time, 2 quality control data from human functional MRI data across various studies, scanners, sites, 3 volumetric and density measures from human structural MRI data across various studies, scanners and sites. Results from (1 and (2 show the potential of our approach to combine t-SNE data reduction with interactive color coding of variables of interest to quickly identify visually unique clusters of data (i.e. data sets with poor QC, clustering of data by site quickly. Results from (3 demonstrate

  19. Quantum thetas on noncommutative T4 from embeddings into lattice

    International Nuclear Information System (INIS)

    Chang-Young, Ee; Kim, Hoil

    2007-01-01

    In this paper, we investigate the theta vector and quantum theta function over noncommutative T 4 from the embedding of RxZ 2 . Manin has constructed the quantum theta functions from the lattice embedding into vector space (x finite group). We extend Manin's construction of the quantum theta function to the embedding of vector space x lattice case. We find that the holomorphic theta vector exists only over the vector space part of the embedding, and over the lattice part we can only impose the condition for the Schwartz function. The quantum theta function built on this partial theta vector satisfies the requirement of the quantum theta function. However, two subsequent quantum translations from the embedding into the lattice part are nonadditive, contrary to the additivity of those from the vector space part

  20. Approximated and User Steerable tSNE for Progressive Visual Analytics

    NARCIS (Netherlands)

    Pezzotti, N.; Lelieveldt, B.P.F.; van der Maaten, L.J.P.; Hollt, T.; Eisemann, E.; Vilanova Bartroli, A.

    2016-01-01

    Progressive Visual Analytics aims at improving the interactivity in existing analytics techniques by means of visualization as well as interaction with intermediate results. One key method for data analysis is dimensionality reduction, for example, to produce 2D embeddings that can be visualized and

  1. An adaptive deep convolutional neural network for rolling bearing fault diagnosis

    International Nuclear Information System (INIS)

    Fuan, Wang; Hongkai, Jiang; Haidong, Shao; Wenjing, Duan; Shuaipeng, Wu

    2017-01-01

    The working conditions of rolling bearings usually is very complex, which makes it difficult to diagnose rolling bearing faults. In this paper, a novel method called the adaptive deep convolutional neural network (CNN) is proposed for rolling bearing fault diagnosis. Firstly, to get rid of manual feature extraction, the deep CNN model is initialized for automatic feature learning. Secondly, to adapt to different signal characteristics, the main parameters of the deep CNN model are determined with a particle swarm optimization method. Thirdly, to evaluate the feature learning ability of the proposed method, t-distributed stochastic neighbor embedding (t-SNE) is further adopted to visualize the hierarchical feature learning process. The proposed method is applied to diagnose rolling bearing faults, and the results confirm that the proposed method is more effective and robust than other intelligent methods. (paper)

  2. K{sub I}-T estimation for embedded flaws in pipes - Part II: Circumferentially oriented cracks

    Energy Technology Data Exchange (ETDEWEB)

    Qian Xudong, E-mail: cveqx@nus.edu.s [Department of Civil Engineering, National University of Singapore, 1 Engineering Drive 2, Singapore 117576 (Singapore)

    2010-04-15

    This paper, in parallel to the investigation on axially embedded cracks reported in the companion paper, presents a numerical study on the linear-elastic K{sub I} and T-stress values over the front of elliptical cracks circumferentially embedded in the wall of a pipe/cylindrical structure, under a uniform pressure applied on the inner surface of the pipe. The numerical procedure employs the interaction-integral approach to compute the linear-elastic stress-intensity factor (SIF) K{sub I} and T-stress values for embedded cracks with practical sizes at different locations in the wall of the pipe. The parametric study covers a wide range of geometric parameters for embedded cracks in the pipe, including: the wall thickness to the inner radius ratio (t/R{sub i}), the crack depth over the wall thickness ratio (a/t), the crack aspect ratio (a/c) and the ratio of the distance from the centerline of the crack to the outer surface of the pipe over the pipe wall thickness (e{sub M}/t). The parametric investigation identifies a significant effect of the remaining ligament length on both the T-stress and K{sub I} values at the crack-front location (denoted by point O) nearest to the outer surface of the pipe and at the crack-front location (denoted by point I) nearest to the inner surface of the pipe. The numerical investigation establishes the database to derive approximate functions from a nonlinear curve-fitting procedure to predict the T-stress and K{sub I} values at three critical front locations of the circumferentially embedded crack in a pipe: points O, I and M. The proposed T-stress and K{sub I} functions utilize a combined second-order polynomial and a power-law expression, which presents a close agreement with the T-stress and K{sub I} values computed from the very detailed finite element models. The comparison between the circumferentially embedded crack and the axially embedded crack indicates that both the T-stress and K{sub I} values at crack-front points O and

  3. Impact of cosmic inhomogeneities on SNe observations

    Science.gov (United States)

    Kainulainen, Kimmo; Marra, Valerio

    2010-06-01

    We study the impact of cosmic inhomogeneities on the interpretation of SNe observations. We build an inhomogeneous universe model that can confront supernova data and yet is reasonably well compatible with the Copernican Principle. Our model combines a relatively small local void, that gives apparent acceleration at low redshifts, with a meatball model that gives sizeable lensing (dimming) at high redshifts. Together these two elements, which focus on different effects of voids on the data, allow the model to mimic the concordance model.

  4. Dimensionality reduction with unsupervised nearest neighbors

    CERN Document Server

    Kramer, Oliver

    2013-01-01

    This book is devoted to a novel approach for dimensionality reduction based on the famous nearest neighbor method that is a powerful classification and regression approach. It starts with an introduction to machine learning concepts and a real-world application from the energy domain. Then, unsupervised nearest neighbors (UNN) is introduced as efficient iterative method for dimensionality reduction. Various UNN models are developed step by step, reaching from a simple iterative strategy for discrete latent spaces to a stochastic kernel-based algorithm for learning submanifolds with independent parameterizations. Extensions that allow the embedding of incomplete and noisy patterns are introduced. Various optimization approaches are compared, from evolutionary to swarm-based heuristics. Experimental comparisons to related methodologies taking into account artificial test data sets and also real-world data demonstrate the behavior of UNN in practical scenarios. The book contains numerous color figures to illustr...

  5. CONSTRAINING DUST AND COLOR VARIATIONS OF HIGH-z SNe USING NICMOS ON THE HUBBLE SPACE TELESCOPE

    International Nuclear Information System (INIS)

    Nobili, S.; Amanullah, R.; Goobar, A.

    2009-01-01

    We present data from the Supernova Cosmology Project for five high redshift Type Ia supernovae (SNe Ia) that were obtained using the NICMOS infrared camera on the Hubble Space Telescope. We add two SNe from this sample to a rest-frame I-band Hubble diagram, doubling the number of high redshift supernovae on this diagram. This I-band Hubble diagram is consistent with a flat universe (Ω M , Ω Λ ) = (0.29, 0.71). A homogeneous distribution of large grain dust in the intergalactic medium (replenishing dust) is incompatible with the data and is excluded at the 5σ confidence level, if the SN host galaxy reddening is corrected assuming R V = 1.75. We use both optical and infrared observations to compare photometric properties of distant SNe Ia with those of nearby objects. We find generally good agreement with the expected color evolution for all SNe except the highest redshift SN in our sample (SN 1997ek at z = 0.863) which shows a peculiar color behavior. We also present spectra obtained from ground-based telescopes for type identification and determination of redshift.

  6. False-nearest-neighbors algorithm and noise-corrupted time series

    International Nuclear Information System (INIS)

    Rhodes, C.; Morari, M.

    1997-01-01

    The false-nearest-neighbors (FNN) algorithm was originally developed to determine the embedding dimension for autonomous time series. For noise-free computer-generated time series, the algorithm does a good job in predicting the embedding dimension. However, the problem of predicting the embedding dimension when the time-series data are corrupted by noise was not fully examined in the original studies of the FNN algorithm. Here it is shown that with large data sets, even small amounts of noise can lead to incorrect prediction of the embedding dimension. Surprisingly, as the length of the time series analyzed by FNN grows larger, the cause of incorrect prediction becomes more pronounced. An analysis of the effect of noise on the FNN algorithm and a solution for dealing with the effects of noise are given here. Some results on the theoretically correct choice of the FNN threshold are also presented. copyright 1997 The American Physical Society

  7. Pulsar-driven Jets In Sne, Grbs, Lmxbs, Ss 433, And The Universe

    Science.gov (United States)

    Middleditch, John

    2011-05-01

    The model of pulsar emission through superluminally induced polarization currents, (SLIP), predicts that pulsations produced by such currents at many light cylinder radii by a rotating, magnetized body, will drive pulsations close to the axis of rotation. In SN 1987A, the possible Rosetta Stone for 99% of SNe, GRBs, ms pulsars, and SS 433, such highly collimated (>1 in 10,000) 2.14 ms pulsations, and the similarly collimated jets of particles which they drove, including 1e-6 solar masses with velocities 0.95 c, were responsible for its very early light curve (days 3-20), its "Mystery Spot," observed slightly later (0.5 to 0.3 c, at days 30-50 and after), and still later, in less collimated form, its bipolarity. The axially driven pulsations enforce a toroidal geometry onto all early SNRs, rendering even SNe Ia unsuitable as standard candles. The numbers for Sco X-1's jet are identical, while those for SS 433 are lower (0.26 c), because of the absence of velocity "boosting" via collisions of heavy elements with lighter ones, due to the nearly pure hydrogen content of the supercritical accretion. SLIP also drives positrons from SNe to high energies, possibly accounting for the excess seen by PAMELA at scores of GeV, and predicts that almost all pulsars with very sharp single pulses have been detected because the Earth is in a favored direction where their fluxes diminish only as 1/distance, and this has been verified in the laboratory as well as for the Parkes Multibeam Survey. SLIP also predicts that GRB afterglows will be 100% pulsed at 500 Hz in their proper frame. Finally, SLIP jets from SNe of the first stars may allow galaxies to form without the need for dark matter. This work was supported in part by the Department of Energy through the Los Alamos Directed Research Grant DR20080085.

  8. The Complete Light-curve Sample of Spectroscopically Confirmed SNe Ia from Pan-STARRS1 and Cosmological Constraints from the Combined Pantheon Sample

    Science.gov (United States)

    Scolnic, D. M.; Jones, D. O.; Rest, A.; Pan, Y. C.; Chornock, R.; Foley, R. J.; Huber, M. E.; Kessler, R.; Narayan, G.; Riess, A. G.; Rodney, S.; Berger, E.; Brout, D. J.; Challis, P. J.; Drout, M.; Finkbeiner, D.; Lunnan, R.; Kirshner, R. P.; Sanders, N. E.; Schlafly, E.; Smartt, S.; Stubbs, C. W.; Tonry, J.; Wood-Vasey, W. M.; Foley, M.; Hand, J.; Johnson, E.; Burgett, W. S.; Chambers, K. C.; Draper, P. W.; Hodapp, K. W.; Kaiser, N.; Kudritzki, R. P.; Magnier, E. A.; Metcalfe, N.; Bresolin, F.; Gall, E.; Kotak, R.; McCrum, M.; Smith, K. W.

    2018-06-01

    We present optical light curves, redshifts, and classifications for 365 spectroscopically confirmed Type Ia supernovae (SNe Ia) discovered by the Pan-STARRS1 (PS1) Medium Deep Survey. We detail improvements to the PS1 SN photometry, astrometry, and calibration that reduce the systematic uncertainties in the PS1 SN Ia distances. We combine the subset of 279 PS1 SNe Ia (0.03 Ia from the Sloan Digital Sky Survey (SDSS), SNLS, and various low-z and Hubble Space Telescope samples to form the largest combined sample of SNe Ia, consisting of a total of 1048 SNe Ia in the range of 0.01 Ia to measure dark energy.

  9. Sensor Selection method for IoT systems – focusing on embedded system requirements

    Directory of Open Access Journals (Sweden)

    Hirayama Masayuki

    2016-01-01

    Full Text Available Recently, various types of sensors have been developed. Using these sensors, IoT systems have become hot topics in embedded system domain. However, sensor selections for embedded systems are not well discussed up to now. This paper focuses on embedded system’s features and architecture, and proposes a sensor selection method which is composed seven steps. In addition, we applied the proposed method to a simple example – a sensor selection for computer scored answer sheet reader unit. From this case study, an idea to use FTA in sensor selection is also discussed.

  10. Visualizing histopathologic deep learning classification and anomaly detection using nonlinear feature space dimensionality reduction.

    Science.gov (United States)

    Faust, Kevin; Xie, Quin; Han, Dominick; Goyle, Kartikay; Volynskaya, Zoya; Djuric, Ugljesa; Diamandis, Phedias

    2018-05-16

    There is growing interest in utilizing artificial intelligence, and particularly deep learning, for computer vision in histopathology. While accumulating studies highlight expert-level performance of convolutional neural networks (CNNs) on focused classification tasks, most studies rely on probability distribution scores with empirically defined cutoff values based on post-hoc analysis. More generalizable tools that allow humans to visualize histology-based deep learning inferences and decision making are scarce. Here, we leverage t-distributed Stochastic Neighbor Embedding (t-SNE) to reduce dimensionality and depict how CNNs organize histomorphologic information. Unique to our workflow, we develop a quantitative and transparent approach to visualizing classification decisions prior to softmax compression. By discretizing the relationships between classes on the t-SNE plot, we show we can super-impose randomly sampled regions of test images and use their distribution to render statistically-driven classifications. Therefore, in addition to providing intuitive outputs for human review, this visual approach can carry out automated and objective multi-class classifications similar to more traditional and less-transparent categorical probability distribution scores. Importantly, this novel classification approach is driven by a priori statistically defined cutoffs. It therefore serves as a generalizable classification and anomaly detection tool less reliant on post-hoc tuning. Routine incorporation of this convenient approach for quantitative visualization and error reduction in histopathology aims to accelerate early adoption of CNNs into generalized real-world applications where unanticipated and previously untrained classes are often encountered.

  11. Interacting scalar tensor cosmology in light of SNeIa, CMB, BAO and OHD observational data sets

    International Nuclear Information System (INIS)

    Rabiei, Sayed Wrya; Saaidi, Khaled; Sheikhahmadi, Haidar; Aghamohammadi, Ali

    2016-01-01

    In this work, an interacting chameleon-like scalar field scenario, by considering SNeIa, CMB, BAO, and OHD data sets, is investigated. In fact, the investigation is realized by introducing an ansatz for the effective dark energy equation of state, which mimics the behavior of chameleon-like models. Based on this assumption, some cosmological parameters, including the Hubble, deceleration, and coincidence parameters, in such a mechanism are analyzed. It is realized that, to estimate the free parameters of a theoretical model, by regarding the systematic errors it is better that the whole of the above observational data sets would be considered. In fact, if one considers SNeIa, CMB, and BAO, but disregards OHD, it maybe leads to different results. Also, to get a better overlap between the contours with the constraint χ m 2 ≤ 1, the χ T 2 function could be re-weighted. The relative probability functions are plotted for marginalized likelihood L(Ω m0 , ω 1 , β) according to the two dimensional confidence levels 68.3, 90, and 95.4%. Meanwhile, the value of the free parameters which maximize the marginalized likelihoods using the above confidence levels are obtained. In addition, based on these calculations the minimum value of χ 2 based on the free parameters of the ansatz for the effective dark energy equation of state is achieved. (orig.)

  12. ON THE DEPENDENCE OF TYPE Ia SNe LUMINOSITIES ON THE METALLICITY OF THEIR HOST GALAXIES

    International Nuclear Information System (INIS)

    Moreno-Raya, Manuel E.; Mollá, Mercedes; López-Sánchez, Ángel R.; Galbany, Lluís; Vílchez, José Manuel; Rosell, Aurelio Carnero; Domínguez, Inmaculada

    2016-01-01

    The metallicity of the progenitor system producing a type Ia supernova (SN Ia) could play a role in its maximum luminosity, as suggested by theoretical predictions. We present an observational study to investigate if such a relationship exists. Using the 4.2 m William Herschel Telescope (WHT) we have obtained intermediate-resolution spectroscopy data of a sample of 28 local galaxies hosting SNe Ia, for which distances have been derived using methods independent of those based on SN Ia parameters. From the emission lines observed in their optical spectra, we derived the gas-phase oxygen abundance in the region where each SN Ia exploded. Our data show a trend, with an 80% of chance not being due to random fluctuation, between SNe Ia absolute magnitudes and the oxygen abundances of the host galaxies, in the sense that luminosities tend to be higher for galaxies with lower metallicities. This result seems likely to be in agreement with both the theoretically expected behavior and with other observational results. This dependence M B –Z might induce systematic errors when it is not considered when deriving SNe Ia luminosities and then using them to derive cosmological distances

  13. Interacting scalar tensor cosmology in light of SNeIa, CMB, BAO and OHD observational data sets

    Energy Technology Data Exchange (ETDEWEB)

    Rabiei, Sayed Wrya; Saaidi, Khaled [Faculty of Science University of Kurdistan, Department of Physics, Sanandaj (Iran, Islamic Republic of); Sheikhahmadi, Haidar [Faculty of Science University of Kurdistan, Department of Physics, Sanandaj (Iran, Islamic Republic of); Institute for Advance Studies in Basic Sciences (IASBS) Gava Zang, Zanjan (Iran, Islamic Republic of); Aghamohammadi, Ali [Sanandaj Branch Islamic Azad University, Sanandaj (Iran, Islamic Republic of)

    2016-02-15

    In this work, an interacting chameleon-like scalar field scenario, by considering SNeIa, CMB, BAO, and OHD data sets, is investigated. In fact, the investigation is realized by introducing an ansatz for the effective dark energy equation of state, which mimics the behavior of chameleon-like models. Based on this assumption, some cosmological parameters, including the Hubble, deceleration, and coincidence parameters, in such a mechanism are analyzed. It is realized that, to estimate the free parameters of a theoretical model, by regarding the systematic errors it is better that the whole of the above observational data sets would be considered. In fact, if one considers SNeIa, CMB, and BAO, but disregards OHD, it maybe leads to different results. Also, to get a better overlap between the contours with the constraint χ{sub m}{sup 2} ≤ 1, the χ{sub T}{sup 2} function could be re-weighted. The relative probability functions are plotted for marginalized likelihood L(Ω{sub m0}, ω{sub 1}, β) according to the two dimensional confidence levels 68.3, 90, and 95.4%. Meanwhile, the value of the free parameters which maximize the marginalized likelihoods using the above confidence levels are obtained. In addition, based on these calculations the minimum value of χ{sup 2} based on the free parameters of the ansatz for the effective dark energy equation of state is achieved. (orig.)

  14. Constraining Magnetic Field Amplification in SN Shocks Using Radio Observations of SNe 2011fe and 2014J

    Science.gov (United States)

    Kundu, E.; Lundqvist, P.; Pérez-Torres, M. A.; Herrero-Illana, R.; Alberdi, A.

    2017-06-01

    We modeled the radio non-detection of two Type Ia supernovae (SNe), SN 2011fe and SN 2014J, considering synchrotron emission from the interaction between SN ejecta and the circumstellar medium. For ejecta whose outer parts have a power-law density structure, we compare synchrotron emission with radio observations. Assuming that 20% of the bulk shock energy is being shared equally between electrons and magnetic fields, we found a very low-density medium around both the SNe. A less tenuous medium with particle density ˜1 cm-3, which could be expected around both SNe, can be estimated when the magnetic field amplification is less than that presumed for energy equipartition. This conclusion also holds if the progenitor of SN 2014J was a rigidly rotating white dwarf (WD) with a main-sequence (MS) or red giant companion. For a He star companion, or a MS for SN 2014J, with 10% and 1% of bulk kinetic energy in magnetic fields, we obtain mass-loss rates of 99% onto the WD, but is less restricted for the latter case. However, if the tenuous medium is due to a recurrent nova, it is difficult from our model to predict synchrotron luminosities. Although the formation channels of SNe 2011fe and 2014J are not clear, the null detection in radio wavelengths could point toward a low amplification efficiency for magnetic fields in SN shocks.

  15. VizieR Online Data Catalog: Palomar Transient Factory SNe IIn photometry (Ofek+, 2014)

    Science.gov (United States)

    Ofek, E. O.; Arcavi, I.; Tal, D.; Sullivan, M.; Gal-Yam, A.; Kulkarni, S. R.; Nugent, P. E.; Ben-Ami, S.; Bersier, D.; Cao, Y.; Cenko, S. B.; De Cia, A.; Filippenko, A. V.; Fransson, C.; Kasliwal, M. M.; Laher, R.; Surace, J.; Quimby, R.; Yaron, O.

    2017-07-01

    The Palomar Transient Factory (PTF; Law et al. 2009PASP..121.1395L; Rau et al. 2009PASP..121.1334R) and its extension the intermediate PTF (iPTF) found over 2200 spectroscopically confirmed SNe. We selected 19 SNe IIn for which PTF/iPTF has good coverage of the light-curve rise and peak; they are listed in Table 1. Optical spectra were obtained with a variety of telescopes and instruments, including the Double Spectrograph (Oke & Gunn 1982PASP...94..586O) at the Palomar 5 m Hale telescope, the Kast spectrograph (Miller & Stone 1993, Lick Observatory Technical Report 66 (Santa Cruz, CA: Lick Observatory)) at the Lick 3 m Shane telescope, the Low Resolution Imaging Spectrometer (Oke et al. 1995PASP..107..375O) on the Keck-1 10 m telescope, and the Deep Extragalactic Imaging Multi-Object Spectrograph (Faber et al. 2003SPIE.4841.1657F) on the Keck-2 10 m telescope. (2 data files).

  16. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications.

    Science.gov (United States)

    Karyotis, Vasileios; Tsitseklis, Konstantinos; Sotiropoulos, Konstantinos; Papavassiliou, Symeon

    2018-04-15

    In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan-Newman (GN) community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT) testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  17. Electronic transport of molecular nanowires by considering of electron hopping energy between the second neighbors

    Directory of Open Access Journals (Sweden)

    H Rabani

    2015-07-01

    Full Text Available In this paper, we study the electronic conductance of molecular nanowires by considering the electron hopping between the first and second neighbors with the help Green’s function method at the tight-binding approach. We investigate three types of structures including linear uniform and periodic chains as well as poly(p-phenylene molecule which are embedded between two semi-infinite metallic leads. The results show that in the second neighbor approximation, the resonance, anti-resonance and Fano phenomena occur in the conductance spectra of these structures. Moreover, a new gap is observed at edge of the lead energy band wich its width depends on the value of the electron hopping energy between the second neighbors. In the systems including intrinsic gap, this hopping energy shifts the gap in the energy spectra.

  18. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications

    Directory of Open Access Journals (Sweden)

    Vasileios Karyotis

    2018-04-01

    Full Text Available In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan–Newman (GN community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  19. Fault Diagnosis of Supervision and Homogenization Distance Based on Local Linear Embedding Algorithm

    Directory of Open Access Journals (Sweden)

    Guangbin Wang

    2015-01-01

    Full Text Available In view of the problems of uneven distribution of reality fault samples and dimension reduction effect of locally linear embedding (LLE algorithm which is easily affected by neighboring points, an improved local linear embedding algorithm of homogenization distance (HLLE is developed. The method makes the overall distribution of sample points tend to be homogenization and reduces the influence of neighboring points using homogenization distance instead of the traditional Euclidean distance. It is helpful to choose effective neighboring points to construct weight matrix for dimension reduction. Because the fault recognition performance improvement of HLLE is limited and unstable, the paper further proposes a new local linear embedding algorithm of supervision and homogenization distance (SHLLE by adding the supervised learning mechanism. On the basis of homogenization distance, supervised learning increases the category information of sample points so that the same category of sample points will be gathered and the heterogeneous category of sample points will be scattered. It effectively improves the performance of fault diagnosis and maintains stability at the same time. A comparison of the methods mentioned above was made by simulation experiment with rotor system fault diagnosis, and the results show that SHLLE algorithm has superior fault recognition performance.

  20. Spectral Sequences of Type Ia Supernovae. I. Connecting Normal and Subluminous SNe Ia and the Presence of Unburned Carbon

    Energy Technology Data Exchange (ETDEWEB)

    Heringer, E.; Kerkwijk, M. H. van [Department of Astronomy and Astrophysics, University of Toronto, 50 Saint George Street, Toronto, ON M5S 3H4 (Canada); Sim, S. A. [Astrophysics Research Centre, School of Mathematics and Physics, Queens University Belfast, Belfast BT7 1NN (United Kingdom); Kerzendorf, W. E. [European Southern Observatory (ESO), Karl-Schwarzschild-Straße 2, D-85748 Garching (Germany)

    2017-09-01

    Type Ia supernovae (SNe Ia) are generally agreed to arise from thermonuclear explosions of carbon–oxygen white dwarfs. The actual path to explosion, however, remains elusive, with numerous plausible parent systems and explosion mechanisms suggested. Observationally, SNe Ia have multiple subclasses, distinguished by their light curves and spectra. This raises the question of whether these indicate that multiple mechanisms occur in nature or that explosions have a large but continuous range of physical properties. We revisit the idea that normal and 91bg-like SNe can be understood as part of a spectral sequence in which changes in temperature dominate. Specifically, we find that a single ejecta structure is sufficient to provide reasonable fits of both the normal SN Ia SN 2011fe and the 91bg-like SN 2005bl, provided that the luminosity and thus temperature of the ejecta are adjusted appropriately. This suggests that the outer layers of the ejecta are similar, thus providing some support for a common explosion mechanism. Our spectral sequence also helps to shed light on the conditions under which carbon can be detected in premaximum SN Ia spectra—we find that emission from iron can “fill in” the carbon trough in cool SNe Ia. This may indicate that the outer layers of the ejecta of events in which carbon is detected are relatively metal-poor compared to events in which carbon is not detected.

  1. Embedding potentials for excited states of embedded species

    International Nuclear Information System (INIS)

    Wesolowski, Tomasz A.

    2014-01-01

    Frozen-Density-Embedding Theory (FDET) is a formalism to obtain the upper bound of the ground-state energy of the total system and the corresponding embedded wavefunction by means of Euler-Lagrange equations [T. A. Wesolowski, Phys. Rev. A 77(1), 012504 (2008)]. FDET provides the expression for the embedding potential as a functional of the electron density of the embedded species, electron density of the environment, and the field generated by other charges in the environment. Under certain conditions, FDET leads to the exact ground-state energy and density of the whole system. Following Perdew-Levy theorem on stationary states of the ground-state energy functional, the other-than-ground-state stationary states of the FDET energy functional correspond to excited states. In the present work, we analyze such use of other-than-ground-state embedded wavefunctions obtained in practical calculations, i.e., when the FDET embedding potential is approximated. Three computational approaches based on FDET, that assure self-consistent excitation energy and embedded wavefunction dealing with the issue of orthogonality of embedded wavefunctions for different states in a different manner, are proposed and discussed

  2. Manifold Embedding and Semantic Segmentation for Intraoperative Guidance With Hyperspectral Brain Imaging.

    Science.gov (United States)

    Ravi, Daniele; Fabelo, Himar; Callic, Gustavo Marrero; Yang, Guang-Zhong

    2017-09-01

    Recent advances in hyperspectral imaging have made it a promising solution for intra-operative tissue characterization, with the advantages of being non-contact, non-ionizing, and non-invasive. Working with hyperspectral images in vivo, however, is not straightforward as the high dimensionality of the data makes real-time processing challenging. In this paper, a novel dimensionality reduction scheme and a new processing pipeline are introduced to obtain a detailed tumor classification map for intra-operative margin definition during brain surgery. However, existing approaches to dimensionality reduction based on manifold embedding can be time consuming and may not guarantee a consistent result, thus hindering final tissue classification. The proposed framework aims to overcome these problems through a process divided into two steps: dimensionality reduction based on an extension of the T-distributed stochastic neighbor approach is first performed and then a semantic segmentation technique is applied to the embedded results by using a Semantic Texton Forest for tissue classification. Detailed in vivo validation of the proposed method has been performed to demonstrate the potential clinical value of the system.

  3. A Machine Learning Ensemble Classifier for Early Prediction of Diabetic Retinopathy.

    Science.gov (United States)

    S K, Somasundaram; P, Alli

    2017-11-09

    The main complication of diabetes is Diabetic retinopathy (DR), retinal vascular disease and it leads to the blindness. Regular screening for early DR disease detection is considered as an intensive labor and resource oriented task. Therefore, automatic detection of DR diseases is performed only by using the computational technique is the great solution. An automatic method is more reliable to determine the presence of an abnormality in Fundus images (FI) but, the classification process is poorly performed. Recently, few research works have been designed for analyzing texture discrimination capacity in FI to distinguish the healthy images. However, the feature extraction (FE) process was not performed well, due to the high dimensionality. Therefore, to identify retinal features for DR disease diagnosis and early detection using Machine Learning and Ensemble Classification method, called, Machine Learning Bagging Ensemble Classifier (ML-BEC) is designed. The ML-BEC method comprises of two stages. The first stage in ML-BEC method comprises extraction of the candidate objects from Retinal Images (RI). The candidate objects or the features for DR disease diagnosis include blood vessels, optic nerve, neural tissue, neuroretinal rim, optic disc size, thickness and variance. These features are initially extracted by applying Machine Learning technique called, t-distributed Stochastic Neighbor Embedding (t-SNE). Besides, t-SNE generates a probability distribution across high-dimensional images where the images are separated into similar and dissimilar pairs. Then, t-SNE describes a similar probability distribution across the points in the low-dimensional map. This lessens the Kullback-Leibler divergence among two distributions regarding the locations of the points on the map. The second stage comprises of application of ensemble classifiers to the extracted features for providing accurate analysis of digital FI using machine learning. In this stage, an automatic detection

  4. T and D-Bench--Innovative Combined Support for Education and Research in Computer Architecture and Embedded Systems

    Science.gov (United States)

    Soares, S. N.; Wagner, F. R.

    2011-01-01

    Teaching and Design Workbench (T&D-Bench) is a framework aimed at education and research in the areas of computer architecture and embedded systems. It includes a set of features not found in other educational environments. This set of features is the result of an original combination of design requirements for T&D-Bench: that the…

  5. An embedded optical tracking system for motion-corrected magnetic resonance imaging at 7T.

    Science.gov (United States)

    Schulz, Jessica; Siegert, Thomas; Reimer, Enrico; Labadie, Christian; Maclaren, Julian; Herbst, Michael; Zaitsev, Maxim; Turner, Robert

    2012-12-01

    Prospective motion correction using data from optical tracking systems has been previously shown to reduce motion artifacts in MR imaging of the head. We evaluate a novel optical embedded tracking system. The home-built optical embedded tracking system performs image processing within a 7 T scanner bore, enabling high speed tracking. Corrected and uncorrected in vivo MR volumes are acquired interleaved using a modified 3D FLASH sequence, and their image quality is assessed and compared. The latency between motion and correction of the slice position was measured to be (19 ± 5) ms, and the tracking noise has a standard deviation no greater than 10 μm/0.005° during conventional MR scanning. Prospective motion correction improved the edge strength by 16 % on average, even though the volunteers were asked to remain motionless during the acquisitions. Using a novel method for validating the effectiveness of in vivo prospective motion correction, we have demonstrated that prospective motion correction using motion data from the embedded tracking system considerably improved image quality.

  6. Conformal cosmological model and SNe Ia data

    International Nuclear Information System (INIS)

    Zakharov, A. F.; Pervushin, V. N.

    2012-01-01

    Now there is a huge scientific activity in astrophysical studies and cosmological ones in particular. Cosmology transforms from a pure theoretical branch of science into an observational one. All the cosmological models have to pass observational tests. The supernovae type Ia (SNe Ia) test is among the most important ones. If one applies the test to determine parameters of the standard Friedmann-Robertson-Walker cosmological model one can conclude that observations lead to the discovery of the dominance of the Λ term and as a result to an acceleration of the Universe. However, there are big mysteries connected with an origin and an essence of dark matter (DM) and the Λ term or dark energy (DE). Alternative theories of gravitation are treated as a possible solution of DM and DE puzzles. The conformal cosmological approach is one of possible alternatives to the standard ΛCDM model. As it was noted several years ago, in the framework of the conformal cosmological approach an introduction of a rigid matter can explain observational data without Λ term (or dark energy). We confirm the claim with much larger set of observational data.

  7. Embedded pitch adapters: A high-yield interconnection solution for strip sensors

    Energy Technology Data Exchange (ETDEWEB)

    Ullán, M., E-mail: miguel.ullan@imb-cnm.csic.es [Centro Nacional de Microelectronica (IMB-CNM, CSIC), Campus UAB-Bellaterra, 08193 Barcelona (Spain); Allport, P.P.; Baca, M.; Broughton, J.; Chisholm, A.; Nikolopoulos, K.; Pyatt, S.; Thomas, J.P.; Wilson, J.A. [School of Physics and Astronomy, University of Birmingham, Birmingham B15 2TT (United Kingdom); Kierstead, J.; Kuczewski, P.; Lynn, D. [Brookhaven National Laboratory, Physics Department and Instrumentation Division, Upton, NY 11973-5000 (United States); Hommels, L.B.A. [Cavendish Laboratory, University of Cambridge, JJ Thomson Avenue, Cambridge CB3 0HE (United Kingdom); Fleta, C.; Fernandez-Tejero, J.; Quirion, D. [Centro Nacional de Microelectronica (IMB-CNM, CSIC), Campus UAB-Bellaterra, 08193 Barcelona (Spain); Bloch, I.; Díez, S.; Gregor, I.M.; Lohwasser, K. [DESY, Notkestrasse 85, 22607 Hamburg (Germany); and others

    2016-09-21

    A proposal to fabricate large area strip sensors with integrated, or embedded, pitch adapters is presented for the End-cap part of the Inner Tracker in the ATLAS experiment. To implement the embedded pitch adapters, a second metal layer is used in the sensor fabrication, for signal routing to the ASICs. Sensors with different embedded pitch adapters have been fabricated in order to optimize the design and technology. Inter-strip capacitance, noise, pick-up, cross-talk, signal efficiency, and fabrication yield have been taken into account in their design and fabrication. Inter-strip capacitance tests taking into account all channel neighbors reveal the important differences between the various designs considered. These tests have been correlated with noise figures obtained in full assembled modules, showing that the tests performed on the bare sensors are a valid tool to estimate the final noise in the full module. The full modules have been subjected to test beam experiments in order to evaluate the incidence of cross-talk, pick-up, and signal loss. The detailed analysis shows no indication of cross-talk or pick-up as no additional hits can be observed in any channel not being hit by the beam above 170 mV threshold, and the signal in those channels is always below 1% of the signal recorded in the channel being hit, above 100 mV threshold. First results on irradiated mini-sensors with embedded pitch adapters do not show any change in the interstrip capacitance measurements with only the first neighbors connected.

  8. NeighborHood

    OpenAIRE

    Corominola Ocaña, Víctor

    2015-01-01

    NeighborHood és una aplicació basada en el núvol, adaptable a qualsevol dispositiu (mòbil, tablet, desktop). L'objectiu d'aquesta aplicació és poder permetre als usuaris introduir a les persones del seu entorn més immediat i que aquestes persones siguin visibles per a la resta d'usuaris. NeighborHood es una aplicación basada en la nube, adaptable a cualquier dispositivo (móvil, tablet, desktop). El objetivo de esta aplicación es poder permitir a los usuarios introducir a las personas de su...

  9. A Visualization of Evolving Clinical Sentiment Using Vector Representations of Clinical Notes.

    Science.gov (United States)

    Ghassemi, Mohammad M; Mark, Roger G; Nemati, Shamim

    2015-09-01

    Our objective in this paper was to visualize the evolution of clinical language and sentiment with respect to several common population-level categories including: time in the hospital, age, mortality, gender and race. Our analysis utilized seven years of unstructured free text notes from the Multiparameter Intelligent Monitoring in Intensive Care (MIMIC) database. The text data was partitioned by category and used to generate several high dimensional vector space representations. We generated visualizations of the vector spaces using Distributed Stochastic Neighbor Embedding (tSNE) and Principal Component Analysis (PCA). We also investigated representative words from clusters in the vector space. Lastly, we inferred the general sentiment of the clinical notes toward each parameter by gauging the average distance between positive and negative keywords and all other terms in the space. We found intriguing differences in the sentiment of clinical notes over time, outcome, and demographic features. We noted a decrease in the homogeneity and complexity of clusters over time for patients with poor outcomes. We also found greater positive sentiment for females, unmarried patients, and patients of African ethnicity.

  10. Neighboring and Urbanism: Commonality versus Friendship.

    Science.gov (United States)

    Silverman, Carol J.

    1986-01-01

    Examines a dimension of neighboring that need not assume friendship as the role model. When the model assumes only a sense of connectedness as defining neighboring, then the residential correlation, shown in many studies between urbanism and neighboring, disappears. Theories of neighboring, study variables, methods, and analysis are discussed.…

  11. Nonparametric study of the evolution of the cosmological equation of state with SNeIa, BAO, and high-redshift GRBs

    Energy Technology Data Exchange (ETDEWEB)

    Postnikov, S. [Nuclear Theory Center, Indiana University, Bloomington, IN (United States); Dainotti, M. G. [Physics Department, Stanford University, Via Pueblo Mall 382, Stanford, CA (United States); Hernandez, X. [Instituto de Astronomía, Universidad Nacional Autónoma de México, México D.F. 04510 (Mexico); Capozziello, S., E-mail: spostnik@indiana.edu, E-mail: mdainott@stanford.edu, E-mail: dainotti@oa.uj.edu.pl, E-mail: xavier@astros.unam.mx, E-mail: capozziello@na.infn.it [Dipartimento di Fisica, Universitá di Napoli " Federico II," Compl. Univ. di Monte S. Angelo, Edificio G, Via Cinthia, I-80126 Napoli (Italy)

    2014-03-10

    We study the dark energy equation of state as a function of redshift in a nonparametric way, without imposing any a priori w(z) (ratio of pressure over energy density) functional form. As a check of the method, we test our scheme through the use of synthetic data sets produced from different input cosmological models that have the same relative errors and redshift distribution as the real data. Using the luminosity-time L{sub X} -T{sub a} correlation for gamma-ray burst (GRB) X-ray afterglows (the Dainotti et al. correlation), we are able to utilize GRB samples from the Swift satellite as probes of the expansion history of the universe out to z ≈ 10. Within the assumption of a flat Friedmann-Lemaître-Robertson-Walker universe and combining supernovae type Ia (SNeIa) data with baryonic acoustic oscillation constraints, the resulting maximum likelihood solutions are close to a constant w = –1. If one imposes the restriction of a constant w, we obtain w = –0.99 ± 0.06 (consistent with a cosmological constant) with the present-day Hubble constant as H {sub 0} = 70.0 ± 0.6km s{sup –1} Mpc{sup –1} and density parameter as Ω{sub Λ0} = 0.723 ± 0.025, while nonparametric w(z) solutions give us a probability map that is centered at H {sub 0} = 70.04 ± 1km s{sup –1} Mpc{sup –1} and Ω{sub Λ0} = 0.724 ± 0.03. Our chosen GRB data sample with a full correlation matrix allows us to estimate the amount, as well as quality (errors), of data needed to constrain w(z) in the redshift range extending an order of magnitude beyond the farthest SNeIa measured.

  12. Symmetric Link Key Management for Secure Neighbor Discovery in a Decentralized Wireless Sensor Network

    Science.gov (United States)

    2017-09-01

    KEY MANAGEMENT FOR SECURE NEIGHBOR DISCOVERY IN A DECENTRALIZED WIRELESS SENSOR NETWORK by Kelvin T. Chew September 2017 Thesis Advisor...and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT...DATE September 2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE SYMMETRIC LINK KEY MANAGEMENT FOR SECURE NEIGHBOR

  13. Convolutional Neural Networks as Feature Extractors for Data Scarce Visual Searches

    Science.gov (United States)

    2016-09-01

    created with the t-SNE technique, the fully connected layers FC6 and FC7 better represent the features’ compactness in high dimensional space . In the...This topology is called Fully Connected (FC) layers, and it is shown in Figure 2.2. A CNN model consists of several combinations of CONV and FC...to generate a new representation of the images. These representations are classified with K-Nearest Neighbors within a target space that has just a few

  14. Identifying influential neighbors in animal flocking.

    Directory of Open Access Journals (Sweden)

    Li Jiang

    2017-11-01

    Full Text Available Schools of fish and flocks of birds can move together in synchrony and decide on new directions of movement in a seamless way. This is possible because group members constantly share directional information with their neighbors. Although detecting the directionality of other group members is known to be important to maintain cohesion, it is not clear how many neighbors each individual can simultaneously track and pay attention to, and what the spatial distribution of these influential neighbors is. Here, we address these questions on shoals of Hemigrammus rhodostomus, a species of fish exhibiting strong schooling behavior. We adopt a data-driven analysis technique based on the study of short-term directional correlations to identify which neighbors have the strongest influence over the participation of an individual in a collective U-turn event. We find that fish mainly react to one or two neighbors at a time. Moreover, we find no correlation between the distance rank of a neighbor and its likelihood to be influential. We interpret our results in terms of fish allocating sequential and selective attention to their neighbors.

  15. Identifying influential neighbors in animal flocking.

    Science.gov (United States)

    Jiang, Li; Giuggioli, Luca; Perna, Andrea; Escobedo, Ramón; Lecheval, Valentin; Sire, Clément; Han, Zhangang; Theraulaz, Guy

    2017-11-01

    Schools of fish and flocks of birds can move together in synchrony and decide on new directions of movement in a seamless way. This is possible because group members constantly share directional information with their neighbors. Although detecting the directionality of other group members is known to be important to maintain cohesion, it is not clear how many neighbors each individual can simultaneously track and pay attention to, and what the spatial distribution of these influential neighbors is. Here, we address these questions on shoals of Hemigrammus rhodostomus, a species of fish exhibiting strong schooling behavior. We adopt a data-driven analysis technique based on the study of short-term directional correlations to identify which neighbors have the strongest influence over the participation of an individual in a collective U-turn event. We find that fish mainly react to one or two neighbors at a time. Moreover, we find no correlation between the distance rank of a neighbor and its likelihood to be influential. We interpret our results in terms of fish allocating sequential and selective attention to their neighbors.

  16. Deep embedding convolutional neural network for synthesizing CT image from T1-Weighted MR image.

    Science.gov (United States)

    Xiang, Lei; Wang, Qian; Nie, Dong; Zhang, Lichi; Jin, Xiyao; Qiao, Yu; Shen, Dinggang

    2018-07-01

    Recently, more and more attention is drawn to the field of medical image synthesis across modalities. Among them, the synthesis of computed tomography (CT) image from T1-weighted magnetic resonance (MR) image is of great importance, although the mapping between them is highly complex due to large gaps of appearances of the two modalities. In this work, we aim to tackle this MR-to-CT synthesis task by a novel deep embedding convolutional neural network (DECNN). Specifically, we generate the feature maps from MR images, and then transform these feature maps forward through convolutional layers in the network. We can further compute a tentative CT synthesis from the midway of the flow of feature maps, and then embed this tentative CT synthesis result back to the feature maps. This embedding operation results in better feature maps, which are further transformed forward in DECNN. After repeating this embedding procedure for several times in the network, we can eventually synthesize a final CT image in the end of the DECNN. We have validated our proposed method on both brain and prostate imaging datasets, by also comparing with the state-of-the-art methods. Experimental results suggest that our DECNN (with repeated embedding operations) demonstrates its superior performances, in terms of both the perceptive quality of the synthesized CT image and the run-time cost for synthesizing a CT image. Copyright © 2018. Published by Elsevier B.V.

  17. VizieR Online Data Catalog: Swift-UVOT obs. analysis of 29 SNe Ia (Brown+, 2017)

    Science.gov (United States)

    Brown, P. J.; Landez, N. J.; Milne, P. A.; Stritzinger, M. D.

    2017-10-01

    Swift/UVOT has observed over 500 SNe of all types in its 12 years of operation (see Brown+ 2015JHEAp...7..111B for a review of the first 10yrs). Most of the observations use six UV and optical filters. All photometry comes from the Swift Optical/Ultraviolet Supernova Archive (SOUSA; Brown+ 2014Ap&SS.354...89B) and is available at the Swift SN website and the Open Supernova Archive (Guillochon+ 2017ApJ...835...64G). (1 data file).

  18. Cross functional organisational embedded system development

    OpenAIRE

    Lennon, Sophie

    2015-01-01

    peer-reviewed Embedded system development is continuing to grow. Medical, automotive and Internet of Things are just some of the market segments. There is a tight coupling between hardware and software when developing an embedded system, often needing to meet strict performance targets, standards requirements and aggressive schedules. Embedded software developers need to consider hardware requirements in far greater detail as they can have a significant impact on the quality and value of t...

  19. Neighbor Discovery Algorithm in Wireless Local Area Networks Using Multi-beam Directional Antennas

    Science.gov (United States)

    Wang, Jin; Peng, Wei; Liu, Song

    2017-10-01

    Neighbor discovery is an important step for Wireless Local Area Networks (WLAN) and the use of multi-beam directional antennas can greatly improve the network performance. However, most neighbor discovery algorithms in WLAN, based on multi-beam directional antennas, can only work effectively in synchronous system but not in asynchro-nous system. And collisions at AP remain a bottleneck for neighbor discovery. In this paper, we propose two asynchrono-us neighbor discovery algorithms: asynchronous hierarchical scanning (AHS) and asynchronous directional scanning (ADS) algorithm. Both of them are based on three-way handshaking mechanism. AHS and ADS reduce collisions at AP to have a good performance in a hierarchical way and directional way respectively. In the end, the performance of the AHS and ADS are tested on OMNeT++. Moreover, it is analyzed that different application scenarios and the factors how to affect the performance of these algorithms. The simulation results show that AHS is suitable for the densely populated scenes around AP while ADS is suitable for that most of the neighborhood nodes are far from AP.

  20. ESTEEM: A Novel Framework for Qualitatively Evaluating and Visualizing Spatiotemporal Embeddings in Social Media

    Energy Technology Data Exchange (ETDEWEB)

    Arendt, Dustin L.; Volkova, Svitlana

    2017-07-30

    Analyzing and visualizing large amounts of social media communications and contrasting short-term conversation changes over time and geo-locations is extremely important for commercial and government applications. Earlier approaches for large-scale text stream summarization used dynamic topic models and trending words. Instead, we rely on text embeddings – low-dimensional word representations in a continuous vector space where similar words are embedded nearby each other. This paper presents ESTEEM,1 a novel tool for visualizing and evaluating spatiotemporal embeddings learned from streaming social media texts. Our tool allows users to monitor and analyze query words and their closest neighbors with an interactive interface. We used state-of- the-art techniques to learn embeddings and developed a visualization to represent dynamically changing relations between words in social media over time and other dimensions. This is the first interactive visualization of streaming text representations learned from social media texts that also allows users to contrast differences across multiple dimensions of the data.

  1. Perceptual inequality between two neighboring time intervals defined by sound markers: correspondence between neurophysiological and psychological data

    Directory of Open Access Journals (Sweden)

    Takako eMitsudo

    2014-09-01

    Full Text Available Brain activity related to time estimation processes in humans was analyzed using a perceptual phenomenon called auditory temporal assimilation. In a typical stimulus condition, two neighboring time intervals (T1 and T2 in this order are perceived as equal even when the physical lengths of these time intervals are considerably different. Our previous event-related potential (ERP study demonstrated that a slow negative component (SNCt appears in the right-frontal brain area (around the F8 electrode after T2, which is associated with judgment of the equality/inequality of T1 and T2. In the present study, we conducted two ERP experiments to further confirm the robustness of the SNCt. The stimulus patterns consisted of two neighboring time intervals marked by three successive tone bursts. Thirteen participants only listened to the patterns in the first session, and judged the equality/inequality of T1 and T2 in the next session. Behavioral data showed typical temporal assimilation. The ERP data revealed that three components (N1; contingent negative variation, CNV; and SNCt emerged related to the temporal judgment. The N1 appeared in the central area, and its peak latencies corresponded to the physical timing of each marker onset. The CNV component appeared in the frontal area during T2 presentation, and its amplitude increased as a function of T1. The SNCt appeared in the right-frontal area after the presentation of T1 and T2, and its magnitude was larger for the temporal patterns causing perceptual inequality. The SNCt was also correlated with the perceptual equality/inequality of the same stimulus pattern, and continued up to about 400 ms after the end of T2. These results suggest that the SNCt can be a signature of equality/inequality judgment, which derives from the comparison of the two neighboring time intervals.

  2. SN 2010jl: Optical to Hard X-ray Observations Reveal an Explosion Embedded In a Ten Solar Mass Cocoon

    DEFF Research Database (Denmark)

    Ofek, Eran O.; Zoglauer, Andreas; Boggs, Steven E.

    2014-01-01

    Some supernovae (SNe) may be powered by the interaction of the SN ejecta with a large amount of circumstellar matter (CSM). However, quantitative estimates of the CSM mass around such SNe are missing when the CSM material is optically thick. Specifically, current estimators are sensitive to uncer......Some supernovae (SNe) may be powered by the interaction of the SN ejecta with a large amount of circumstellar matter (CSM). However, quantitative estimates of the CSM mass around such SNe are missing when the CSM material is optically thick. Specifically, current estimators are sensitive...

  3. Quantum Algorithm for K-Nearest Neighbors Classification Based on the Metric of Hamming Distance

    Science.gov (United States)

    Ruan, Yue; Xue, Xiling; Liu, Heng; Tan, Jianing; Li, Xi

    2017-11-01

    K-nearest neighbors (KNN) algorithm is a common algorithm used for classification, and also a sub-routine in various complicated machine learning tasks. In this paper, we presented a quantum algorithm (QKNN) for implementing this algorithm based on the metric of Hamming distance. We put forward a quantum circuit for computing Hamming distance between testing sample and each feature vector in the training set. Taking advantage of this method, we realized a good analog for classical KNN algorithm by setting a distance threshold value t to select k - n e a r e s t neighbors. As a result, QKNN achieves O( n 3) performance which is only relevant to the dimension of feature vectors and high classification accuracy, outperforms Llyod's algorithm (Lloyd et al. 2013) and Wiebe's algorithm (Wiebe et al. 2014).

  4. Recrafting the neighbor-joining method

    Directory of Open Access Journals (Sweden)

    Pedersen Christian NS

    2006-01-01

    Full Text Available Abstract Background The neighbor-joining method by Saitou and Nei is a widely used method for constructing phylogenetic trees. The formulation of the method gives rise to a canonical Θ(n3 algorithm upon which all existing implementations are based. Results In this paper we present techniques for speeding up the canonical neighbor-joining method. Our algorithms construct the same phylogenetic trees as the canonical neighbor-joining method. The best-case running time of our algorithms are O(n2 but the worst-case remains O(n3. We empirically evaluate the performance of our algoritms on distance matrices obtained from the Pfam collection of alignments. The experiments indicate that the running time of our algorithms evolve as Θ(n2 on the examined instance collection. We also compare the running time with that of the QuickTree tool, a widely used efficient implementation of the canonical neighbor-joining method. Conclusion The experiments show that our algorithms also yield a significant speed-up, already for medium sized instances.

  5. A novel 2 T P-channel nano-crystal memory for low power/high speed embedded NVM applications

    International Nuclear Information System (INIS)

    Zhang Junyu; Wang Yong; Liu Jing; Zhang Manhong; Xu Zhongguang; Huo Zongliang; Liu Ming

    2012-01-01

    We introduce a novel 2 T P-channel nano-crystal memory structure for low power and high speed embedded non-volatile memory (NVM) applications. By using the band-to-band tunneling-induced hot-electron (BTBTIHE) injection scheme, both high-speed and low power programming can be achieved at the same time. Due to the use of a select transistor, the 'erased states' can be set to below 0 V, so that the periphery HV circuit (high-voltage generating and management) and read-out circuit can be simplified. Good memory cell performance has also been achieved, including a fast program/erase (P/E) speed (a 1.15 V memory window under 10 μs program pulse), an excellent data retention (only 20% charge loss for 10 years). The data shows that the device has strong potential for future embedded NVM applications. (semiconductor devices)

  6. Model of directed lines for square ice with second-neighbor and third-neighbor interactions

    Science.gov (United States)

    Kirov, Mikhail V.

    2018-02-01

    The investigation of the properties of nanoconfined systems is one of the most rapidly developing scientific fields. Recently it has been established that water monolayer between two graphene sheets forms square ice. Because of the energetic disadvantage, in the structure of the square ice there are no longitudinally arranged molecules. The result is that the structure is formed by unidirectional straight-lines of hydrogen bonds only. A simple but accurate discrete model of square ice with second-neighbor and third-neighbor interactions is proposed. According to this model, the ground state includes all configurations which do not contain three neighboring unidirectional chains of hydrogen bonds. Each triplet increases the energy by the same value. This new model differs from an analogous model with long-range interactions where in the ground state all neighboring chains are antiparallel. The new model is suitable for the corresponding system of point electric (and magnetic) dipoles on the square lattice. It allows separately estimating the different contributions to the total binding energy and helps to understand the properties of infinite monolayers and finite nanostructures. Calculations of the binding energy for square ice and for point dipole system are performed using the packages TINKER and LAMMPS.

  7. Quantum thetas on noncommutative Td with general embeddings

    International Nuclear Information System (INIS)

    Chang-Young, Ee; Kim, Hoil

    2008-01-01

    In this paper, we construct quantum theta functions over noncommutative T d with general embeddings. Manin has constructed quantum theta functions from the lattice embedding into vector space x finite group. We extend Manin's construction of quantum thetas to the case of general embedding of vector space x lattice x torus. It turns out that only for the vector space part of the embedding there exists the holomorphic theta vector, while for the lattice part there does not. Furthermore, the so-called quantum translations from embedding into the lattice part become non-additive, while those from the vector space part are additive

  8. Embedding of the radiation cosmos

    International Nuclear Information System (INIS)

    Wang, J.Z.

    1986-01-01

    The embedding of the Friedmann manifold into a higher dimensional Minkowski space is investigated. As solutions of the Friedmann equation with vanishing cosmological term, Friedmann models describe a first expanding, then contracting universe and predict a big bang singularity. For cosmic time t → 0, R(t) → 0, there is an infinite scalar, curvature in the matter cosmos, and an infinite eigenvalue corresponding to the unique timelike eigenvector of the energy-momentum tensor in the radiation cosmos. The big bang, therefore, is an intrinsic singularity of the space time. To investigate the singularity one resorts to the embedding of the Friedmann manifold into a higher dimensional Minkowski space. For the matter cosmos such an investigation has already been done (Lauro and Schucking, 1984). However, the matter cosmos is not a suitable model to discuss the very early universe where the radiation dominates. Geometric properties, such as the Riemann tensor, the Guassian curvature and the global behavior of the geodesics of the embedded manifold, are discussed in detail

  9. LSB steganography with improved embedding efficiency and undetectability

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin Yowell Yousif

    2015-01-01

    In this paper, we propose a new method of non-adapt ive LSB steganography in still images to improve the embedding efficiency from 2 to 8/3 rand om bits per one embedding change even for the embedding rate of 1 bit per pixel. The method t akes 2-bits of the secret message at a time and compares them to the LSBs of the two chosen pix el values for embedding, it always assumes a single mismatch between the two and uses the seco nd LSB o...

  10. Haldane to Dimer Phase Transition in the Spin-1 Haldane System with Bond-Alternating Nearest-Neighbor and Uniform Next-Nearest-Neighbor Exchange Interactions

    OpenAIRE

    Takashi, Tonegawa; Makoto, Kaburagi; Takeshi, Nakao; Department of Physics, Faculty of Science, Kobe University; Faculty of Cross-Cultural Studies, Kobe University; Department of Physics, Faculty of Science, Kobe University

    1995-01-01

    The Haldane to dimer phase transition is studied in the spin-1 Haldane system with bond-alternating nearest-neighbor and uniform next-nearest-neighbor exchange interactions, where both interactions are antiferromagnetic and thus compete with each other. By using a method of exact diagonalization, the ground-state phase diagram on the ratio of the next-nearest-neighbor interaction constant to the nearest-neighbor one versus the bond-alternation parameter of the nearest-neighbor interactions is...

  11. OPTICAL CROSS-CORRELATION FILTERS: AN ECONOMICAL APPROACH FOR IDENTIFYING SNe Ia AND ESTIMATING THEIR REDSHIFTS

    International Nuclear Information System (INIS)

    Scolnic, Daniel M.; Riess, Adam G.; Huber, Mark E.; Rest, Armin; Stubbs, Christoper W.; Tonry, John L.

    2009-01-01

    Large photometric surveys of transient phenomena, such as Panoramic Survey Telescope and Rapid Response System and Large Synoptic Survey Telescope, will locate thousands to millions of Type Ia supernova (SN Ia) candidates per year, a rate prohibitive for acquiring spectroscopy to determine each candidate's type and redshift. In response, we have developed an economical approach to identifying SNe Ia and their redshifts using an uncommon type of optical filter which has multiple, discontinuous passbands on a single substrate. Observation of a supernova through a specially designed pair of these 'cross-correlation filters' measures the approximate amplitude and phase of the cross-correlation between the spectrum and a SN Ia template, a quantity typically used to determine the redshift and type of a high-redshift SN Ia. Simulating the use of these filters, we obtain a sample of SNe Ia which is ∼98% pure with individual redshifts measured to σ z = 0.01 precision. The advantages of this approach over standard broadband photometric methods are that it is insensitive to reddening, independent of the color data used for subsequent distance determinations which reduce selection or interpretation bias, and because it makes use of the spectral features its reliability is greater. A great advantage over long-slit spectroscopy comes from increased throughput, enhanced multiplexing, and reduced setup time resulting in a net gain in speed of up to ∼30 times. This approach is also insensitive to host galaxy contamination. Prototype filters were built and successfully used on Magellan with LDSS-3 to characterize three SuperNova Legacy Survey candidates. We discuss how these filters can provide critical information for the upcoming photometric supernova surveys.

  12. The curious case of SN 2011dn: A very peculiar type Ia supernova?

    Science.gov (United States)

    Rachubo, Alisa

    Type Ia supernovae (SNe Ia) are excellent cosmological distance indicators due to the uniformity in their light curves, which led to the major discovery of the accelerated expansion of the universe. However, SNe Ia are not so uniform as one may expect, as there are many peculiar SNe Ia that exhibit differences in their photometric and spectroscopic behavior from normal SNe Ia. One of the goals of supernova cosmology today is to produce a cleaner sample of SNe Ia without these peculiar SNe Ia. Here we consider SN 2011dn, a peculiar SN Ia candidate. In 2011, Salvo, et al. carried out a preliminary analysis of a subset of the data prescribed here, and identified spectral and photometric peculiarities in this object's evolution that warranted further analysis. Here, we present a complete re-reduction and reanalysis of B, V,R, and I photometry of SN 2011dn obtained at Mount Laguna Observatory, spanning from 7 days before maximum light in B to 88 days past maximum light. In addition, we also consider total flux spectra from 9 days before maximum light to 4 days after maximum light, along with ultraviolet (UV) photometry obtained with the Swift telescope. From SN 2011dn's optical spectra, we find that SN 2011dn most closely resembles a SN 1991T-like type Ia supernova ('91T-like SN Ia). Such SNe Ia are typically more luminous than normal SNe Ia, and possess broader (i.e., they decline less rapidly than normal from maximum light) light curves. Their Deltam15(B) (drop in B magnitude 15 days after maximum light) are typically significantly less than the canonical value of 1.1, and can be as low as 0.8. In the earlier preliminary analysis, Salvo et al. measured a surprisingly high Deltam15(B) value for SN 2011dn, of ˜ 1.1. Since SN 2011dn was embedded in UGC 11501 (its host galaxy), however, it is possible that some of the light from the host galaxy was included in the photometric aperture, resulting in inaccurate photometric measurements. Here, in order to better isolate the

  13. Recrafting the Neighbor-Joining Method

    DEFF Research Database (Denmark)

    Mailund; Brodal, Gerth Stølting; Fagerberg, Rolf

    2006-01-01

    Background: The neighbor-joining method by Saitou and Nei is a widely used method for constructing phylogenetic trees. The formulation of the method gives rise to a canonical Θ(n3) algorithm upon which all existing implementations are based. Methods: In this paper we present techniques for speeding...... up the canonical neighbor-joining method. Our algorithms construct the same phylogenetic trees as the canonical neighbor-joining method. The best-case running time of our algorithms are O(n2) but the worst-case remains O(n3). We empirically evaluate the performance of our algoritms on distance...... matrices obtained from the Pfam collection of alignments. Results: The experiments indicate that the running time of our algorithms evolve as Θ(n2) on the examined instance collection. We also compare the running time with that of the QuickTree tool, a widely used efficient implementation of the canonical...

  14. Can't Count or Won't Count? Embedding Quantitative Methods in Substantive Sociology Curricula: A Quasi-Experiment.

    Science.gov (United States)

    Williams, Malcolm; Sloan, Luke; Cheung, Sin Yi; Sutton, Carole; Stevens, Sebastian; Runham, Libby

    2016-06-01

    This paper reports on a quasi-experiment in which quantitative methods (QM) are embedded within a substantive sociology module. Through measuring student attitudes before and after the intervention alongside control group comparisons, we illustrate the impact that embedding has on the student experience. Our findings are complex and even contradictory. Whilst the experimental group were less likely to be distrustful of statistics and appreciate how QM inform social research, they were also less confident about their statistical abilities, suggesting that through 'doing' quantitative sociology the experimental group are exposed to the intricacies of method and their optimism about their own abilities is challenged. We conclude that embedding QM in a single substantive module is not a 'magic bullet' and that a wider programme of content and assessment diversification across the curriculum is preferential.

  15. [Phenolic compounds in leaves insertions of Mentha × villosa Huds. cv. Snežná].

    Science.gov (United States)

    Tekeľová, Daniela; Bittner Fialová, Silvia; Tóth, Jaroslav; Czigle, Szilvia

    Lamiaceae plants mostly accumulate active ingredients in their leaves. The subfamily Nepetoideae, including the genus Mentha L., is characterized by the presence of essential oil and antioxidant phenolics, chiefly hydroxycinnamic acids with predominance of rosmarinic acid, and flavonoids. Mentha × piperita and M. spicata are the most broadly used mints in both medicine and industry, while M. x villosa is less known in our country. Herbal drugs in the form of leaves are usually analysed unpartitioned, while single leaves insertions have only been studied occasionally. Therefore, the aim of this work was the quantification of the active compounds content in the leaves pairs of Mentha × villosa Huds. cv. Snežná, using pharmacopoeial methods: total hydroxycinnamic derivatives expressed as rosmarinic acid (THD) and luteolin-type flavonoids. THD content ranged from 6.7% to 9.4% in the leaves pairs water extracts, and from 6.6% to 14.0% in methanol extracts. Flavonoids contents, expressed as luteolin-7-O-glucoside, ranged from 4.0% to 8.8% in water extracts, and from 4.0% to 10.5% in methanol extracts. Antioxidant activity (DPPH) expressed as SC50 ranged from 10.2 to 16.9 μg.ml-1 (drug dry weight) in water extracts, and from 10.7 to 21.6 μg.ml-1 in methanol extracts. The highest content of phenolic compounds as well as the highest antioxidant activity were found to be in the top sheet, while the lowest content of phenolic compounds and lowest antioxidant activity were detected in the leaves of the middle stem part.Key words: Mentha × villosa Huds cv. Snežná hydroxycinnamic derivatives rosmarinic acid luteolin-7-O-glucoside DPPH.

  16. Algoritma Interpolasi Nearest-Neighbor untuk Pendeteksian Sampul Pulsa Oscilometri Menggunakan Mikrokontroler Berbiaya Rendah

    Directory of Open Access Journals (Sweden)

    Firdaus Firdaus

    2017-12-01

    Full Text Available Non-invasive blood pressure measurement devices are widely available in the marketplace. Most of these devices use the oscillometric principle that store and analyze oscillometric waveforms during cuff deflation to obtain mean arterial pressure, systolic blood pressure and diastolic blood pressure. Those pressure values are determined from the oscillometric waveform envelope. Several methods to detect the envelope of oscillometric pulses utilize a complex algorithm that requires a large capacity memory and certainly difficult to process by a low memory capacity embedded system. A simple nearest-neighbor interpolation method is applied for oscillometric pulse envelope detection in non-invasive blood pressure measurement using microcontroller such ATmega328. The experiment yields 59 seconds average time to process the computation with 3.6% average percent error in blood pressure measurement.

  17. Can’t Count or Won’t Count? Embedding Quantitative Methods in Substantive Sociology Curricula: A Quasi-Experiment

    Science.gov (United States)

    Williams, Malcolm; Sloan, Luke; Cheung, Sin Yi; Sutton, Carole; Stevens, Sebastian; Runham, Libby

    2015-01-01

    This paper reports on a quasi-experiment in which quantitative methods (QM) are embedded within a substantive sociology module. Through measuring student attitudes before and after the intervention alongside control group comparisons, we illustrate the impact that embedding has on the student experience. Our findings are complex and even contradictory. Whilst the experimental group were less likely to be distrustful of statistics and appreciate how QM inform social research, they were also less confident about their statistical abilities, suggesting that through ‘doing’ quantitative sociology the experimental group are exposed to the intricacies of method and their optimism about their own abilities is challenged. We conclude that embedding QM in a single substantive module is not a ‘magic bullet’ and that a wider programme of content and assessment diversification across the curriculum is preferential. PMID:27330225

  18. Influence of parasite density and sample storage time on the reliability of Entamoeba histolytica-specific PCR from formalin-fixed and paraffin-embedded tissues.

    Science.gov (United States)

    Frickmann, Hagen; Tenner-Racz, Klara; Eggert, Petra; Schwarz, Norbert G; Poppert, Sven; Tannich, Egbert; Hagen, Ralf M

    2013-12-01

    We report on the reliability of polymerase chain reaction (PCR) for the detection of Entamoeba histolytica from formalin-fixed, paraffin-embedded tissue in comparison with microscopy and have determined predictors that may influence PCR results. E. histolytica-specific and Entamoeba dispar-specific real-time PCR and microscopy from adjacent histologic sections were performed using a collection of formalin-fixed, paraffin-embedded tissue specimens obtained from patients with invasive amebiasis. Specimens had been collected during the previous 4 decades. Association of sample age, parasite density, and reliability of PCR was analyzed. E. histolytica PCR was positive in 20 of 34 biopsies (58.8%); 2 of these 20 were microscopically negative for amebae in neighboring tissue sections. PCR was negative in 9 samples with visible amebae in neighboring sections and in 5 samples without visible parasites in neighboring sections. PCR was negative in all specimens that were older than 3 decades. Low parasite counts and sample ages older than 20 years were predictors for false-negative PCR results. All samples were negative for E. dispar DNA. PCR is suitable for the detection of E. histolytica in formalin-fixed, paraffin-embedded tissue samples that are younger than 2 decades and that contain intermediate to high parasite numbers. Negative results in older samples were due to progressive degradation of DNA over time as indicated by control PCRs targeting the human 18S rRNA gene. Moreover, our findings support previous suggestions that only E. histolytica but not E. dispar is responsible for invasive amebiasis.

  19. Observational information for f(T) theories and dark torsion

    Energy Technology Data Exchange (ETDEWEB)

    Bengochea, Gabriel R., E-mail: gabriel@iafe.uba.a [Instituto de Astronomia y Fisica del Espacio (IAFE), CC 67, Suc. 28, 1428 Buenos Aires (Argentina)

    2011-01-17

    In the present work we analyze and compare the information coming from different observational data sets in the context of a sort of f(T) theories. We perform a joint analysis with measurements of the most recent type Ia supernovae (SNe Ia), Baryon Acoustic Oscillation (BAO), Cosmic Microwave Background radiation (CMB), Gamma-Ray Bursts data (GRBs) and Hubble parameter observations (OHD) to constraint the only new parameter these theories have. It is shown that when the new combined BAO/CMB parameter is used to put constraints, the result is different from previous works. We also show that when we include Observational Hubble Data (OHD) the simpler {Lambda}CDM model is excluded to one sigma level, leading the effective equation of state of these theories to be of phantom type. Also, analyzing a tension criterion for SNe Ia and other observational sets, we obtain more consistent and better suited data sets to work with these theories.

  20. Frog sound identification using extended k-nearest neighbor classifier

    Science.gov (United States)

    Mukahar, Nordiana; Affendi Rosdi, Bakhtiar; Athiar Ramli, Dzati; Jaafar, Haryati

    2017-09-01

    Frog sound identification based on the vocalization becomes important for biological research and environmental monitoring. As a result, different types of feature extractions and classifiers have been employed to evaluate the accuracy of frog sound identification. This paper presents a frog sound identification with Extended k-Nearest Neighbor (EKNN) classifier. The EKNN classifier integrates the nearest neighbors and mutual sharing of neighborhood concepts, with the aims of improving the classification performance. It makes a prediction based on who are the nearest neighbors of the testing sample and who consider the testing sample as their nearest neighbors. In order to evaluate the classification performance in frog sound identification, the EKNN classifier is compared with competing classifier, k -Nearest Neighbor (KNN), Fuzzy k -Nearest Neighbor (FKNN) k - General Nearest Neighbor (KGNN)and Mutual k -Nearest Neighbor (MKNN) on the recorded sounds of 15 frog species obtained in Malaysia forest. The recorded sounds have been segmented using Short Time Energy and Short Time Average Zero Crossing Rate (STE+STAZCR), sinusoidal modeling (SM), manual and the combination of Energy (E) and Zero Crossing Rate (ZCR) (E+ZCR) while the features are extracted by Mel Frequency Cepstrum Coefficient (MFCC). The experimental results have shown that the EKNCN classifier exhibits the best performance in terms of accuracy compared to the competing classifiers, KNN, FKNN, GKNN and MKNN for all cases.

  1. Making embedded systems design patterns for great software

    CERN Document Server

    White, Elecia

    2011-01-01

    Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate a host of good development practices, based on classic software design patterns and new patterns unique to embedded programming. Learn how to build system architecture for processors, not operating systems, and discover specific techniques for dealing with hardware difficulties and manufacturing requirements. Written by an expert who's created embedded systems ranging from urban surveillance and DNA scanner

  2. The patient-centered medical home neighbor: A primary care physician's view.

    Science.gov (United States)

    Sinsky, Christine A

    2011-01-04

    The American College of Physicians' position paper on the patient-centered medical home neighbor (PCMH-N) extends the work of the patient-centered medical home (PCMH) as a means of improving the delivery of health care. Recognizing that the PCMH does not exist in isolation, the PCMH-N concept outlines expectations for comanagement, communication, and care coordination and broadens responsibility for safe, effective, and efficient care beyond primary care to include physicians of all specialties. As such, it is a fitting follow-up to the PCMH and moves further down the road toward improved care for complex patients. Yet, there is more work to be done. Truly transforming the U.S. health care system around personalized medical homes embedded in highly functional medical neighborhoods will require better staffing models; more robust electronic information tools; aligned incentives for quality and efficiency within payment and regulatory policies; and a culture of greater engagement of patients, their families, and communities.

  3. Nearest-neighbor Kitaev exchange blocked by charge order in electron-doped α -RuCl3

    Science.gov (United States)

    Koitzsch, A.; Habenicht, C.; Müller, E.; Knupfer, M.; Büchner, B.; Kretschmer, S.; Richter, M.; van den Brink, J.; Börrnert, F.; Nowak, D.; Isaeva, A.; Doert, Th.

    2017-10-01

    A quantum spin liquid might be realized in α -RuCl3 , a honeycomb-lattice magnetic material with substantial spin-orbit coupling. Moreover, α -RuCl3 is a Mott insulator, which implies the possibility that novel exotic phases occur upon doping. Here, we study the electronic structure of this material when intercalated with potassium by photoemission spectroscopy, electron energy loss spectroscopy, and density functional theory calculations. We obtain a stable stoichiometry at K0.5RuCl3 . This gives rise to a peculiar charge disproportionation into formally Ru2 + (4 d6 ) and Ru3 + (4 d5 ). Every Ru 4 d5 site with one hole in the t2 g shell is surrounded by nearest neighbors of 4 d6 character, where the t2 g level is full and magnetically inert. Thus, each type of Ru site forms a triangular lattice, and nearest-neighbor interactions of the original honeycomb are blocked.

  4. Security Implications for Ultra-Low Power Configurable SoC FPAA Embedded Systems

    Directory of Open Access Journals (Sweden)

    Jennifer Hasler

    2018-06-01

    Full Text Available We discuss the impact of physical computing techniques to classifying network security issues for ultra-low power networked IoT devices. Physical computing approaches enable at least a factor of 1000 improvement in computational energy efficiency empowering a new generation of local computational structures for embedded IoT devices. These techniques offer computational capability to address network security concerns. This paper begins the discussion of security opportunities for, and issues using, FPAA devices for small embedded IoT platforms. These FPAAs enable devices often utilized for low-power context aware computation. Embedded FPAA devices have both positive Security attributes, as well as potential vulnerabilities. FPAA devices can be part of the resulting secure computation, such as implementing unique functions. FPAA devices can be used investigate security of analog/mixed signal capabilities. The paper concludes with summarizing key improvements for secure ultra-low power embedded FPAA devices.

  5. Comparative investigations of T cell receptor gamma gene rearrangements in frozen and formalin-fixed paraffin wax-embedded tissues by capillary electrophoresis

    DEFF Research Database (Denmark)

    Christensen, M; Funder, A D; Bendix, K

    2006-01-01

    AIM: To compare clonal T cell receptor gamma (TCRgamma) gene rearrangements in frozen and formalin-fixed paraffin wax-embedded (FFPE) tissue, using capillary electrophoresis for use in diagnostics, as T cell lymphomas may be difficult to diagnose by conventional methods.METHODS: The DNA for PCR......% for patient specimens and the specificity 100%. The junctional region between the Vgamma and Jgamma segments was specific for each patient.CONCLUSIONS: Capillary electrophoresis of PCR products from frozen and FFPE tissue is suitable for detecting clonal TCRgamma gene rearrangements. It is important, however...

  6. The spectrum and the quantum Hall effect on the square lattice with next-nearest-neighbor hopping: Statistics of holons and spinons in the t-J model

    International Nuclear Information System (INIS)

    Hatsugai, Y.; Kohmoto, M.

    1992-01-01

    We investigate the energy spectrum and the Hall effect of electrons on the square lattice with next-nearest-neighbor (NNN) hopping as well as nearest-neighbor hopping. General rational values of magnetic flux per unit cell φ=p/q are considered. In the absence of NNN hopping, the two bands at the center touch for q even, thus the Hall conductance is not well defined at half filling. An energy gap opens there by introducing NNN hoping. When φ=1/2, the NNN model coincides with the mean field Hamiltonian for the chiral spin state proposed by Wen, Wilczek and Zee (WWZ). The Hall conductance is calculated from the Diophantine equation and the E-φ diagram. We find that gaps close for other fillings at certain values of NNN hopping strength. The quantized value of the Hall conductance changes once this phenomenon occurs. In a mean field treatment of the t-J model, the effective Hamiltonian is the same as our NNN model. From this point of view, the statistics of the quasi-particles is not always semion and depends on the filling and the strength of the mean field. (orig.)

  7. Mixed random walks with a trap in scale-free networks including nearest-neighbor and next-nearest-neighbor jumps

    Science.gov (United States)

    Zhang, Zhongzhi; Dong, Yuze; Sheng, Yibin

    2015-10-01

    Random walks including non-nearest-neighbor jumps appear in many real situations such as the diffusion of adatoms and have found numerous applications including PageRank search algorithm; however, related theoretical results are much less for this dynamical process. In this paper, we present a study of mixed random walks in a family of fractal scale-free networks, where both nearest-neighbor and next-nearest-neighbor jumps are included. We focus on trapping problem in the network family, which is a particular case of random walks with a perfect trap fixed at the central high-degree node. We derive analytical expressions for the average trapping time (ATT), a quantitative indicator measuring the efficiency of the trapping process, by using two different methods, the results of which are consistent with each other. Furthermore, we analytically determine all the eigenvalues and their multiplicities for the fundamental matrix characterizing the dynamical process. Our results show that although next-nearest-neighbor jumps have no effect on the leading scaling of the trapping efficiency, they can strongly affect the prefactor of ATT, providing insight into better understanding of random-walk process in complex systems.

  8. An embedding norm and the Lindqvist trigonometric functions

    Directory of Open Access Journals (Sweden)

    Christer Bennewitz

    2002-10-01

    Full Text Available We shall calculate the operator norm $|T|_p$ of the Hardy operator $Tf = int_0^x f $, where $1le ple infty$. This operator is related to the Sobolev embedding operator from $W^{1,p}(0,1/mathbb{C}$ into $W^p(0,1/mathbb{C}$. For $1T|_p$, is expressed in terms of the function $sin_p$ which is a generalization of the usual sine function and was introduced by Lindqvist [6]. Submitted September 12, 2002. Published October 9, 2002. Math Subject Classifications: 46E35, 33D05. Key Words: Sobolev embedding operator; Volterra operator.

  9. Scalable Nearest Neighbor Algorithms for High Dimensional Data.

    Science.gov (United States)

    Muja, Marius; Lowe, David G

    2014-11-01

    For many computer vision and machine learning problems, large training sets are key for good performance. However, the most computationally expensive part of many computer vision and machine learning algorithms consists of finding nearest neighbor matches to high dimensional vectors that represent the training data. We propose new algorithms for approximate nearest neighbor matching and evaluate and compare them with previous algorithms. For matching high dimensional features, we find two algorithms to be the most efficient: the randomized k-d forest and a new algorithm proposed in this paper, the priority search k-means tree. We also propose a new algorithm for matching binary features by searching multiple hierarchical clustering trees and show it outperforms methods typically used in the literature. We show that the optimal nearest neighbor algorithm and its parameters depend on the data set characteristics and describe an automated configuration procedure for finding the best algorithm to search a particular data set. In order to scale to very large data sets that would otherwise not fit in the memory of a single machine, we propose a distributed nearest neighbor matching framework that can be used with any of the algorithms described in the paper. All this research has been released as an open source library called fast library for approximate nearest neighbors (FLANN), which has been incorporated into OpenCV and is now one of the most popular libraries for nearest neighbor matching.

  10. Lectures on the nearest neighbor method

    CERN Document Server

    Biau, Gérard

    2015-01-01

    This text presents a wide-ranging and rigorous overview of nearest neighbor methods, one of the most important paradigms in machine learning. Now in one self-contained volume, this book systematically covers key statistical, probabilistic, combinatorial and geometric ideas for understanding, analyzing and developing nearest neighbor methods. Gérard Biau is a professor at Université Pierre et Marie Curie (Paris). Luc Devroye is a professor at the School of Computer Science at McGill University (Montreal).   .

  11. Dimensional testing for reverse k-nearest neighbor search

    DEFF Research Database (Denmark)

    Casanova, Guillaume; Englmeier, Elias; Houle, Michael E.

    2017-01-01

    Given a query object q, reverse k-nearest neighbor (RkNN) search aims to locate those objects of the database that have q among their k-nearest neighbors. In this paper, we propose an approximation method for solving RkNN queries, where the pruning operations and termination tests are guided...... by a characterization of the intrinsic dimensionality of the data. The method can accommodate any index structure supporting incremental (forward) nearest-neighbor search for the generation and verification of candidates, while avoiding impractically-high preprocessing costs. We also provide experimental evidence...

  12. Performance modeling of neighbor discovery in proactive routing protocols

    Directory of Open Access Journals (Sweden)

    Andres Medina

    2011-07-01

    Full Text Available It is well known that neighbor discovery is a critical component of proactive routing protocols in wireless ad hoc networks. However there is no formal study on the performance of proposed neighbor discovery mechanisms. This paper provides a detailed model of key performance metrics of neighbor discovery algorithms, such as node degree and the distribution of the distance to symmetric neighbors. The model accounts for the dynamics of neighbor discovery as well as node density, mobility, radio and interference. The paper demonstrates a method for applying these models to the evaluation of global network metrics. In particular, it describes a model of network connectivity. Validation of the models shows that the degree estimate agrees, within 5% error, with simulations for the considered scenarios. The work presented in this paper serves as a basis for the performance evaluation of remaining performance metrics of routing protocols, vital for large scale deployment of ad hoc networks.

  13. K{sub I}-T estimations for embedded flaws in pipes - Part I: Axially oriented cracks

    Energy Technology Data Exchange (ETDEWEB)

    Qian Xudong, E-mail: cveqx@nus.edu.s [Department of Civil Engineering, National University of Singapore, 1 Engineering Drive 2, Singapore 117576 (Singapore)

    2010-04-15

    This study reports a numerical investigation on the linear-elastic K{sub I} and T-stress values over the front of elliptical cracks axially embedded in the wall of a pipe/cylindrical structure, under a uniform pressure applied on the inner surface of the pipe. The numerical procedure employs an interaction integral approach to compute the linear-elastic stress intensity factor (SIF) K{sub I} and T-stress values from very detailed crack-front meshes. The verification study confirms the accuracy of the adopted numerical procedure in computing the K{sub I} values based on existing results for external axial surface cracks in the wall of a cylindrical structure. The parametric investigation covers a wide range of geometric parameters including: the wall thickness to the inner radius ratio of the pipe (t/R{sub i}), the crack depth over the wall thickness ratio (a/t), the crack aspect ratio (a/c) and the crack location measured by the ratio of the distance from the centerline of the crack to the outer surface of the pipe over the pipe wall thickness (e{sub M}/t). Subsequent efforts develop, from a nonlinear curve-fitting procedure, a new set of equations to estimate the T-stress and K{sub I} values at three critical front locations of the axial elliptical cracks: the crack-front point O nearest to the outer surface of the pipe, the crack-front point I nearest to the inner surface of the pipe and the crack-front point M on the centerline of the axial crack. These equations combine a second-order polynomial with a power-law expression to predict the pronounced variations in the T-stress and K{sub I} values with respect to the geometric parameters. The coefficients of the new K{sub I} and T-stress equations either take a constant value or incorporate the linear variation with respect to the pipe wall thickness over the inner radius ratio, t/R{sub i}. The proposed equations demonstrate a close agreement with the finite element (FE) results, which indicate very strong

  14. Perturbation Theory of Embedded Eigenvalues

    DEFF Research Database (Denmark)

    Engelmann, Matthias

    project gives a general and systematic approach to analytic perturbation theory of embedded eigenvalues. The spectral deformation technique originally developed in the theory of dilation analytic potentials in the context of Schrödinger operators is systematized by the use of Mourre theory. The group...... of dilations is thereby replaced by the unitary group generated y the conjugate operator. This then allows to treat the perturbation problem with the usual Kato theory.......We study problems connected to perturbation theory of embedded eigenvalues in two different setups. The first part deals with second order perturbation theory of mass shells in massive translation invariant Nelson type models. To this end an expansion of the eigenvalues w.r.t. fiber parameter up...

  15. A dumbed-down approach to unite Fermilab, its neighbors

    CERN Multimedia

    Constable, B

    2004-01-01

    "...Fermilab is reaching out to its suburban neighbors...With the nation on orange alert, Fermilab scientists no longer can sit on the front porch and invite neighbors in for coffee and quasars" (1 page).

  16. Broad-lined Supernova 2016coi with a Helium Envelope

    Energy Technology Data Exchange (ETDEWEB)

    Yamanaka, Masayuki [Department of Physics, Faculty of Science and Engineering, Konan University, Okamoto, Kobe, Hyogo 658-8501 (Japan); Nakaoka, Tatsuya; Kawabata, Miho [Department of Physical Science, Hiroshima University, Kagamiyama 1-3-1, Higashi-Hiroshima 739-8526 (Japan); Tanaka, Masaomi [National Astronomical Observatory of Japan, National Institutes of Natural Sciences, Osawa, Mitaka, Tokyo 181-8588 (Japan); Maeda, Keiichi [Department of Astronomy, Graduate School of Science, Kyoto University, Sakyo-ku, Kyoto 606-8502 (Japan); Honda, Satoshi; Hosoya, Kensuke; Karita, Mayu; Morihana, Kumiko [Nishi-Harima Astronomical Observatory, Center for Astronomy, University of Hyogo, 407-2 Nishigaichi, Sayo-cho, Sayo, Hyogo 679-5313 (Japan); Hanayama, Hidekazu [Ishigakijima Astronomical Observatory, National Astronomical Observatory of Japan, National Institutes of Natural Sciences, 1024-1 Arakawa, Ishigaki, Okinawa 907-0024 (Japan); Morokuma, Tomoki [Institute of Astronomy, Graduate School of Science, The University of Tokyo, 2-21-1 Osawa, Mitaka, Tokyo 181-0015 (Japan); Imai, Masataka [Department of Cosmosciences, Graduate School of Science, Hokkaido University, Kita 10 Nishi8, Kita-ku, Sapporo 060-0810 (Japan); Kinugasa, Kenzo [Nobeyama Radio Observatory, National Astronomical Observatory of Japan, National Institutes of Natural Sciences, 462-2 Nobeyama, Minamimaki, Minamisaku, Nagano 384-1305 (Japan); Murata, Katsuhiro L. [Department of Astrophysics, Nagoya University, Chikusa-ku, Nagoya 464-8602 (Japan); Nishimori, Takefumi; Gima, Hirotaka; Ito, Ayano; Morikawa, Yuto; Murakami, Kotone [Graduate School of Science and Engineering, Kagoshima University, 1-21-35 Korimoto, Kagoshima 890-0065 (Japan); Hashimoto, Osamu, E-mail: yamanaka@center.konan-u.ac.jp [Gunma Astronomical Observatory, Takayama, Gunma 377-0702 (Japan); and others

    2017-03-01

    We present the early-phase spectra and the light curves of the broad-lined (BL) supernova (SN) 2016coi from t = 7 to 67 days after the estimated explosion date. This SN was initially reported as a BL Type SN Ic (SN Ic-BL). However, we found that spectra up to t = 12 days exhibited the He i λ 5876, λ 6678, and λ 7065 absorption lines. We show that the smoothed and blueshifted spectra of normal SNe Ib are remarkably similar to the observed spectrum of SN 2016coi. The line velocities of SN 2016coi were similar to those of SNe Ic-BL and significantly faster than those of SNe Ib. Analyses of the line velocity and light curve suggest that the kinetic energy and the total ejecta mass of SN 2016coi are similar to those of SNe Ic-BL. Together with BL SNe 2009bb and 2012ap, for which the detection of He i was also reported, these SNe could be transitional objects between SNe Ic-BL and SNe Ib, and be classified as BL Type “Ib” SNe (SNe “Ib”-BL). Our work demonstrates the diversity of the outermost layer in BL SNe, which should be related to the variety of the evolutionary paths.

  17. Neighbors United for Health

    Science.gov (United States)

    Westhoff, Wayne W.; Corvin, Jaime; Virella, Irmarie

    2009-01-01

    Modeled upon the ecclesiastic community group concept of Latin America to unite and strengthen the bond between the Church and neighborhoods, a community-based organization created Vecinos Unidos por la Salud (Neighbors United for Health) to bring health messages into urban Latino neighborhoods. The model is based on five tenants, and incorporates…

  18. Pollinator-mediated interactions in experimental arrays vary with neighbor identity.

    Science.gov (United States)

    Ha, Melissa K; Ivey, Christopher T

    2017-02-01

    Local ecological conditions influence the impact of species interactions on evolution and community structure. We investigated whether pollinator-mediated interactions between coflowering plants vary with plant density, coflowering neighbor identity, and flowering season. We conducted a field experiment in which flowering time and floral neighborhood were manipulated in a factorial design. Early- and late-flowering Clarkia unguiculata plants were placed into arrays with C. biloba neighbors, noncongeneric neighbors, additional conspecific plants, or no additional plants as a density control. We compared whole-plant pollen limitation of seed set, pollinator behavior, and pollen deposition among treatments. Interactions mediated by shared pollinators depended on the identity of the neighbor and possibly changed through time, although flowering-season comparisons were compromised by low early-season plant survival. Interactions with conspecific neighbors were likely competitive late in the season. Interactions with C. biloba appeared to involve facilitation or neutral interactions. Interactions with noncongeners were more consistently competitive. The community composition of pollinators varied among treatment combinations. Pollinator-mediated interactions involved competition and likely facilitation, depending on coflowering neighbor. Experimental manipulation helped to reveal context-dependent variation in indirect biotic interactions. © 2017 Botanical Society of America.

  19. The clinic as a good corporate neighbor.

    Science.gov (United States)

    Sass, Hans-Martin

    2013-02-01

    Clinics today specialize in health repair services similar to car repair shops; procedures and prices are standardized, regulated, and inflexibly uniform. Clinics of the future have to become Health Care Centers in order to be more respected and more effective corporate neighbors in offering outreach services in health education and preventive health care. The traditional concept of care for health is much broader than repair management and includes the promotion of lay health competence and responsibility in healthy social and natural environments. The corporate profile and ethics of the clinic as a good and competitive local neighbor will have to focus on [a] better personalized care, [b] education and services in preventive care, [c] direct or web-based information and advice for general, seasonal, or age related health risks, and on developing and improving trustworthy character traits of the clinic as a corporate person and a good neighbor.

  20. Embedded Leverage

    DEFF Research Database (Denmark)

    Frazzini, Andrea; Heje Pedersen, Lasse

    find that asset classes with embedded leverage offer low risk-adjusted returns and, in the cross-section, higher embedded leverage is associated with lower returns. A portfolio which is long low-embedded-leverage securities and short high-embedded-leverage securities earns large abnormal returns...

  1. Exploratory Visual Analytics of a Dynamically Built Network of Nodes in a WebGL-Enabled Browser

    Science.gov (United States)

    2014-01-01

    dimensionality reduction, feature extraction, high-dimensional data, t-distributed stochastic neighbor embedding, neighbor retrieval visualizer, visual...WebGL-enabled rendering is supported natively by browsers such as the latest Mozilla Firefox , Google Chrome, and Microsoft Internet Explorer 11. At the...appropriate names. The resultant 26-node network is displayed in a Mozilla Firefox browser in figure 2 (also see appendix B). 3 Figure 1. The

  2. New technique of skin embedded wire double-sided laser beam welding

    Science.gov (United States)

    Han, Bing; Tao, Wang; Chen, Yanbin

    2017-06-01

    In the aircraft industry, double-sided laser beam welding is an approved method for producing skin-stringer T-joints on aircraft fuselage panels. As for the welding of new generation aluminum-lithium alloys, however, this technique is limited because of high hot cracking susceptibility and strengthening elements' uneven distributions within weld. In the present study, a new technique of skin embedded wire double-sided laser beam welding (LBW) has been developed to fabricate T-joints consisting of 2.0 mm thick 2060-T8/2099-T83 aluminum-lithium alloys using eutectic alloy AA4047 filler wire. Necessary dimension parameters of the novel groove were reasonably designed for achieving crack-free welds. Comparisons were made between the new technique welded T-joint and conventional T-joint mainly on microstructure, hot crack, elements distribution features and mechanical properties within weld. Excellent crack-free microstructure, uniform distribution of silicon and superior tensile properties within weld were found in the new skin embedded wire double-sided LBW T-joints.

  3. Diagnostic tools for nearest neighbors techniques when used with satellite imagery

    Science.gov (United States)

    Ronald E. McRoberts

    2009-01-01

    Nearest neighbors techniques are non-parametric approaches to multivariate prediction that are useful for predicting both continuous and categorical forest attribute variables. Although some assumptions underlying nearest neighbor techniques are common to other prediction techniques such as regression, other assumptions are unique to nearest neighbor techniques....

  4. Unwanted Behaviors and Nuisance Behaviors Among Neighbors in a Belgian Community Sample.

    Science.gov (United States)

    Michaux, Emilie; Groenen, Anne; Uzieblo, Katarzyna

    2015-06-30

    Unwanted behaviors between (ex-)intimates have been extensively studied, while those behaviors within other contexts such as neighbors have received much less scientific consideration. Research indicates that residents are likely to encounter problem behaviors from their neighbors. Besides the lack of clarity in the conceptualization of problem behaviors among neighbors, little is known on which types of behaviors characterize neighbor problems. In this study, the occurrence of two types of problem behaviors encountered by neighbors was explored within a Belgian community sample: unwanted behaviors such as threats and neighbor nuisance issues such as noise nuisance. By clearly distinguishing those two types of behaviors, this study aimed at contributing to the conceptualization of neighbor problems. Next, the coping strategies used to deal with the neighbor problems were investigated. Our results indicated that unwanted behaviors were more frequently encountered by residents compared with nuisance problems. Four out of 10 respondents reported both unwanted pursuit behavior and nuisance problems. It was especially unlikely to encounter nuisance problems in isolation of unwanted pursuit behaviors. While different coping styles (avoiding the neighbor, confronting the neighbor, and enlisting help from others) were equally used by the stalked participants, none of them was perceived as being more effective in reducing the stalking behaviors. Strikingly, despite being aware of specialized help services such as community mediation services, only a very small subgroup enlisted this kind of professional help. © The Author(s) 2015.

  5. Neighbor Rupture Degree of Some Middle Graphs

    Directory of Open Access Journals (Sweden)

    Gökşen BACAK-TURAN

    2017-12-01

    Full Text Available Networks have an important place in our daily lives. Internet networks, electricity networks, water networks, transportation networks, social networks and biological networks are some of the networks we run into every aspects of our lives. A network consists of centers connected by links. A network is represented when centers and connections modelled by vertices and edges, respectively. In consequence of the failure of some centers or connection lines, measurement of the resistance of the network until the communication interrupted is called vulnerability of the network. In this study, neighbor rupture degree which is a parameter that explores the vulnerability values of the resulting graphs due to the failure of some centers of a communication network and its neighboring centers becoming nonfunctional were applied to some middle graphs and neighbor rupture degree of the $M(C_{n},$ $M(P_{n},$ $M(K_{1,n},$ $M(W_{n},$ $M(P_{n}\\times K_{2}$ and $M(C_{n}\\times K_{2}$ have been found.

  6. Stocks, Flows, and Distribution of Critical Metals in Embedded Electronics in Passenger Vehicles.

    Science.gov (United States)

    Restrepo, Eliette; Løvik, Amund N; Wäger, Patrick; Widmer, Rolf; Lonka, Radek; Müller, Daniel B

    2017-02-07

    One of the major applications of critical metals (CMs) is in electrical and electronic equipment (EEE), which is increasingly embedded in other products, notably passenger vehicles. However, recycling strategies for future CM quantities in end-of-life vehicles (ELVs) are poorly understood, mainly due to a limited understating of the complexity of automotive embedded EEE. We introduce a harmonization of the network structure of automotive electronics that enables a comprehensive quantification of CMs in all embedded EEE in a vehicle. This network is combined with a material flow analysis along the vehicle lifecycle in Switzerland to quantify the stocks and flows of Ag, Au, Pd, Ru, Dy, La, Nd, and Co in automotive embedded EEE. In vehicles in use, we calculated 5 -2 +3 t precious metals in controllers embedded in all vehicle types and 220 -60 +90 t rare earth elements (REE); found mainly in five electric motors: alternator, starter, radiator-fan and electronic power steering motor embedded in conventional passenger vehicles and drive motor/generator embedded in hybrid and electric vehicles. Dismantling these devices before ELV shredding, as well as postshredder treatment of automobile shredder residue may increase the recovery of CMs from ELVs. Environmental and economic implications of such recycling strategies must be considered.

  7. Secure Nearest Neighbor Query on Crowd-Sensing Data

    Directory of Open Access Journals (Sweden)

    Ke Cheng

    2016-09-01

    Full Text Available Nearest neighbor queries are fundamental in location-based services, and secure nearest neighbor queries mainly focus on how to securely and quickly retrieve the nearest neighbor in the outsourced cloud server. However, the previous big data system structure has changed because of the crowd-sensing data. On the one hand, sensing data terminals as the data owner are numerous and mistrustful, while, on the other hand, in most cases, the terminals find it difficult to finish many safety operation due to computation and storage capability constraints. In light of they Multi Owners and Multi Users (MOMU situation in the crowd-sensing data cloud environment, this paper presents a secure nearest neighbor query scheme based on the proxy server architecture, which is constructed by protocols of secure two-party computation and secure Voronoi diagram algorithm. It not only preserves the data confidentiality and query privacy but also effectively resists the collusion between the cloud server and the data owners or users. Finally, extensive theoretical and experimental evaluations are presented to show that our proposed scheme achieves a superior balance between the security and query performance compared to other schemes.

  8. Observational properties of SNe Ia progenitors close to the explosion

    Science.gov (United States)

    Tornambé, A.; Piersanti, L.; Raimondo, G.; Delgrande, R.

    2018-04-01

    We determine the expected signal in various observational bands of supernovae Ia progenitors just before the explosion by assuming the rotating double-degenerate scenario. Our results are valid also for all the evolutionary scenarios invoking rotation as the driving mechanism of the accretion process as well as the evolution up to the explosion. We find that the observational properties depend mainly on the mass of the exploding object, even if the angular momentum evolution after the end of the mass accretion phase and before the onset of C-burning plays a non-negligible role. Just before the explosion, the magnitude MV ranges between 9 and 11 mag, while the colour (F225W - F555W) is about -1.64 mag. The photometric properties remain constant for a few decades before the explosion. During the last few months, the luminosity decreases very rapidly. The corresponding decline in the optical bands varies from a few hundredths up to one magnitude, the exact value depending on both the white dwarf total mass and the braking efficiency at the end of the mass transfer. This feature is related to the exponentially increasing energy production, which drives the formation of a convective core rapidly extending over a large part of the exploding object. Also, a drop in the angular velocity occurs. We find that observations in the soft X band (0.5-2 keV) may be used to check if the evolution of the SNe Ia progenitors up to the explosion is driven by rotation and, hence, to discriminate among different progenitor scenarios.

  9. Co-Expression of Neighboring Genes in the Zebrafish (Danio rerio Genome

    Directory of Open Access Journals (Sweden)

    Daryi Wang

    2009-08-01

    Full Text Available Neighboring genes in the eukaryotic genome have a tendency to express concurrently, and the proximity of two adjacent genes is often considered a possible explanation for their co-expression behavior. However, the actual contribution of the physical distance between two genes to their co-expression behavior has yet to be defined. To further investigate this issue, we studied the co-expression of neighboring genes in zebrafish, which has a compact genome and has experienced a whole genome duplication event. Our analysis shows that the proportion of highly co-expressed neighboring pairs (Pearson’s correlation coefficient R>0.7 is low (0.24% ~ 0.67%; however, it is still significantly higher than that of random pairs. In particular, the statistical result implies that the co-expression tendency of neighboring pairs is negatively correlated with their physical distance. Our findings therefore suggest that physical distance may play an important role in the co-expression of neighboring genes. Possible mechanisms related to the neighboring genes’ co-expression are also discussed.

  10. Visual words assignment via information-theoretic manifold embedding.

    Science.gov (United States)

    Deng, Yue; Li, Yipeng; Qian, Yanjun; Ji, Xiangyang; Dai, Qionghai

    2014-10-01

    Codebook-based learning provides a flexible way to extract the contents of an image in a data-driven manner for visual recognition. One central task in such frameworks is codeword assignment, which allocates local image descriptors to the most similar codewords in the dictionary to generate histogram for categorization. Nevertheless, existing assignment approaches, e.g., nearest neighbors strategy (hard assignment) and Gaussian similarity (soft assignment), suffer from two problems: 1) too strong Euclidean assumption and 2) neglecting the label information of the local descriptors. To address the aforementioned two challenges, we propose a graph assignment method with maximal mutual information (GAMI) regularization. GAMI takes the power of manifold structure to better reveal the relationship of massive number of local features by nonlinear graph metric. Meanwhile, the mutual information of descriptor-label pairs is ultimately optimized in the embedding space for the sake of enhancing the discriminant property of the selected codewords. According to such objective, two optimization models, i.e., inexact-GAMI and exact-GAMI, are respectively proposed in this paper. The inexact model can be efficiently solved with a closed-from solution. The stricter exact-GAMI nonparametrically estimates the entropy of descriptor-label pairs in the embedding space and thus leads to a relatively complicated but still trackable optimization. The effectiveness of GAMI models are verified on both the public and our own datasets.

  11. New Sliding Puzzle with Neighbors Swap Motion

    OpenAIRE

    Prihardono, Ariyanto; Kawagoe, Kenichi

    2015-01-01

    The sliding puzzles (15-puzzle, 8-puzzle, 5-puzzle) are known to have 2 kind of puz-zle: solvable puzzle and unsolvable puzzle. In this thesis, we make a new puzzle with only 1 kind of it, solvable puzzle. This new puzzle is made by adopting sliding puzzle with several additional rules from M13 puzzle; the puzzle that is formed form The Mathieu group M13. This puzzle has a movement that called a neighbors swap motion, a rule of movement that enables every neighboring points to swap. This extr...

  12. Embedded Systems

    Indian Academy of Sciences (India)

    Embedded system, micro-con- troller ... Embedded systems differ from general purpose computers in many ... Low cost: As embedded systems are extensively used in con- .... operating systems for the desktop computers where scheduling.

  13. The role of orthography in the semantic activation of neighbors.

    Science.gov (United States)

    Hino, Yasushi; Lupker, Stephen J; Taylor, Tamsen E

    2012-09-01

    There is now considerable evidence that a letter string can activate semantic information appropriate to its orthographic neighbors (e.g., Forster & Hector's, 2002, TURPLE effect). This phenomenon is the focus of the present research. Using Japanese words, we examined whether semantic activation of neighbors is driven directly by orthographic similarity alone or whether there is also a role for phonological similarity. In Experiment 1, using a relatedness judgment task in which a Kanji word-Katakana word pair was presented on each trial, an inhibitory effect was observed when the initial Kanji word was related to an orthographic and phonological neighbor of the Katakana word target but not when the initial Kanji word was related to a phonological but not orthographic neighbor of the Katakana word target. This result suggests that phonology plays little, if any, role in the activation of neighbors' semantics when reading familiar words. In Experiment 2, the targets were transcribed into Hiragana, a script they are typically not written in, requiring readers to engage in phonological coding. In that experiment, inhibitory effects were observed in both conditions. This result indicates that phonologically mediated semantic activation of neighbors will emerge when phonological processing is necessary in order to understand a written word (e.g., when that word is transcribed into an unfamiliar script). PsycINFO Database Record (c) 2012 APA, all rights reserved.

  14. Embedded palmprint recognition system using OMAP 3530.

    Science.gov (United States)

    Shen, Linlin; Wu, Shipei; Zheng, Songhao; Ji, Zhen

    2012-01-01

    We have proposed in this paper an embedded palmprint recognition system using the dual-core OMAP 3530 platform. An improved algorithm based on palm code was proposed first. In this method, a Gabor wavelet is first convolved with the palmprint image to produce a response image, where local binary patterns are then applied to code the relation among the magnitude of wavelet response at the central pixel with that of its neighbors. The method is fully tested using the public PolyU palmprint database. While palm code achieves only about 89% accuracy, over 96% accuracy is achieved by the proposed G-LBP approach. The proposed algorithm was then deployed to the DSP processor of OMAP 3530 and work together with the ARM processor for feature extraction. When complicated algorithms run on the DSP processor, the ARM processor can focus on image capture, user interface and peripheral control. Integrated with an image sensing module and central processing board, the designed device can achieve accurate and real time performance.

  15. Conceptualizing Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  16. Label-free cell-cycle analysis by high-throughput quantitative phase time-stretch imaging flow cytometry

    Science.gov (United States)

    Mok, Aaron T. Y.; Lee, Kelvin C. M.; Wong, Kenneth K. Y.; Tsia, Kevin K.

    2018-02-01

    Biophysical properties of cells could complement and correlate biochemical markers to characterize a multitude of cellular states. Changes in cell size, dry mass and subcellular morphology, for instance, are relevant to cell-cycle progression which is prevalently evaluated by DNA-targeted fluorescence measurements. Quantitative-phase microscopy (QPM) is among the effective biophysical phenotyping tools that can quantify cell sizes and sub-cellular dry mass density distribution of single cells at high spatial resolution. However, limited camera frame rate and thus imaging throughput makes QPM incompatible with high-throughput flow cytometry - a gold standard in multiparametric cell-based assay. Here we present a high-throughput approach for label-free analysis of cell cycle based on quantitative-phase time-stretch imaging flow cytometry at a throughput of > 10,000 cells/s. Our time-stretch QPM system enables sub-cellular resolution even at high speed, allowing us to extract a multitude (at least 24) of single-cell biophysical phenotypes (from both amplitude and phase images). Those phenotypes can be combined to track cell-cycle progression based on a t-distributed stochastic neighbor embedding (t-SNE) algorithm. Using multivariate analysis of variance (MANOVA) discriminant analysis, cell-cycle phases can also be predicted label-free with high accuracy at >90% in G1 and G2 phase, and >80% in S phase. We anticipate that high throughput label-free cell cycle characterization could open new approaches for large-scale single-cell analysis, bringing new mechanistic insights into complex biological processes including diseases pathogenesis.

  17. Short-lived long non-coding RNAs as surrogate indicators for chemical exposure and LINC00152 and MALAT1 modulate their neighboring genes.

    Directory of Open Access Journals (Sweden)

    Hidenori Tani

    Full Text Available Whole transcriptome analyses have revealed a large number of novel long non-coding RNAs (lncRNAs. Although accumulating evidence demonstrates that lncRNAs play important roles in regulating gene expression, the detailed mechanisms of action of most lncRNAs remain unclear. We previously reported that a novel class of lncRNAs with a short half-life (t1/2 < 4 h in HeLa cells, termed short-lived non-coding transcripts (SLiTs, are closely associated with physiological and pathological functions. In this study, we focused on 26 SLiTs and nuclear-enriched abundant lncRNA, MALAT1(t1/2 of 7.6 h in HeLa cells in neural stem cells (NSCs derived from human induced pluripotent stem cells, and identified four SLiTs (TUG1, GAS5, FAM222-AS1, and SNHG15 that were affected by the following typical chemical stresses (oxidative stress, heavy metal stress and protein synthesis stress. We also found the expression levels of LINC00152 (t1/2 of 2.1 h in NSCs, MALAT1 (t1/2 of 1.8 h in NSCs, and their neighboring genes were elevated proportionally to the chemical doses. Moreover, we confirmed that the overexpression of LINC00152 or MALAT1 upregulated the expressions of their neighboring genes even in the absence of chemical stress. These results reveal that LINC00152 and MALAT1 modulate their neighboring genes, and thus provide a deeper understanding of the functions of lncRNAs.

  18. Fault Detection Variants of the CloudBus Protocol for IoT Distributed Embedded Systems

    Directory of Open Access Journals (Sweden)

    BARKALOV, A.

    2017-05-01

    Full Text Available Distributed embedded systems have become larger, more complex and complicated. More often, such systems operate accordingly to the IoT or Industry 4.0 concept. However, large number of end modules operating in the system leads to a significant load and consequently, to an overload of the communication interfaces. The CloudBus protocol is one of the methods which is used for data exchange and concurrent process synchronization in the distributed systems. It allows the significant savings in the amount of transmitted data between end modules, especially when compared with the other protocols used in the industry. Nevertheless, basic version of the protocol does not protect against the system failure in the event of failure of one of the nodes. This paper proposes four novel variants of the CloudBus protocol, which allow the fault detection. The comparison and performance analysis was executed for all proposed CloudBus variants. The verification and behavior analysis of the distributed systems were performed on SoC hardware research platform. Furthermore, a simple test application was proposed.

  19. Color and neighbor edge directional difference feature for image retrieval

    Institute of Scientific and Technical Information of China (English)

    Chaobing Huang; Shengsheng Yu; Jingli Zhou; Hongwei Lu

    2005-01-01

    @@ A novel image feature termed neighbor edge directional difference unit histogram is proposed, in which the neighbor edge directional difference unit is defined and computed for every pixel in the image, and is used to generate the neighbor edge directional difference unit histogram. This histogram and color histogram are used as feature indexes to retrieve color image. The feature is invariant to image scaling and translation and has more powerful descriptive for the natural color images. Experimental results show that the feature can achieve better retrieval performance than other color-spatial features.

  20. Nearest neighbors by neighborhood counting.

    Science.gov (United States)

    Wang, Hui

    2006-06-01

    Finding nearest neighbors is a general idea that underlies many artificial intelligence tasks, including machine learning, data mining, natural language understanding, and information retrieval. This idea is explicitly used in the k-nearest neighbors algorithm (kNN), a popular classification method. In this paper, this idea is adopted in the development of a general methodology, neighborhood counting, for devising similarity functions. We turn our focus from neighbors to neighborhoods, a region in the data space covering the data point in question. To measure the similarity between two data points, we consider all neighborhoods that cover both data points. We propose to use the number of such neighborhoods as a measure of similarity. Neighborhood can be defined for different types of data in different ways. Here, we consider one definition of neighborhood for multivariate data and derive a formula for such similarity, called neighborhood counting measure or NCM. NCM was tested experimentally in the framework of kNN. Experiments show that NCM is generally comparable to VDM and its variants, the state-of-the-art distance functions for multivariate data, and, at the same time, is consistently better for relatively large k values. Additionally, NCM consistently outperforms HEOM (a mixture of Euclidean and Hamming distances), the "standard" and most widely used distance function for multivariate data. NCM has a computational complexity in the same order as the standard Euclidean distance function and NCM is task independent and works for numerical and categorical data in a conceptually uniform way. The neighborhood counting methodology is proven sound for multivariate data experimentally. We hope it will work for other types of data.

  1. Neighboring Genes Show Correlated Evolution in Gene Expression

    Science.gov (United States)

    Ghanbarian, Avazeh T.; Hurst, Laurence D.

    2015-01-01

    When considering the evolution of a gene’s expression profile, we commonly assume that this is unaffected by its genomic neighborhood. This is, however, in contrast to what we know about the lack of autonomy between neighboring genes in gene expression profiles in extant taxa. Indeed, in all eukaryotic genomes genes of similar expression-profile tend to cluster, reflecting chromatin level dynamics. Does it follow that if a gene increases expression in a particular lineage then the genomic neighbors will also increase in their expression or is gene expression evolution autonomous? To address this here we consider evolution of human gene expression since the human-chimp common ancestor, allowing for both variation in estimation of current expression level and error in Bayesian estimation of the ancestral state. We find that in all tissues and both sexes, the change in gene expression of a focal gene on average predicts the change in gene expression of neighbors. The effect is highly pronounced in the immediate vicinity (genes increasing their expression in humans tend to avoid nuclear lamina domains and be enriched for the gene activator 5-hydroxymethylcytosine, we conclude that, most probably owing to chromatin level control of gene expression, a change in gene expression of one gene likely affects the expression evolution of neighbors, what we term expression piggybacking, an analog of hitchhiking. PMID:25743543

  2. A YOUNG ECLIPSING BINARY AND ITS LUMINOUS NEIGHBORS IN THE EMBEDDED STAR CLUSTER Sh 2-252E

    Energy Technology Data Exchange (ETDEWEB)

    Lester, Kathryn V.; Gies, Douglas R.; Guo, Zhao, E-mail: lester@chara.gsu.edu, E-mail: gies@chara.gsu.edu, E-mail: guo@chara.gsu.edu [Center for High Angular Resolution Astronomy and Department of Physics and Astronomy, Georgia State University, P.O. Box 5060, Atlanta, GA 30302-5060 (United States)

    2016-12-01

    We present a photometric and light curve analysis of an eccentric eclipsing binary in the K2 Campaign 0 field, which resides in Sh 2-252E, a young star cluster embedded in an H ii region. We describe a spectroscopic investigation of the three brightest stars in the crowded aperture to identify which is the binary system. We find that none of these stars are components of the eclipsing binary system, which must be one of the fainter nearby stars. These bright cluster members all have remarkable spectra: Sh 2-252a (EPIC 202062176) is a B0.5 V star with razor sharp absorption lines, Sh 2-252b is a Herbig A0 star with disk-like emission lines, and Sh 2-252c is a pre-main-sequence star with very red color.

  3. Smart Coat with a Fully-Embedded Textile Antenna for IoT Applications.

    Science.gov (United States)

    Loss, Caroline; Gonçalves, Ricardo; Lopes, Catarina; Pinho, Pedro; Salvado, Rita

    2016-06-22

    The Internet of Things (IoT) scenario is strongly related with the advance of the development of wireless sensor networks (WSN) and radio frequency identification (RFID) systems. Additionally, in the WSN context, for a continuous feed, the integration of textile antennas for energy harvesting into smart clothing is a particularly interesting solution when the replacement of batteries is not easy to practice, such as in wearable devices. This paper presents the E-Caption: Smart and Sustainable Coat. It has an embedded dual-band textile antenna for electromagnetic energy harvesting, operating at global system for mobile communication (GSM) 900 and digital cellular system (DCS) 1800 bands. This printed antenna is fully integrated, as its dielectric is the textile material composing the coat itself. The E-Caption illustrates the innovative concept of textile antennas that can be manipulated as simple emblems. Seven prototypes of these "emblem" antennas, manufactured by lamination and embroidering techniques are also presented. It is shown that the orientation of the conductive fabric does not influence the performance of the antenna. It is also shown that the direction and number of the stitches in the embroidery may influence the performance of the antenna. Moreover, the comparison of results obtained before and after the integration of the antenna into cloth shows the integration does not affect the behavior of the antenna.

  4. Smart Coat with a Fully-Embedded Textile Antenna for IoT Applications

    Directory of Open Access Journals (Sweden)

    Caroline Loss

    2016-06-01

    Full Text Available The Internet of Things (IoT scenario is strongly related with the advance of the development of wireless sensor networks (WSN and radio frequency identification (RFID systems. Additionally, in the WSN context, for a continuous feed, the integration of textile antennas for energy harvesting into smart clothing is a particularly interesting solution when the replacement of batteries is not easy to practice, such as in wearable devices. This paper presents the E-Caption: Smart and Sustainable Coat. It has an embedded dual-band textile antenna for electromagnetic energy harvesting, operating at global system for mobile communication (GSM 900 and digital cellular system (DCS 1800 bands. This printed antenna is fully integrated, as its dielectric is the textile material composing the coat itself. The E-Caption illustrates the innovative concept of textile antennas that can be manipulated as simple emblems. Seven prototypes of these “emblem” antennas, manufactured by lamination and embroidering techniques are also presented. It is shown that the orientation of the conductive fabric does not influence the performance of the antenna. It is also shown that the direction and number of the stitches in the embroidery may influence the performance of the antenna. Moreover, the comparison of results obtained before and after the integration of the antenna into cloth shows the integration does not affect the behavior of the antenna.

  5. The Impactof the Kurdish Question on Turkey's Relations with its Middle Eastern neighbors

    OpenAIRE

    Asil, Muhammet Ali

    2013-01-01

    Tezin basılısı İstanbul Şehir Üniversitesi Kütüphanesi'ndedir. This dissertation analyzes the “Kurdish Question” from an International Relations perspective. Focusing on the impact of the Kurdish question on Turkey’s relations in the last decade with its Middle Eastern neighbors, i.e. Iran, Syria, and Iraq, and with the European Union; this study shows how Turkey-Middle East and Turkey-EU relations are shaped differently. In the search for reasons for this difference, Realist and Liberal I...

  6. Formation of DNA-network embedding ferromagnetic Cobalt nano-particles

    Science.gov (United States)

    Kanki, Teruo; Tanaka, Hidekazu; Shirakawa, Hideaki; Sacho, Yu; Taniguchi, Masateru; Lee, Hea-Yeon; Kawai, Tomoji; Kang, Nam-Jung; Chen, Jinwoo

    2002-03-01

    Formation of DNA-network embedding ferromagnetic Cobalt nano-particles T. Kanki, Hidekazu. Tanaka, H. Shirakawa, Y. Sacho, M. Taniguchi, H. Lee, T. Kawai The Institute of Scientific and Industrial Research, Osaka University, Japan and Nam-Jung Kang, Jinwoo Chen Korea Advanced Institute of Science and Technology (KAIST), Korea DNA can be regarded as a naturally occurring and highly specific functional biopolymer and as a fine nano-wire. Moreover, it was found that large-scale DNA networks can be fabricated on mica surfaces. By using this network structure, we can expect to construct nano-scale assembly of functional nano particle, for example ferromagnetic Co nano particles, toward nano scale spin-electronics based on DNA circuits. When we formed DNA network by 250mg/ml DNA solution of poly(dG)-poly(dC) including ferromagnetic Co nano particles (diameter of 12nm), we have conformed the DNA network structure embedding Co nano-particles (height of about 12nm) by atomic force microscopy. On the other hand, we used 100mg/ml DNA solution, DNA can not connect each other, and many Co nano-particles exist without being embedded.

  7. Local randomization in neighbor selection improves PRM roadmap quality

    KAUST Repository

    McMahon, Troy; Jacobs, Sam; Boyd, Bryan; Tapia, Lydia; Amato, Nancy M.

    2012-01-01

    Probabilistic Roadmap Methods (PRMs) are one of the most used classes of motion planning methods. These sampling-based methods generate robot configurations (nodes) and then connect them to form a graph (roadmap) containing representative feasible pathways. A key step in PRM roadmap construction involves identifying a set of candidate neighbors for each node. Traditionally, these candidates are chosen to be the k-closest nodes based on a given distance metric. In this paper, we propose a new neighbor selection policy called LocalRand(k,K'), that first computes the K' closest nodes to a specified node and then selects k of those nodes at random. Intuitively, LocalRand attempts to benefit from random sampling while maintaining the higher levels of local planner success inherent to selecting more local neighbors. We provide a methodology for selecting the parameters k and K'. We perform an experimental comparison which shows that for both rigid and articulated robots, LocalRand results in roadmaps that are better connected than the traditional k-closest policy or a purely random neighbor selection policy. The cost required to achieve these results is shown to be comparable to k-closest. © 2012 IEEE.

  8. Local randomization in neighbor selection improves PRM roadmap quality

    KAUST Repository

    McMahon, Troy

    2012-10-01

    Probabilistic Roadmap Methods (PRMs) are one of the most used classes of motion planning methods. These sampling-based methods generate robot configurations (nodes) and then connect them to form a graph (roadmap) containing representative feasible pathways. A key step in PRM roadmap construction involves identifying a set of candidate neighbors for each node. Traditionally, these candidates are chosen to be the k-closest nodes based on a given distance metric. In this paper, we propose a new neighbor selection policy called LocalRand(k,K\\'), that first computes the K\\' closest nodes to a specified node and then selects k of those nodes at random. Intuitively, LocalRand attempts to benefit from random sampling while maintaining the higher levels of local planner success inherent to selecting more local neighbors. We provide a methodology for selecting the parameters k and K\\'. We perform an experimental comparison which shows that for both rigid and articulated robots, LocalRand results in roadmaps that are better connected than the traditional k-closest policy or a purely random neighbor selection policy. The cost required to achieve these results is shown to be comparable to k-closest. © 2012 IEEE.

  9. The Islands Approach to Nearest Neighbor Querying in Spatial Networks

    DEFF Research Database (Denmark)

    Huang, Xuegang; Jensen, Christian Søndergaard; Saltenis, Simonas

    2005-01-01

    , and versatile approach to k nearest neighbor computation that obviates the need for using several k nearest neighbor approaches for supporting a single service scenario. The experimental comparison with the existing techniques uses real-world road network data and considers both I/O and CPU performance...

  10. Embedded vision equipment of industrial robot for inline detection of product errors by clustering–classification algorithms

    Directory of Open Access Journals (Sweden)

    Kamil Zidek

    2016-10-01

    Full Text Available The article deals with the design of embedded vision equipment of industrial robots for inline diagnosis of product error during manipulation process. The vision equipment can be attached to the end effector of robots or manipulators, and it provides an image snapshot of part surface before grasp, searches for error during manipulation, and separates products with error from the next operation of manufacturing. The new approach is a methodology based on machine teaching for the automated identification, localization, and diagnosis of systematic errors in products of high-volume production. To achieve this, we used two main data mining algorithms: clustering for accumulation of similar errors and classification methods for the prediction of any new error to proposed class. The presented methodology consists of three separate processing levels: image acquisition for fail parameterization, data clustering for categorizing errors to separate classes, and new pattern prediction with a proposed class model. We choose main representatives of clustering algorithms, for example, K-mean from quantization of vectors, fast library for approximate nearest neighbor from hierarchical clustering, and density-based spatial clustering of applications with noise from algorithm based on the density of the data. For machine learning, we selected six major algorithms of classification: support vector machines, normal Bayesian classifier, K-nearest neighbor, gradient boosted trees, random trees, and neural networks. The selected algorithms were compared for speed and reliability and tested on two platforms: desktop-based computer system and embedded system based on System on Chip (SoC with vision equipment.

  11. Handling Neighbor Discovery and Rendezvous Consistency with Weighted Quorum-Based Approach.

    Science.gov (United States)

    Own, Chung-Ming; Meng, Zhaopeng; Liu, Kehan

    2015-09-03

    Neighbor discovery and the power of sensors play an important role in the formation of Wireless Sensor Networks (WSNs) and mobile networks. Many asynchronous protocols based on wake-up time scheduling have been proposed to enable neighbor discovery among neighboring nodes for the energy saving, especially in the difficulty of clock synchronization. However, existing researches are divided two parts with the neighbor-discovery methods, one is the quorum-based protocols and the other is co-primality based protocols. Their distinction is on the arrangements of time slots, the former uses the quorums in the matrix, the latter adopts the numerical analysis. In our study, we propose the weighted heuristic quorum system (WQS), which is based on the quorum algorithm to eliminate redundant paths of active slots. We demonstrate the specification of our system: fewer active slots are required, the referring rate is balanced, and remaining power is considered particularly when a device maintains rendezvous with discovered neighbors. The evaluation results showed that our proposed method can effectively reschedule the active slots and save the computing time of the network system.

  12. Handling Neighbor Discovery and Rendezvous Consistency with Weighted Quorum-Based Approach

    Directory of Open Access Journals (Sweden)

    Chung-Ming Own

    2015-09-01

    Full Text Available Neighbor discovery and the power of sensors play an important role in the formation of Wireless Sensor Networks (WSNs and mobile networks. Many asynchronous protocols based on wake-up time scheduling have been proposed to enable neighbor discovery among neighboring nodes for the energy saving, especially in the difficulty of clock synchronization. However, existing researches are divided two parts with the neighbor-discovery methods, one is the quorum-based protocols and the other is co-primality based protocols. Their distinction is on the arrangements of time slots, the former uses the quorums in the matrix, the latter adopts the numerical analysis. In our study, we propose the weighted heuristic quorum system (WQS, which is based on the quorum algorithm to eliminate redundant paths of active slots. We demonstrate the specification of our system: fewer active slots are required, the referring rate is balanced, and remaining power is considered particularly when a device maintains rendezvous with discovered neighbors. The evaluation results showed that our proposed method can effectively reschedule the active slots and save the computing time of the network system.

  13. Accelerating distributed average consensus by exploring the information of second-order neighbors

    Energy Technology Data Exchange (ETDEWEB)

    Yuan Deming [School of Automation, Nanjing University of Science and Technology, Nanjing 210094, Jiangsu (China); Xu Shengyuan, E-mail: syxu02@yahoo.com.c [School of Automation, Nanjing University of Science and Technology, Nanjing 210094, Jiangsu (China); Zhao Huanyu [School of Automation, Nanjing University of Science and Technology, Nanjing 210094, Jiangsu (China); Chu Yuming [Department of Mathematics, Huzhou Teacher' s College, Huzhou 313000, Zhejiang (China)

    2010-05-17

    The problem of accelerating distributed average consensus by using the information of second-order neighbors in both the discrete- and continuous-time cases is addressed in this Letter. In both two cases, when the information of second-order neighbors is used in each iteration, the network will converge with a speed faster than the algorithm only using the information of first-order neighbors. Moreover, the problem of using partial information of second-order neighbors is considered, and the edges are not chosen randomly from second-order neighbors. In the continuous-time case, the edges are chosen by solving a convex optimization problem which is formed by using the convex relaxation method. In the discrete-time case, for small network the edges are chosen optimally via the brute force method. Finally, simulation examples are provided to demonstrate the effectiveness of the proposed algorithm.

  14. Finger vein identification using fuzzy-based k-nearest centroid neighbor classifier

    Science.gov (United States)

    Rosdi, Bakhtiar Affendi; Jaafar, Haryati; Ramli, Dzati Athiar

    2015-02-01

    In this paper, a new approach for personal identification using finger vein image is presented. Finger vein is an emerging type of biometrics that attracts attention of researchers in biometrics area. As compared to other biometric traits such as face, fingerprint and iris, finger vein is more secured and hard to counterfeit since the features are inside the human body. So far, most of the researchers focus on how to extract robust features from the captured vein images. Not much research was conducted on the classification of the extracted features. In this paper, a new classifier called fuzzy-based k-nearest centroid neighbor (FkNCN) is applied to classify the finger vein image. The proposed FkNCN employs a surrounding rule to obtain the k-nearest centroid neighbors based on the spatial distributions of the training images and their distance to the test image. Then, the fuzzy membership function is utilized to assign the test image to the class which is frequently represented by the k-nearest centroid neighbors. Experimental evaluation using our own database which was collected from 492 fingers shows that the proposed FkNCN has better performance than the k-nearest neighbor, k-nearest-centroid neighbor and fuzzy-based-k-nearest neighbor classifiers. This shows that the proposed classifier is able to identify the finger vein image effectively.

  15. On Competitiveness of Nearest-Neighbor-Based Music Classification: A Methodological Critique

    DEFF Research Database (Denmark)

    Pálmason, Haukur; Jónsson, Björn Thór; Amsaleg, Laurent

    2017-01-01

    The traditional role of nearest-neighbor classification in music classification research is that of a straw man opponent for the learning approach of the hour. Recent work in high-dimensional indexing has shown that approximate nearest-neighbor algorithms are extremely scalable, yielding results...... of reasonable quality from billions of high-dimensional features. With such efficient large-scale classifiers, the traditional music classification methodology of aggregating and compressing the audio features is incorrect; instead the approximate nearest-neighbor classifier should be given an extensive data...... collection to work with. We present a case study, using a well-known MIR classification benchmark with well-known music features, which shows that a simple nearest-neighbor classifier performs very competitively when given ample data. In this position paper, we therefore argue that nearest...

  16. Flow cytometry combined with viSNE for the analysis of microbial biofilms and detection of microplastics

    Science.gov (United States)

    Sgier, Linn; Freimann, Remo; Zupanic, Anze; Kroll, Alexandra

    2016-01-01

    Biofilms serve essential ecosystem functions and are used in different technical applications. Studies from stream ecology and waste-water treatment have shown that biofilm functionality depends to a great extent on community structure. Here we present a fast and easy-to-use method for individual cell-based analysis of stream biofilms, based on stain-free flow cytometry and visualization of the high-dimensional data by viSNE. The method allows the combined assessment of community structure, decay of phototrophic organisms and presence of abiotic particles. In laboratory experiments, it allows quantification of cellular decay and detection of survival of larger cells after temperature stress, while in the field it enables detection of community structure changes that correlate with known environmental drivers (flow conditions, dissolved organic carbon, calcium) and detection of microplastic contamination. The method can potentially be applied to other biofilm types, for example, for inferring community structure for environmental and industrial research and monitoring. PMID:27188265

  17. Phosphate sensing by fluorecent reporter proteins embedded in poly-acrylamide nanoparticles

    DEFF Research Database (Denmark)

    Sun, Honghao; Scharff-Poulsen, Anne Marie; Gu, Hong

    2008-01-01

    Phosphate sensors were developed by embedding fluorescent reporter proteins (FLIPPi) in polyacrylamide nanoparticles; with diameters from 40 to 120 nm. The sensor activity and protein loading efficiency varied according to nanoparticle composition, that is, the total monomer content (% T) and the......, in nanoparticles for, for example, sensing, biological catalysis, and gene delivery.......Phosphate sensors were developed by embedding fluorescent reporter proteins (FLIPPi) in polyacrylamide nanoparticles; with diameters from 40 to 120 nm. The sensor activity and protein loading efficiency varied according to nanoparticle composition, that is, the total monomer content (% T......) and the cross-linker content (% C). Nanoparticles with 28% T and 20% C were considered optimal as a result of relatively high loading efficiency (50.6%) as well as high protein activity (50%). The experimental results prove that the cross-linked polyacrylamide matrix could protect FLIPPi from degradation...

  18. Beyond formal groups: neighboring acts and watershed protection in Appalachia

    Directory of Open Access Journals (Sweden)

    Heather Lukacs

    2016-09-01

    Full Text Available This paper explores how watershed organizations in Appalachia have persisted in addressing water quality issues in areas with a history of coal mining. We identified two watershed groups that have taken responsibility for restoring local creeks that were previously highly degraded and sporadically managed. These watershed groups represent cases of self-organized commons governance in resource-rich, economically poor Appalachian communities. We describe the extent and characteristics of links between watershed group volunteers and watershed residents who are not group members. Through surveys, participant observation, and key-informant consultation, we found that neighbors – group members as well as non-group-members – supported the group's function through informal neighboring acts. Past research has shown that local commons governance institutions benefit from being nested in supportive external structures. We found that the persistence and success of community watershed organizations depends on the informal participation of local residents, affirming the necessity of looking beyond formal, organized groups to understand the resources, expertise, and information needed to address complex water pollution at the watershed level. Our findings augment the concept of nestedness in commons governance to include that of a formal organization acting as a neighbor that exchanges informal neighboring acts with local residents. In this way, we extend the concept of neighboring to include interactions between individuals and a group operating in the same geographic area.

  19. Snežna jama (Slovenia): Interdisciplinary dating of cave sediments and implication for landscape evolution.

    Science.gov (United States)

    Häuselmann, Philipp; Mihevc, Andrej; Pruner, Petr; Horáček, Ivan; Čermák, Stanislav; Hercman, Helena; Sahy, Diana; Fiebig, Markus; Hajna, Nadja Zupan; Bosák, Pavel

    2015-10-15

    Caves are important markers of surface evolution, since they are, as a general rule, linked with ancient valley bottoms by their springs. However, caves can only be dated indirectly by means of the sediments they contain. If the sediment is older than common dating methods, one has to use multiple dating approaches in order to get meaningful results. U/Th dating, palaeomagnetic analysis of flowstone and sediment profiles, cosmogenic dating of quartz pebbles, and mammalian dating allowed a robust estimate of speleogenesis, sediment deposition, climatic change at the surface, and uplift history on the Periadriatic fault line during the Plio-Pleistocene. Our dates indicate that Snežna jama was formed in the (Upper) Miocene, received its sedimentary deposits during the Pliocene in a rather low-lying, hilly landscape, and became inactive due to uplift along the Periadriatic and Sava faults and climatic changes at the beginning of the Quaternary. Although it is only a single cave, the information contained within it makes it an important site of the Southern Alps.

  20. Interacting Effects Induced by Two Neighboring Pits Considering Relative Position Parameters and Pit Depth

    Directory of Open Access Journals (Sweden)

    Yongfang Huang

    2017-04-01

    Full Text Available For pre-corroded aluminum alloy 7075-T6, the interacting effects of two neighboring pits on the stress concentration are comprehensively analyzed by considering various relative position parameters (inclination angle θ and dimensionless spacing parameter λ and pit depth (d with the finite element method. According to the severity of the stress concentration, the critical corrosion regions, bearing high susceptibility to fatigue damage, are determined for intersecting and adjacent pits, respectively. A straightforward approach is accordingly proposed to conservatively estimate the combined stress concentration factor induced by two neighboring pits, and a concrete application example is presented. It is found that for intersecting pits, the normalized stress concentration factor Ktnor increases with the increase of θ and λ and always reaches its maximum at θ = 90°, yet for adjacent pits, Ktnor decreases with the increase of λ and the maximum value appears at a slight asymmetric location. The simulations reveal that Ktnor follows a linear and an exponential relationship with the dimensionless depth parameter Rd for intersecting and adjacent cases, respectively.

  1. Embedded Web Technology: Applying World Wide Web Standards to Embedded Systems

    Science.gov (United States)

    Ponyik, Joseph G.; York, David W.

    2002-01-01

    Embedded Systems have traditionally been developed in a highly customized manner. The user interface hardware and software along with the interface to the embedded system are typically unique to the system for which they are built, resulting in extra cost to the system in terms of development time and maintenance effort. World Wide Web standards have been developed in the passed ten years with the goal of allowing servers and clients to intemperate seamlessly. The client and server systems can consist of differing hardware and software platforms but the World Wide Web standards allow them to interface without knowing about the details of system at the other end of the interface. Embedded Web Technology is the merging of Embedded Systems with the World Wide Web. Embedded Web Technology decreases the cost of developing and maintaining the user interface by allowing the user to interface to the embedded system through a web browser running on a standard personal computer. Embedded Web Technology can also be used to simplify an Embedded System's internal network.

  2. Flash Spectroscopy: Emission Lines From the Ionized Circumstellar Material Around 10-Day-Old Type II Supernovae

    Science.gov (United States)

    Khazov, D.; Yaron, O.; Gal-Yam, A.; Manulis, I.; Rubin, A.; Kulkarni, S. R.; Arcavi, I.; Kasliwal, M. M.; Ofek, E. O.; Cao, Y.; hide

    2016-01-01

    Supernovae (SNe) embedded in dense circumstellar material (CSM) may show prominent emission lines in their early-time spectra (spectroscopy"), we can measure various physical properties of the CSM, as well as the mass-loss rate of the progenitor during the year prior to its explosion. Searching through the Palomar Transient Factory (PTF and iPTF) SN spectroscopy databases from 2009 through 2014, we found 12 SNe II showing flash-ionized (FI) signatures in their first spectra. All are younger than 10 days. These events constitute 14% of all 84 SNe in our sample having a spectrum within 10 days from explosion, and 18% of SNe II observed at ages <5 days, thereby setting lower limits on the fraction of FI events. We classified as "blue/featureless" (BF) those events having a first spectrum that is similar to that of a blackbody, without any emission or absorption signatures. It is possible that some BF events had FI signatures at an earlier phase than observed, or that they lack dense CSM around the progenitor. Within 2 days after explosion, 8 out of 11 SNe in our sample are either BF events or show FI signatures. Interestingly, we found that 19 out of 21 SNe brighter than an absolute magnitude M(sub R) = -18.2 belong to the FI or BF groups, and that all FI events peaked above M(sub R) = -17.6 mag, significantly brighter than average SNe II.

  3. Plant neighbor identity influences plant biochemistry and physiology related to defense.

    Science.gov (United States)

    Broz, Amanda K; Broeckling, Corey D; De-la-Peña, Clelia; Lewis, Matthew R; Greene, Erick; Callaway, Ragan M; Sumner, Lloyd W; Vivanco, Jorge M

    2010-06-17

    Chemical and biological processes dictate an individual organism's ability to recognize and respond to other organisms. A small but growing body of evidence suggests that plants may be capable of recognizing and responding to neighboring plants in a species specific fashion. Here we tested whether or not individuals of the invasive exotic weed, Centaurea maculosa, would modulate their defensive strategy in response to different plant neighbors. In the greenhouse, C. maculosa individuals were paired with either conspecific (C. maculosa) or heterospecific (Festuca idahoensis) plant neighbors and elicited with the plant defense signaling molecule methyl jasmonate to mimic insect herbivory. We found that elicited C. maculosa plants grown with conspecific neighbors exhibited increased levels of total phenolics, whereas those grown with heterospecific neighbors allocated more resources towards growth. To further investigate these results in the field, we conducted a metabolomics analysis to explore chemical differences between individuals of C. maculosa growing in naturally occurring conspecific and heterospecific field stands. Similar to the greenhouse results, C. maculosa individuals accumulated higher levels of defense-related secondary metabolites and lower levels of primary metabolites when growing in conspecific versus heterospecific field stands. Leaf herbivory was similar in both stand types; however, a separate field study positively correlated specialist herbivore load with higher densities of C. maculosa conspecifics. Our results suggest that an individual C. maculosa plant can change its defensive strategy based on the identity of its plant neighbors. This is likely to have important consequences for individual and community success.

  4. Does a pear growl? Interference from semantic properties of orthographic neighbors.

    Science.gov (United States)

    Pecher, Diane; de Rooij, Jimmy; Zeelenberg, René

    2009-07-01

    In this study, we investigated whether semantic properties of a word's orthographic neighbors are activated during visual word recognition. In two experiments, words were presented with a property that was not true for the word itself. We manipulated whether the property was true for an orthographic neighbor of the word. Our results showed that rejection of the property was slower and less accurate when the property was true for a neighbor than when the property was not true for a neighbor. These findings indicate that semantic information is activated before orthographic processing is finished. The present results are problematic for the links model (Forster, 2006; Forster & Hector, 2002) that was recently proposed in order to bring form-first models of visual word recognition into line with previously reported findings (Forster & Hector, 2002; Pecher, Zeelenberg, & Wagenmakers, 2005; Rodd, 2004).

  5. Embedded, everywhere: a research agenda for networked systems of embedded computers

    National Research Council Canada - National Science Library

    Committee on Networked Systems of Embedded Computers; National Research Council Staff; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; National Academy of Sciences

    2001-01-01

    .... Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applicationsâ...

  6. QCD ghost f(T)-gravity model

    Energy Technology Data Exchange (ETDEWEB)

    Karami, K.; Abdolmaleki, A.; Asadzadeh, S. [University of Kurdistan, Department of Physics, Sanandaj (Iran, Islamic Republic of); Safari, Z. [Research Institute for Astronomy and Astrophysics of Maragha (RIAAM), Maragha (Iran, Islamic Republic of)

    2013-09-15

    Within the framework of modified teleparallel gravity, we reconstruct a f(T) model corresponding to the QCD ghost dark energy scenario. For a spatially flat FRW universe containing only the pressureless matter, we obtain the time evolution of the torsion scalar T (or the Hubble parameter). Then, we calculate the effective torsion equation of state parameter of the QCD ghost f(T)-gravity model as well as the deceleration parameter of the universe. Furthermore, we fit the model parameters by using the latest observational data including SNeIa, CMB and BAO data. We also check the viability of our model using a cosmographic analysis approach. Moreover, we investigate the validity of the generalized second law (GSL) of gravitational thermodynamics for our model. Finally, we point out the growth rate of matter density perturbation. We conclude that in QCD ghost f(T)-gravity model, the universe begins a matter dominated phase and approaches a de Sitter regime at late times, as expected. Also this model is consistent with current data, passes the cosmographic test, satisfies the GSL and fits the data of the growth factor well as the {Lambda}CDM model. (orig.)

  7. Spherical stochastic neighbor embedding of hyperspectral data

    CSIR Research Space (South Africa)

    Lunga, D

    2012-07-01

    Full Text Available and manifold learning in Euclidean spaces, very few attempts have focused on non-Euclidean spaces. Here, we propose a novel approach that embeds hyperspectral data, transformed into bilateral probability similarities, onto a nonlinear unit norm coordinate...

  8. Detect thy neighbor: Identity recognition at the root level in plants

    NARCIS (Netherlands)

    Chen, B.J.W.; During, H.J.; Anten, N.P.R.

    2012-01-01

    Some plant species increase root allocation at the expense of reproduction in the presence of non-self and non-kin neighbors, indicating the capacity of neighbor-identityrecognition at the rootlevel. Yet in spite of the potential consequences of rootidentityrecognition for the relationship between

  9. Neighboring trees affect ectomycorrhizal fungal community composition in a woodland-forest ecotone.

    Science.gov (United States)

    Hubert, Nathaniel A; Gehring, Catherine A

    2008-09-01

    Ectomycorrhizal fungi (EMF) are frequently species rich and functionally diverse; yet, our knowledge of the environmental factors that influence local EMF diversity and species composition remains poor. In particular, little is known about the influence of neighboring plants on EMF community structure. We tested the hypothesis that the EMF of plants with heterospecific neighbors would differ in species richness and community composition from the EMF of plants with conspecific neighbors. We conducted our study at the ecotone between pinyon (Pinus edulis)-juniper (Juniperus monosperma) woodland and ponderosa pine (Pinus ponderosa) forest in northern Arizona, USA where the dominant trees formed associations with either EMF (P. edulis and P. ponderosa) or arbuscular mycorrhizal fungi (AMF; J. monosperma). We also compared the EMF communities of pinyon and ponderosa pines where their rhizospheres overlapped. The EMF community composition, but not species richness of pinyon pines was significantly influenced by neighboring AM juniper, but not by neighboring EM ponderosa pine. Ponderosa pine EMF communities were different in species composition when growing in association with pinyon pine than when growing in association with a conspecific. The EMF communities of pinyon and ponderosa pines were similar where their rhizospheres overlapped consisting of primarily the same species in similar relative abundance. Our findings suggest that neighboring tree species identity shaped EMF community structure, but that these effects were specific to host-neighbor combinations. The overlap in community composition between pinyon pine and ponderosa pine suggests that these tree species may serve as reservoirs of EMF inoculum for one another.

  10. Reduction in predator defense in the presence of neighbors in a colonial fish.

    Directory of Open Access Journals (Sweden)

    Franziska C Schädelin

    Full Text Available Predation pressure has long been considered a leading explanation of colonies, where close neighbors may reduce predation via dilution, alarming or group predator attacks. Attacking predators may be costly in terms of energy and survival, leading to the question of how neighbors contribute to predator deterrence in relationship to each other. Two hypotheses explaining the relative efforts made by neighbors are byproduct-mutualism, which occurs when breeders inadvertently attack predators by defending their nests, and reciprocity, which occurs when breeders deliberately exchange predator defense efforts with neighbors. Most studies investigating group nest defense have been performed with birds. However, colonial fish may constitute a more practical model system for an experimental approach because of the greater ability of researchers to manipulate their environment. We investigated in the colonial fish, Neolamprologus caudopunctatus, whether prospecting pairs preferred to breed near conspecifics or solitarily, and how breeders invested in anti-predator defense in relation to neighbors. In a simple choice test, prospecting pairs selected breeding sites close to neighbors versus a solitary site. Predators were then sequentially presented to the newly established test pairs, the previously established stimulus pairs or in between the two pairs. Test pairs attacked the predator eight times more frequently when they were presented on their non-neighbor side compared to between the two breeding sites, where stimulus pairs maintained high attack rates. Thus, by joining an established pair, test pairs were able to reduce their anti-predator efforts near neighbors, at no apparent cost to the stimulus pairs. These findings are unlikely to be explained by reciprocity or byproduct-mutualism. Our results instead suggest a commensal relationship in which new pairs exploit the high anti-predator efforts of established pairs, which invest similarly with or

  11. Plant neighbor identity influences plant biochemistry and physiology related to defense

    Directory of Open Access Journals (Sweden)

    Callaway Ragan M

    2010-06-01

    Full Text Available Abstract Background Chemical and biological processes dictate an individual organism's ability to recognize and respond to other organisms. A small but growing body of evidence suggests that plants may be capable of recognizing and responding to neighboring plants in a species specific fashion. Here we tested whether or not individuals of the invasive exotic weed, Centaurea maculosa, would modulate their defensive strategy in response to different plant neighbors. Results In the greenhouse, C. maculosa individuals were paired with either conspecific (C. maculosa or heterospecific (Festuca idahoensis plant neighbors and elicited with the plant defense signaling molecule methyl jasmonate to mimic insect herbivory. We found that elicited C. maculosa plants grown with conspecific neighbors exhibited increased levels of total phenolics, whereas those grown with heterospecific neighbors allocated more resources towards growth. To further investigate these results in the field, we conducted a metabolomics analysis to explore chemical differences between individuals of C. maculosa growing in naturally occurring conspecific and heterospecific field stands. Similar to the greenhouse results, C. maculosa individuals accumulated higher levels of defense-related secondary metabolites and lower levels of primary metabolites when growing in conspecific versus heterospecific field stands. Leaf herbivory was similar in both stand types; however, a separate field study positively correlated specialist herbivore load with higher densities of C. maculosa conspecifics. Conclusions Our results suggest that an individual C. maculosa plant can change its defensive strategy based on the identity of its plant neighbors. This is likely to have important consequences for individual and community success.

  12. Evaluation of the suitability of free-energy minimization using nearest-neighbor energy parameters for RNA secondary structure prediction

    Directory of Open Access Journals (Sweden)

    Cobaugh Christian W

    2004-08-01

    Full Text Available Abstract Background A detailed understanding of an RNA's correct secondary and tertiary structure is crucial to understanding its function and mechanism in the cell. Free energy minimization with energy parameters based on the nearest-neighbor model and comparative analysis are the primary methods for predicting an RNA's secondary structure from its sequence. Version 3.1 of Mfold has been available since 1999. This version contains an expanded sequence dependence of energy parameters and the ability to incorporate coaxial stacking into free energy calculations. We test Mfold 3.1 by performing the largest and most phylogenetically diverse comparison of rRNA and tRNA structures predicted by comparative analysis and Mfold, and we use the results of our tests on 16S and 23S rRNA sequences to assess the improvement between Mfold 2.3 and Mfold 3.1. Results The average prediction accuracy for a 16S or 23S rRNA sequence with Mfold 3.1 is 41%, while the prediction accuracies for the majority of 16S and 23S rRNA structures tested are between 20% and 60%, with some having less than 20% prediction accuracy. The average prediction accuracy was 71% for 5S rRNA and 69% for tRNA. The majority of the 5S rRNA and tRNA sequences have prediction accuracies greater than 60%. The prediction accuracy of 16S rRNA base-pairs decreases exponentially as the number of nucleotides intervening between the 5' and 3' halves of the base-pair increases. Conclusion Our analysis indicates that the current set of nearest-neighbor energy parameters in conjunction with the Mfold folding algorithm are unable to consistently and reliably predict an RNA's correct secondary structure. For 16S or 23S rRNA structure prediction, Mfold 3.1 offers little improvement over Mfold 2.3. However, the nearest-neighbor energy parameters do work well for shorter RNA sequences such as tRNA or 5S rRNA, or for larger rRNAs when the contact distance between the base-pairs is less than 100 nucleotides.

  13. Minimizing embedding impact in steganography using trellis-coded quantization

    Science.gov (United States)

    Filler, Tomáš; Judas, Jan; Fridrich, Jessica

    2010-01-01

    In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance with bounds derived from appropriate rate-distortion bounds. We assume that each cover element can be assigned a positive scalar expressing the impact of making an embedding change at that element (single-letter distortion). The problem is to embed a given payload with minimal possible average embedding impact. This task, which can be viewed as a generalization of matrix embedding or writing on wet paper, has been approached using heuristic and suboptimal tools in the past. Here, we propose a fast and very versatile solution to this problem that can theoretically achieve performance arbitrarily close to the bound. It is based on syndrome coding using linear convolutional codes with the optimal binary quantizer implemented using the Viterbi algorithm run in the dual domain. The complexity and memory requirements of the embedding algorithm are linear w.r.t. the number of cover elements. For practitioners, we include detailed algorithms for finding good codes and their implementation. Finally, we report extensive experimental results for a large set of relative payloads and for different distortion profiles, including the wet paper channel.

  14. A multilevel-skin neighbor list algorithm for molecular dynamics simulation

    Science.gov (United States)

    Zhang, Chenglong; Zhao, Mingcan; Hou, Chaofeng; Ge, Wei

    2018-01-01

    Searching of the interaction pairs and organization of the interaction processes are important steps in molecular dynamics (MD) algorithms and are critical to the overall efficiency of the simulation. Neighbor lists are widely used for these steps, where thicker skin can reduce the frequency of list updating but is discounted by more computation in distance check for the particle pairs. In this paper, we propose a new neighbor-list-based algorithm with a precisely designed multilevel skin which can reduce unnecessary computation on inter-particle distances. The performance advantages over traditional methods are then analyzed against the main simulation parameters on Intel CPUs and MICs (many integrated cores), and are clearly demonstrated. The algorithm can be generalized for various discrete simulations using neighbor lists.

  15. Effects of second neighbor interactions on skyrmion lattices in chiral magnets

    International Nuclear Information System (INIS)

    Oliveira, E A S; Silva, R L; Silva, R C; Pereira, A R

    2017-01-01

    In this paper we investigate the influences of the second neighbor interactions on a skyrmion lattice in two-dimensional chiral magnets. Such a system contains the exchange and the Dzyaloshinskii–Moriya for the spin interactions and therefore, we analyse three situations: firstly, the second neighbor interaction is present only in the exchange coupling; secondly, it is present only in the Dzyaloshinskii–Moriya coupling. Finally, the second neighbor interactions are present in both exchange and Dzyaloshinskii–Moriya couplings. We show that such effects cause important modifications to the helical and skyrmion phases when an external magnetic field is applied. (paper)

  16. Improving Fraudster Detection in Online Auctions by Using Neighbor-Driven Attributes

    Directory of Open Access Journals (Sweden)

    Jun-Lin Lin

    2015-12-01

    Full Text Available Online auction websites use a simple reputation system to help their users to evaluate the trustworthiness of sellers and buyers. However, to improve their reputation in the reputation system, fraudulent users can easily deceive the reputation system by creating fake transactions. This inflated-reputation fraud poses a major problem for online auction websites because it can lead legitimate users into scams. Numerous approaches have been proposed in the literature to address this problem, most of which involve using social network analysis (SNA to derive critical features (e.g., k-core, center weight, and neighbor diversity for distinguishing fraudsters from legitimate users. This paper discusses the limitations of these SNA features and proposes a class of SNA features referred to as neighbor-driven attributes (NDAs. The NDAs of users are calculated from the features of their neighbors. Because fraudsters require collusive neighbors to provide them with positive ratings in the reputation system, using NDAs can be helpful for detecting fraudsters. Although the idea of NDAs is not entirely new, experimental results on a real-world dataset showed that using NDAs improves classification accuracy compared with state-of-the-art methods that use the k-core, center weight, and neighbor diversity.

  17. Amplification of chromosomal translocation junctions from paraffin-embedded tissues of follicular lymphoma patients

    International Nuclear Information System (INIS)

    Nambiar, Mridula; Raghavan, Sathees C; Choudhary, Bibha; Rao, Clementina R

    2008-01-01

    Follicular lymphoma is associated with the t(14;18) translocation, which is one of the most common chromosomal translocations in cancer. Generally, tissues from such patients are preserved as formalin-fixed and paraffin-embedded samples. Most of the time, retrieving the molecular information from such samples is hampered due to quality of preservation, extraction procedures and reaction conditions. In the present study, we isolate the chromosomal DNA from the paraffin-embedded nodal tissues of lymphoma patients and use a highly sensitive nested PCR approach to detect t(14;18) translocation. Our studies show that despite the sheared DNA obtained, appropriate modification of PCR reaction conditions can help in obtaining the desired amplifications. The DNA extraction protocol from paraffin-embedded nodal tissues and modifications in the PCR conditions are discussed. This study would contribute to the successful use of archival tissue samples in obtaining valuable information for cancer research

  18. Amplification of chromosomal translocation junctions from paraffin-embedded tissues of follicular lymphoma patients

    Energy Technology Data Exchange (ETDEWEB)

    Nambiar, Mridula; Raghavan, Sathees C [Department of Biochemistry, Indian Institute of Science, Bangalore-560 012 (India); Choudhary, Bibha [Manipal Institute of Regenerative Medicine, Manipal University, Bangalore-560 071 (India); Rao, Clementina R [Department of Pathology, Kidwai Memorial Institute of Oncology, Bangalore-560 029 (India)], E-mail: sathees@biochem.iisc.ernet.in

    2008-09-01

    Follicular lymphoma is associated with the t(14;18) translocation, which is one of the most common chromosomal translocations in cancer. Generally, tissues from such patients are preserved as formalin-fixed and paraffin-embedded samples. Most of the time, retrieving the molecular information from such samples is hampered due to quality of preservation, extraction procedures and reaction conditions. In the present study, we isolate the chromosomal DNA from the paraffin-embedded nodal tissues of lymphoma patients and use a highly sensitive nested PCR approach to detect t(14;18) translocation. Our studies show that despite the sheared DNA obtained, appropriate modification of PCR reaction conditions can help in obtaining the desired amplifications. The DNA extraction protocol from paraffin-embedded nodal tissues and modifications in the PCR conditions are discussed. This study would contribute to the successful use of archival tissue samples in obtaining valuable information for cancer research.

  19. The effect of shape and mounting on the piezo-resistive response of embedded manganin conductors

    International Nuclear Information System (INIS)

    Winter, R E; Harris, E J

    2006-01-01

    In the 'orthogonal gauge' technique stress gauges mounted to measure both longitudinal and transverse stresses in a shocked matrix allow the shear strength of the matrix material to be determined. A useful measure of the sensitivity of an orthogonal gauge system to changes in the yield strength of the matrix material is provided by the ratio between the resistance change of gauges of a given cross-sectional shape mounted in transverse and longitudinal orientations (the T/L ratio). A low T/L ratio indicates a more sensitive, and therefore more potentially useful, system. A Eulerian hydrocode has been used to compute the resistance change of manganin wires of rectangular cross-section and infinite length embedded in both longitudinal and transverse orientation in steel targets subjected to nominally one-dimensional shocks. Configurations in which the gauges were (a) embedded directly into the steel and (b) mounted within thin strengthless polymer layers were studied. It is shown that in case (a) the T/L ratio reduces as the aspect ratio of the gauge cross-section increases. When the gauges are embedded in a strengthless polymer layer (case (b)), the T/L ratio is lower than when the gauges are embedded directly into the matrix but in this case the aspect ratio of the manganin conductor has little influence on the T/L ratio. The observed resistance changes are explained in terms of the stresses in the gauges. The results give insight into the factors which control resistance change and offer the prospect of improvements to current gauge designs

  20. The distribution of the number of node neighbors in random hypergraphs

    International Nuclear Information System (INIS)

    López, Eduardo

    2013-01-01

    Hypergraphs, the generalization of graphs in which edges become conglomerates of r nodes called hyperedges of rank r ⩾ 2, are excellent models to study systems with interactions that are beyond the pairwise level. For hypergraphs, the node degree ℓ (number of hyperedges connected to a node) and the number of neighbors k of a node differ from each other in contrast to the case of graphs, where counting the number of edges is equivalent to counting the number of neighbors. In this paper, I calculate the distribution of the number of node neighbors in random hypergraphs in which hyperedges of uniform rank r have a homogeneous (equal for all hyperedges) probability p to appear. This distribution is equivalent to the degree distribution of ensembles of graphs created as projections of hypergraph or bipartite network ensembles, where the projection connects any two nodes in the projected graph when they are also connected in the hypergraph or bipartite network. The calculation is non-trivial due to the possibility that neighbor nodes belong simultaneously to multiple hyperedges (node overlaps). From the exact results, the traditional asymptotic approximation to the distribution in the sparse regime (small p) where overlaps are ignored is rederived and improved; the approximation exhibits Poisson-like behavior accompanied by strong fluctuations modulated by power-law decays in the system size N with decay exponents equal to the minimum number of overlapping nodes possible for a given number of neighbors. It is shown that the dense limit cannot be explained if overlaps are ignored, and the correct asymptotic distribution is provided. The neighbor distribution requires the calculation of a new combinatorial coefficient Q r−1 (k, ℓ), which counts the number of distinct labeled hypergraphs of k nodes, ℓ hyperedges of rank r − 1, and where every node is connected to at least one hyperedge. Some identities of Q r−1 (k, ℓ) are derived and applied to the

  1. Integration of protein phosphorylation, acetylation, and methylation data sets to outline lung cancer signaling networks.

    Science.gov (United States)

    Grimes, Mark; Hall, Benjamin; Foltz, Lauren; Levy, Tyler; Rikova, Klarisa; Gaiser, Jeremiah; Cook, William; Smirnova, Ekaterina; Wheeler, Travis; Clark, Neil R; Lachmann, Alexander; Zhang, Bin; Hornbeck, Peter; Ma'ayan, Avi; Comb, Michael

    2018-05-22

    Protein posttranslational modifications (PTMs) have typically been studied independently, yet many proteins are modified by more than one PTM type, and cell signaling pathways somehow integrate this information. We coupled immunoprecipitation using PTM-specific antibodies with tandem mass tag (TMT) mass spectrometry to simultaneously examine phosphorylation, methylation, and acetylation in 45 lung cancer cell lines compared to normal lung tissue and to cell lines treated with anticancer drugs. This simultaneous, large-scale, integrative analysis of these PTMs using a cluster-filtered network (CFN) approach revealed that cell signaling pathways were outlined by clustering patterns in PTMs. We used the t-distributed stochastic neighbor embedding (t-SNE) method to identify PTM clusters and then integrated each with known protein-protein interactions (PPIs) to elucidate functional cell signaling pathways. The CFN identified known and previously unknown cell signaling pathways in lung cancer cells that were not present in normal lung epithelial tissue. In various proteins modified by more than one type of PTM, the incidence of those PTMs exhibited inverse relationships, suggesting that molecular exclusive "OR" gates determine a large number of signal transduction events. We also showed that the acetyltransferase EP300 appears to be a hub in the network of pathways involving different PTMs. In addition, the data shed light on the mechanism of action of geldanamycin, an HSP90 inhibitor. Together, the findings reveal that cell signaling pathways mediated by acetylation, methylation, and phosphorylation regulate the cytoskeleton, membrane traffic, and RNA binding protein-mediated control of gene expression. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  2. Web Server Embedded System

    Directory of Open Access Journals (Sweden)

    Adharul Muttaqin

    2014-07-01

    Full Text Available Abstrak Embedded sistem saat ini menjadi perhatian khusus pada teknologi komputer, beberapa sistem operasi linux dan web server yang beraneka ragam juga sudah dipersiapkan untuk mendukung sistem embedded, salah satu aplikasi yang dapat digunakan dalam operasi pada sistem embedded adalah web server. Pemilihan web server pada lingkungan embedded saat ini masih jarang dilakukan, oleh karena itu penelitian ini dilakukan dengan menitik beratkan pada dua buah aplikasi web server yang tergolong memiliki fitur utama yang menawarkan “keringanan” pada konsumsi CPU maupun memori seperti Light HTTPD dan Tiny HTTPD. Dengan menggunakan parameter thread (users, ramp-up periods, dan loop count pada stress test embedded system, penelitian ini menawarkan solusi web server manakah diantara Light HTTPD dan Tiny HTTPD yang memiliki kecocokan fitur dalam penggunaan embedded sistem menggunakan beagleboard ditinjau dari konsumsi CPU dan memori. Hasil penelitian menunjukkan bahwa dalam hal konsumsi CPU pada beagleboard embedded system lebih disarankan penggunaan Light HTTPD dibandingkan dengan tiny HTTPD dikarenakan terdapat perbedaan CPU load yang sangat signifikan antar kedua layanan web tersebut Kata kunci: embedded system, web server Abstract Embedded systems are currently of particular concern in computer technology, some of the linux operating system and web server variegated also prepared to support the embedded system, one of the applications that can be used in embedded systems are operating on the web server. Selection of embedded web server on the environment is still rarely done, therefore this study was conducted with a focus on two web application servers belonging to the main features that offer a "lightness" to the CPU and memory consumption as Light HTTPD and Tiny HTTPD. By using the parameters of the thread (users, ramp-up periods, and loop count on a stress test embedded systems, this study offers a solution of web server which between the Light

  3. A microkernel middleware architecture for distributed embedded real-zime systems

    OpenAIRE

    Pfeffer, Matthias

    2001-01-01

    A microkernel middleware architecture for distributed embedded real-zime systems / T. Ungerer ... - In: Symposium on Reliable Distributed Systems : Proceedings : October 28 - 31, 2001, New Orleans, Louisiana, USA. - Los Alamitos, Calif. [u.a.] : IEEE Computer Soc., 2001. - S. 218-226

  4. Integrating an embedded system in a microwave moisture meter

    Science.gov (United States)

    The conversion of a PC- or laptop-controlled microwave moisture meter to a stand-alone meter hosting its own embedded system is discussed. The moisture meter measures the attenuation and phase shift of low power microwaves traversing the sample, from which the dielectric properties are calculated. T...

  5. Embedded systems handbook

    CERN Document Server

    Zurawski, Richard

    2005-01-01

    Embedded systems are nearly ubiquitous, and books on individual topics or components of embedded systems are equally abundant. Unfortunately, for those designers who thirst for knowledge of the big picture of embedded systems there is not a drop to drink. Until now. The Embedded Systems Handbook is an oasis of information, offering a mix of basic and advanced topics, new solutions and technologies arising from the most recent research efforts, and emerging trends to help you stay current in this ever-changing field.With preeminent contributors from leading industrial and academic institutions

  6. Incidence and Prevalence of Tuberculosis in Iran and Neighboring Countries

    Directory of Open Access Journals (Sweden)

    Arezoo Tavakoli

    2017-07-01

    Full Text Available Background Tuberculosis is one of the major public health concerns in many countries, however the available and effective treatment is known. Tuberculosis typically determined with socio-economic problems such as war, malnutrition and HIV prevalence. In Iran, many progresses are carried to control tuberculosis but, different factors such as immigration from neighboring countries are affective to tuberculosis infection. Objectives In this paper, the incidence and prevalence of tuberculosis is evaluated in different regions of Iran and neighboring countries. Methods The data are collected from different and valid sources such as Scopus, Pubmed and also many reports from world health organization (WHO and center of disease control and prevention (CDC for a period of 25 years (1990 - 2015 evaluated for Iran and neighboring countries. Results This study as a descriptive- analytical research is conducted cross- sectional among Iran and neighboring countries since 1990. The information is obtained from exact and valid informative data from web of sciences. The east and west border countries of Iran which are faced with war and immigration in Afghanistan, Pakistan and Iraq are source of tuberculosis infection that effect on tuberculosis prevalence in Iran. The data were analyzed by SPSS 22 and Excel 2013. Conclusions The incidence of tuberculosis in Iran has been decreased because of many controlling actions such as BCG vaccination, electronic reporting system for tuberculosis and free access to tuberculosis medication. Some of Iran neighboring countries such as Tajikistan and Pakistan have the highest incidence of tuberculosis which known as a challenge for tuberculosis control in Iran while Saudi Arabia and Turkey have the lowest incidence.

  7. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  8. Evidence for cultural differences between neighboring chimpanzee communities.

    Science.gov (United States)

    Luncz, Lydia V; Mundry, Roger; Boesch, Christophe

    2012-05-22

    The majority of evidence for cultural behavior in animals has come from comparisons between populations separated by large geographical distances that often inhabit different environments. The difficulty of excluding ecological and genetic variation as potential explanations for observed behaviors has led some researchers to challenge the idea of animal culture. Chimpanzees (Pan troglodytes verus) in the Taï National Park, Côte d'Ivoire, crack Coula edulis nuts using stone and wooden hammers and tree root anvils. In this study, we compare for the first time hammer selection for nut cracking across three neighboring chimpanzee communities that live in the same forest habitat, which reduces the likelihood of ecological variation. Furthermore, the study communities experience frequent dispersal of females at maturity, which eliminates significant genetic variation. We compared key ecological factors, such as hammer availability and nut hardness, between the three neighboring communities and found striking differences in group-specific hammer selection among communities despite similar ecological conditions. Differences were found in the selection of hammer material and hammer size in response to changes in nut resistance over time. Our findings highlight the subtleties of cultural differences in wild chimpanzees and illustrate how cultural knowledge is able to shape behavior, creating differences among neighboring social groups. Copyright © 2012 Elsevier Ltd. All rights reserved.

  9. Embedded Linux in het onderwijs

    NARCIS (Netherlands)

    Dr Ruud Ermers

    2008-01-01

    Embedded Linux wordt bij steeds meer grote bedrijven ingevoerd als embedded operating system. Binnen de opleiding Technische Informatica van Fontys Hogeschool ICT is Embedded Linux geïntroduceerd in samenwerking met het lectoraat Architectuur van Embedded Systemen. Embedded Linux is als vakgebied

  10. VEHIOT: Design and Evaluation of an IoT Architecture Based on Low-Cost Devices to Be Embedded in Production Vehicles.

    Science.gov (United States)

    Redondo, Jonatan Pajares; González, Lisardo Prieto; Guzman, Javier García; Boada, Beatriz L; Díaz, Vicente

    2018-02-06

    Nowadays, the current vehicles are incorporating control systems in order to improve their stability and handling. These control systems need to know the vehicle dynamics through the variables (lateral acceleration, roll rate, roll angle, sideslip angle, etc.) that are obtained or estimated from sensors. For this goal, it is necessary to mount on vehicles not only low-cost sensors, but also low-cost embedded systems, which allow acquiring data from sensors and executing the developed algorithms to estimate and to control with novel higher speed computing. All these devices have to be integrated in an adequate architecture with enough performance in terms of accuracy, reliability and processing time. In this article, an architecture to carry out the estimation and control of vehicle dynamics has been developed. This architecture was designed considering the basic principles of IoT and integrates low-cost sensors and embedded hardware for orchestrating the experiments. A comparison of two different low-cost systems in terms of accuracy, acquisition time and reliability has been done. Both devices have been compared with the VBOX device from Racelogic, which has been used as the ground truth. The comparison has been made from tests carried out in a real vehicle. The lateral acceleration and roll rate have been analyzed in order to quantify the error of these devices.

  11. VEHIOT: Design and Evaluation of an IoT Architecture Based on Low-Cost Devices to Be Embedded in Production Vehicles

    Science.gov (United States)

    Díaz, Vicente

    2018-01-01

    Nowadays, the current vehicles are incorporating control systems in order to improve their stability and handling. These control systems need to know the vehicle dynamics through the variables (lateral acceleration, roll rate, roll angle, sideslip angle, etc.) that are obtained or estimated from sensors. For this goal, it is necessary to mount on vehicles not only low-cost sensors, but also low-cost embedded systems, which allow acquiring data from sensors and executing the developed algorithms to estimate and to control with novel higher speed computing. All these devices have to be integrated in an adequate architecture with enough performance in terms of accuracy, reliability and processing time. In this article, an architecture to carry out the estimation and control of vehicle dynamics has been developed. This architecture was designed considering the basic principles of IoT and integrates low-cost sensors and embedded hardware for orchestrating the experiments. A comparison of two different low-cost systems in terms of accuracy, acquisition time and reliability has been done. Both devices have been compared with the VBOX device from Racelogic, which has been used as the ground truth. The comparison has been made from tests carried out in a real vehicle. The lateral acceleration and roll rate have been analyzed in order to quantify the error of these devices. PMID:29415507

  12. VEHIOT: Design and Evaluation of an IoT Architecture Based on Low-Cost Devices to Be Embedded in Production Vehicles

    Directory of Open Access Journals (Sweden)

    Jonatan Pajares Redondo

    2018-02-01

    Full Text Available Nowadays, the current vehicles are incorporating control systems in order to improve their stability and handling. These control systems need to know the vehicle dynamics through the variables (lateral acceleration, roll rate, roll angle, sideslip angle, etc. that are obtained or estimated from sensors. For this goal, it is necessary to mount on vehicles not only low-cost sensors, but also low-cost embedded systems, which allow acquiring data from sensors and executing the developed algorithms to estimate and to control with novel higher speed computing. All these devices have to be integrated in an adequate architecture with enough performance in terms of accuracy, reliability and processing time. In this article, an architecture to carry out the estimation and control of vehicle dynamics has been developed. This architecture was designed considering the basic principles of IoT and integrates low-cost sensors and embedded hardware for orchestrating the experiments. A comparison of two different low-cost systems in terms of accuracy, acquisition time and reliability has been done. Both devices have been compared with the VBOX device from Racelogic, which has been used as the ground truth. The comparison has been made from tests carried out in a real vehicle. The lateral acceleration and roll rate have been analyzed in order to quantify the error of these devices.

  13. Multiple k Nearest Neighbor Query Processing in Spatial Network Databases

    DEFF Research Database (Denmark)

    Xuegang, Huang; Jensen, Christian Søndergaard; Saltenis, Simonas

    2006-01-01

    This paper concerns the efficient processing of multiple k nearest neighbor queries in a road-network setting. The assumed setting covers a range of scenarios such as the one where a large population of mobile service users that are constrained to a road network issue nearest-neighbor queries...... for points of interest that are accessible via the road network. Given multiple k nearest neighbor queries, the paper proposes progressive techniques that selectively cache query results in main memory and subsequently reuse these for query processing. The paper initially proposes techniques for the case...... where an upper bound on k is known a priori and then extends the techniques to the case where this is not so. Based on empirical studies with real-world data, the paper offers insight into the circumstances under which the different proposed techniques can be used with advantage for multiple k nearest...

  14. Improving Recommendations in Tag-based Systems with Spectral Clustering of Tag Neighbors

    DEFF Research Database (Denmark)

    Pan, Rong; Xu, Guandong; Dolog, Peter

    2012-01-01

    Tag as a useful metadata reflects the collaborative and conceptual features of documents in social collaborative annotation systems. In this paper, we propose a collaborative approach for expanding tag neighbors and investigate the spectral clustering algorithm to filter out noisy tag neighbors...... in order to get appropriate recommendation for users. The preliminary experiments have been conducted on MovieLens dataset to compare our proposed approach with the traditional collaborative filtering recommendation approach and naive tag neighbors expansion approach in terms of precision, and the result...... demonstrates that our approach could considerably improve the performance of recommendations....

  15. Embedding beyond electrostatics

    DEFF Research Database (Denmark)

    Nåbo, Lina J.; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna

    2016-01-01

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic...... repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π∗ transition, which was not possible using an embedding method that only includes electrostatics....... This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods....

  16. Local biotic adaptation of trees and shrubs to plant neighbors

    Science.gov (United States)

    Grady, Kevin C.; Wood, Troy E.; Kolb, Thomas E.; Hersch-Green, Erika; Shuster, Stephen M.; Gehring, Catherine A.; Hart, Stephen C.; Allan, Gerard J.; Whitham, Thomas G.

    2017-01-01

    Natural selection as a result of plant–plant interactions can lead to local biotic adaptation. This may occur where species frequently interact and compete intensely for resources limiting growth, survival, and reproduction. Selection is demonstrated by comparing a genotype interacting with con- or hetero-specific sympatric neighbor genotypes with a shared site-level history (derived from the same source location), to the same genotype interacting with foreign neighbor genotypes (from different sources). Better genotype performance in sympatric than allopatric neighborhoods provides evidence of local biotic adaptation. This pattern might be explained by selection to avoid competition by shifting resource niches (differentiation) or by interactions benefitting one or more members (facilitation). We tested for local biotic adaptation among two riparian trees, Populus fremontii and Salix gooddingii, and the shrub Salix exigua by transplanting replicated genotypes from multiple source locations to a 17 000 tree common garden with sympatric and allopatric treatments along the Colorado River in California. Three major patterns were observed: 1) across species, 62 of 88 genotypes grew faster with sympatric neighbors than allopatric neighbors; 2) these growth rates, on an individual tree basis, were 44, 15 and 33% higher in sympatric than allopatric treatments for P. fremontii, S. exigua and S. gooddingii, respectively, and; 3) survivorship was higher in sympatric treatments for P. fremontiiand S. exigua. These results support the view that fitness of foundation species supporting diverse communities and dominating ecosystem processes is determined by adaptive interactions among multiple plant species with the outcome that performance depends on the genetic identity of plant neighbors. The occurrence of evolution in a plant-community context for trees and shrubs builds on ecological evolutionary research that has demonstrated co-evolution among herbaceous taxa, and

  17. Nearest Neighbor Search in the Metric Space of a Complex Network for Community Detection

    Directory of Open Access Journals (Sweden)

    Suman Saha

    2016-03-01

    Full Text Available The objective of this article is to bridge the gap between two important research directions: (1 nearest neighbor search, which is a fundamental computational tool for large data analysis; and (2 complex network analysis, which deals with large real graphs but is generally studied via graph theoretic analysis or spectral analysis. In this article, we have studied the nearest neighbor search problem in a complex network by the development of a suitable notion of nearness. The computation of efficient nearest neighbor search among the nodes of a complex network using the metric tree and locality sensitive hashing (LSH are also studied and experimented. For evaluation of the proposed nearest neighbor search in a complex network, we applied it to a network community detection problem. Experiments are performed to verify the usefulness of nearness measures for the complex networks, the role of metric tree and LSH to compute fast and approximate node nearness and the the efficiency of community detection using nearest neighbor search. We observed that nearest neighbor between network nodes is a very efficient tool to explore better the community structure of the real networks. Several efficient approximation schemes are very useful for large networks, which hardly made any degradation of results, whereas they save lot of computational times, and nearest neighbor based community detection approach is very competitive in terms of efficiency and time.

  18. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  19. Embedded engineering education

    CERN Document Server

    Kaštelan, Ivan; Temerinac, Miodrag; Barak, Moshe; Sruk, Vlado

    2016-01-01

    This book focuses on the outcome of the European research project “FP7-ICT-2011-8 / 317882: Embedded Engineering Learning Platform” E2LP. Additionally, some experiences and researches outside this project have been included. This book provides information about the achieved results of the E2LP project as well as some broader views about the embedded engineering education. It captures project results and applications, methodologies, and evaluations. It leads to the history of computer architectures, brings a touch of the future in education tools and provides a valuable resource for anyone interested in embedded engineering education concepts, experiences and material. The book contents 12 original contributions and will open a broader discussion about the necessary knowledge and appropriate learning methods for the new profile of embedded engineers. As a result, the proposed Embedded Computer Engineering Learning Platform will help to educate a sufficient number of future engineers in Europe, capable of d...

  20. Embedded Processor Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Embedded Processor Laboratory provides the means to design, develop, fabricate, and test embedded computers for missile guidance electronics systems in support...

  1. Working with Family, Friend, and Neighbor Caregivers: Lessons from Four Diverse Communities

    Science.gov (United States)

    Powell, Douglas R.

    2011-01-01

    This article is excerpted from "Who's Watching the Babies? Improving the Quality of Family, Friend, and Neighbor Care" by Douglas R. Powell ("ZERO TO THREE," 2008). The article explores questions about program development and implementation strategies for supporting Family, Friend, and Neighbor (FFN) caregivers: How do programs and their host…

  2. Embedded defects

    International Nuclear Information System (INIS)

    Barriola, M.; Vachaspati, T.; Bucher, M.

    1994-01-01

    We give a prescription for embedding classical solutions and, in particular, topological defects in field theories which are invariant under symmetry groups that are not necessarily simple. After providing examples of embedded defects in field theories based on simple groups, we consider the electroweak model and show that it contains the Z string and a one-parameter family of strings called the W(α) string. It is argued that although the members of this family are gauge equivalent when considered in isolation, each member becomes physically distinct when multistring configurations are considered. We then turn to the issue of stability of embedded defects and demonstrate the instability of a large class of such solutions in the absence of bound states or condensates. The Z string is shown to be unstable for all values of the Higgs boson mass when θ W =π/4. W strings are also shown to be unstable for a large range of parameters. Embedded monopoles suffer from the Brandt-Neri-Coleman instability. Finally, we connect the electroweak string solutions to the sphaleron

  3. Polymorphic Embedding of DSLs

    DEFF Research Database (Denmark)

    Hofer, Christian; Ostermann, Klaus; Rendel, Tillmann

    2008-01-01

    propose polymorphic embedding of DSLs, where many different interpretations of a DSL can be provided as reusable components, and show how polymorphic embedding can be realized in the programming language Scala. With polymorphic embedding, the static type-safety, modularity, composability and rapid...

  4. Next neighbors effect along the Ca-Sr-Ba-åkermanite join: Long-range vs. short-range structural features

    Science.gov (United States)

    Dondi, Michele; Ardit, Matteo; Cruciani, Giuseppe

    2013-06-01

    An original approach has been developed herein to explore the correlations between short- and long-range structural properties of solid solutions. X-ray diffraction (XRD) and electronic absorption spectroscopy (EAS) data were combined on a (Ca,Sr,Ba)2(Mg0.7Co0.3)Si2O7 join to determine average and local distances, respectively. Instead of varying the EAS-active ion concentration along the join, as has commonly been performed in previous studies, the constant replacement of Mg2+ by a minimal fraction of a similar size cation (Co2+) has been used to assess the effects of varying second-nearest neighbor cations (Ca, Sr, Ba) on the local distances of the first shell. A comparison between doped and un-doped series has shown that, although the overall symmetry of the Co-centered T1-site was retained, greater relaxation occurs at the CoO4 tetrahedra which become increasingly large and more distorted than the MgO4 tetrahedra. This is indicated by an increase in both the quadratic elongation (λT1) and the bond angle variance (σ2T1) distortion indices, as the whole structure expands due to an increase in size in the second-nearest neighbors. This behavior highlights the effect of the different electronic configurations of Co2+ (3d7) and Mg2+ (2p6) in spite of their very similar ionic size. Furthermore, although the overall symmetry of the Co-centered T1-site is retained, relatively limited (Co2+-O occur along the solid solution series and large changes are found in molar absorption coefficients showing that EAS Co2+-bands are highly sensitive to change in the local structure.

  5. The GALAH survey

    DEFF Research Database (Denmark)

    Kos, Janez; Bland-Hawthor, Joss; Freeman, Ken

    2018-01-01

    -SNE) - which identifies an optimal mapping of a high-dimensional space into fewer dimensions - whilst conserving the original clustering information. Typically, the projection is made to a 2D space to aid recognition of clusters by eye. We show that this method is a reliable tool for chemical tagging because......The technique of chemical tagging uses the elemental abundances of stellar atmospheres to 'reconstruct' chemically homogeneous star clusters that have long since dispersed. The GALAH spectroscopic survey - which aims to observe one million stars using the Anglo-Australian Telescope - allows us...... to measure up to 30 elements or dimensions in the stellar chemical abundance space, many of which are not independent. How to find clustering reliably in a noisy high-dimensional space is a difficult problem that remains largely unsolved. Here, we explore t-distributed stochastic neighbour embedding (t...

  6. The Application of Determining Students’ Graduation Status of STMIK Palangkaraya Using K-Nearest Neighbors Method

    Science.gov (United States)

    Rusdiana, Lili; Marfuah

    2017-12-01

    K-Nearest Neighbors method is one of methods used for classification which calculate a value to find out the closest in distance. It is used to group a set of data such as students’ graduation status that are got from the amount of course credits taken by them, the grade point average (AVG), and the mini-thesis grade. The study is conducted to know the results of using K-Nearest Neighbors method on the application of determining students’ graduation status, so it can be analyzed from the method used, the data, and the application constructed. The aim of this study is to find out the application results by using K-Nearest Neighbors concept to determine students’ graduation status using the data of STMIK Palangkaraya students. The development of the software used Extreme Programming, since it was appropriate and precise for this study which was to quickly finish the project. The application was created using Microsoft Office Excel 2007 for the training data and Matlab 7 to implement the application. The result of K-Nearest Neighbors method on the application of determining students’ graduation status was 92.5%. It could determine the predicate graduation of 94 data used from the initial data before the processing as many as 136 data which the maximal training data was 50data. The K-Nearest Neighbors method is one of methods used to group a set of data based on the closest value, so that using K-Nearest Neighbors method agreed with this study. The results of K-Nearest Neighbors method on the application of determining students’ graduation status was 92.5% could determine the predicate graduation which is the maximal training data. The K-Nearest Neighbors method is one of methods used to group a set of data based on the closest value, so that using K-Nearest Neighbors method agreed with this study.

  7. Modeling the effect of neighboring grains on twin growth in HCP polycrystals

    Science.gov (United States)

    Kumar, M. Arul; Beyerlein, I. J.; Lebensohn, R. A.; Tomé, C. N.

    2017-09-01

    In this paper, we study the dependence of neighboring grain orientation on the local stress state around a deformation twin in a hexagonal close packed (HCP) crystal and its effects on the resistance against twin thickening. We use a recently developed, full-field elasto-visco-plastic formulation based on fast Fourier transforms that account for the twinning shear transformation imposed by the twin lamella. The study is applied to Mg, Zr and Ti, since these HCP metals tend to deform by activation of different types of slip modes. The analysis shows that the local stress along the twin boundary are strongly controlled by the relative orientation of the easiest deformation modes in the neighboring grain with respect to the twin lamella in the parent grain. A geometric expression that captures this parent-neighbor relationship is proposed and incorporated into a larger scale, mean-field visco-plastic self-consistent model to simulate the role of neighboring grain orientation on twin thickening. We demonstrate that the approach improves the prediction of twin area fraction distribution when compared with experimental observations.

  8. Time-dependent embedding

    OpenAIRE

    Inglesfield, J. E.

    2007-01-01

    A method of solving the time-dependent Schr\\"odinger equation is presented, in which a finite region of space is treated explicitly, with the boundary conditions for matching the wave-functions on to the rest of the system replaced by an embedding term added on to the Hamiltonian. This time-dependent embedding term is derived from the Fourier transform of the energy-dependent embedding potential, which embeds the time-independent Schr\\"odinger equation. Results are presented for a one-dimensi...

  9. Field tests on partial embedment effects (embedment effect tests on soil-structure interaction)

    International Nuclear Information System (INIS)

    Kurimoto, O.; Tsunoda, T.; Inoue, T.; Izumi, M.; Kusakabe, K.; Akino, K.

    1993-01-01

    A series of Model Tests of Embedment Effect on Reactor Buildings has been carried out by the Nuclear Power Engineering Corporation (NUPEC), under the sponsorship of the Ministry of International Trade and lndustry (MITI) of Japan. The nuclear reactor buildings are partially embedded due to conditions for the construction or building arrangement in Japan. It is necessary to verify the partial embedment effects by experiments and analytical studies in order to incorporate the effects in the seismic design. Forced vibration tests, therefore, were performed using a model with several types of embedment. Correlated simulation analyses were also performed and the characteristics of partial embedment effects on soil-structure interaction were evaluated. (author)

  10. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    Summary form only given. Embedded systems are everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded systems. Over 99% of the microprocessors produced today are used in embedded systems, and recently the number of embedded systems...

  11. Intelligent Machine Parts with Surface Embedded Sensors

    OpenAIRE

    Østbø, Niels Peter

    2009-01-01

    A surface embedded temperature sensor has successfully been fabricated on a customized industrial bolt. The aluminum substrate of the bolt was electrically isolated by plasma electrolytic oxidation followed by the fabrication of a type T thermocouple and finally covered by a wear resistant DLC coating. This bolt is part of our work to develop smart machine parts that are capable of reporting their current physical status under real working conditions enabling both new tools for condition base...

  12. Design and Implementation of an IoT Access Point for Smart Home

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chang

    2015-12-01

    Full Text Available Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart devices. These smart devices can automatically connect to the Internet and form an intelligent network called Internet of Things (IoT. However, these devices are embedded with different wireless communication interfaces such as Wi-Fi and ZigBee. This paper presents the design and implementation of an IoT access point that supports functionalities of coordination of various wireless transmission protocols. Based on the existing Wi-Fi access point, we have embedded a ZigBee module and implemented ZigBee and UPnP protocols into the designed IoT access point, which supports ZigBee communication capabilities over the Internet.

  13. Text Categorization Using Weight Adjusted k-Nearest Neighbor Classification

    National Research Council Canada - National Science Library

    Han, Euihong; Karypis, George; Kumar, Vipin

    1999-01-01

    .... The authors present a nearest neighbor classification scheme for text categorization in which the importance of discriminating words is learned using mutual information and weight adjustment techniques...

  14. SibRank: Signed bipartite network analysis for neighbor-based collaborative ranking

    Science.gov (United States)

    Shams, Bita; Haratizadeh, Saman

    2016-09-01

    Collaborative ranking is an emerging field of recommender systems that utilizes users' preference data rather than rating values. Unfortunately, neighbor-based collaborative ranking has gained little attention despite its more flexibility and justifiability. This paper proposes a novel framework, called SibRank that seeks to improve the state of the art neighbor-based collaborative ranking methods. SibRank represents users' preferences as a signed bipartite network, and finds similar users, through a novel personalized ranking algorithm in signed networks.

  15. ENTROPY CHARACTERISTICS IN MODELS FOR COORDINATION OF NEIGHBORING ROAD SECTIONS

    Directory of Open Access Journals (Sweden)

    N. I. Kulbashnaya

    2016-01-01

    Full Text Available The paper considers an application of entropy characteristics as criteria to coordinate traffic conditions at neighboring road sections. It has been proved that the entropy characteristics are widely used in the methods that take into account information influence of the environment on drivers and in the mechanisms that create such traffic conditions which ensure preservation of the optimal level of driver’s emotional tension during the drive. Solution of such problem is considered in the aspect of coordination of traffic conditions at neighboring road sections that, in its turn, is directed on exclusion of any driver’s transitional processes. Methodology for coordination of traffic conditions at neighboring road sections is based on the E. V. Gavrilov’s concept on coordination of some parameters of road sections which can be expressed in the entropy characteristics. The paper proposes to execute selection of coordination criteria according to accident rates because while moving along neighboring road sections traffic conditions change drastically that can result in creation of an accident situation. Relative organization of a driver’s perception field and driver’s interaction with the traffic environment has been selected as entropy characteristics. Therefore, the given characteristics are made conditional to the road accidents rate. The investigation results have revealed a strong correlation between the relative organization of the driver’s perception field and the relative organization of the driver’s interaction with the traffic environment and the accident rate. Results of the executed experiment have proved an influence of the accident rate on the investigated entropy characteristics.

  16. Do alcohol compliance checks decrease underage sales at neighboring establishments?

    Science.gov (United States)

    Erickson, Darin J; Smolenski, Derek J; Toomey, Traci L; Carlin, Bradley P; Wagenaar, Alexander C

    2013-11-01

    Underage alcohol compliance checks conducted by law enforcement agencies can reduce the likelihood of illegal alcohol sales at checked alcohol establishments, and theory suggests that an alcohol establishment that is checked may warn nearby establishments that compliance checks are being conducted in the area. In this study, we examined whether the effects of compliance checks diffuse to neighboring establishments. We used data from the Complying with the Minimum Drinking Age trial, which included more than 2,000 compliance checks conducted at more than 900 alcohol establishments. The primary outcome was the sale of alcohol to a pseudo-underage buyer without the need for age identification. A multilevel logistic regression was used to model the effect of a compliance check at each establishment as well as the effect of compliance checks at neighboring establishments within 500 m (stratified into four equal-radius concentric rings), after buyer, license, establishment, and community-level variables were controlled for. We observed a decrease in the likelihood of establishments selling alcohol to underage youth after they had been checked by law enforcement, but these effects quickly decayed over time. Establishments that had a close neighbor (within 125 m) checked in the past 90 days were also less likely to sell alcohol to young-appearing buyers. The spatial effect of compliance checks on other establishments decayed rapidly with increasing distance. Results confirm the hypothesis that the effects of police compliance checks do spill over to neighboring establishments. These findings have implications for the development of an optimal schedule of police compliance checks.

  17. Kinetic Models for Topological Nearest-Neighbor Interactions

    Science.gov (United States)

    Blanchet, Adrien; Degond, Pierre

    2017-12-01

    We consider systems of agents interacting through topological interactions. These have been shown to play an important part in animal and human behavior. Precisely, the system consists of a finite number of particles characterized by their positions and velocities. At random times a randomly chosen particle, the follower, adopts the velocity of its closest neighbor, the leader. We study the limit of a system size going to infinity and, under the assumption of propagation of chaos, show that the limit kinetic equation is a non-standard spatial diffusion equation for the particle distribution function. We also study the case wherein the particles interact with their K closest neighbors and show that the corresponding kinetic equation is the same. Finally, we prove that these models can be seen as a singular limit of the smooth rank-based model previously studied in Blanchet and Degond (J Stat Phys 163:41-60, 2016). The proofs are based on a combinatorial interpretation of the rank as well as some concentration of measure arguments.

  18. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  19. A group ICA based framework for evaluating resting fMRI markers when disease categories are unclear: application to schizophrenia, bipolar, and schizoaffective disorders

    Science.gov (United States)

    Du, Yuhui; Pearlson, Godfrey D; Liu, Jingyu; Sui, Jing; Yu, Qingbao; He, Hao; Castro, Eduardo; Calhoun, Vince D.

    2015-01-01

    Schizophrenia (SZ), bipolar disorder (BP) and schizoaffective disorder (SAD) share some common symptoms, and there is a debate about whether SAD is an independent category. To the best of our knowledge, no study has been done to differentiate these three disorders or to investigate the distinction of SAD as an independent category using fMRI data. The present study is aimed to explore biomarkers from resting-state fMRI networks for differentiating these disorders and investigate the relationship among these disorders based on fMRI networks with an emphasis on SAD. Firstly, a novel group ICA method, group information guided independent component analysis (GIG-ICA), was applied to extract subject-specific brain networks from fMRI data of 20 healthy controls (HC), 20 SZ patients, 20 BP patients, 20 patients suffering SAD with manic episodes (SADM), and 13 patients suffering SAD with depressive episodes exclusively (SADD). Then, five-level one-way analysis of covariance and multiclass support vector machine recursive feature elimination were employed to identify discriminative regions from the networks. Subsequently, the t-distributed stochastic neighbor embedding (t-SNE) projection and the hierarchical clustering methods were implemented to investigate the relationship among those groups. Finally, to evaluate the generalization ability, 16 new subjects were classified based on the found regions and the trained model using original 93 subjects. Results show that the discriminative regions mainly include frontal, parietal, precuneus, cingulate, supplementary motor, cerebellar, insula and supramarginal cortices, which performed well in distinguishing different groups. SADM and SADD were the most similar to each other, although SADD had greater similarity to SZ compared to other groups, which indicates SAD may be an independent category. BP was closer to HC compared with other psychotic disorders. In summary, resting-state fMRI brain networks extracted via GIG-ICA provide

  20. Nearest unlike neighbor (NUN): an aid to decision confidence estimation

    Science.gov (United States)

    Dasarathy, Belur V.

    1995-09-01

    The concept of nearest unlike neighbor (NUN), proposed and explored previously in the design of nearest neighbor (NN) based decision systems, is further exploited in this study to develop a measure of confidence in the decisions made by NN-based decision systems. This measure of confidence, on the basis of comparison with a user-defined threshold, may be used to determine the acceptability of the decision provided by the NN-based decision system. The concepts, associated methodology, and some illustrative numerical examples using the now classical Iris data to bring out the ease of implementation and effectiveness of the proposed innovations are presented.

  1. Isometric embeddings of 2-spheres by embedding flow for applications in numerical relativity

    International Nuclear Information System (INIS)

    Jasiulek, Michael; Korzyński, Mikołaj

    2012-01-01

    We present a numerical method for solving Weyl's embedding problem which consists in finding a global isometric embedding of a positively curved and positive-definite spherical 2-metric into the Euclidean 3-space. The method is based on a construction introduced by Weingarten and was used in Nirenberg's proof of Weyl's conjecture. The target embedding results as the endpoint of an embedding flow in R 3 beginning at the unit sphere's embedding. We employ spectral methods to handle functions on the surface and to solve various (non)linear elliptic PDEs. The code requires no additional input or steering from the operator and its convergence is guaranteed by the Nirenberg arguments. Possible applications in 3 + 1 numerical relativity range from quasi-local mass and momentum measures to coarse-graining in inhomogeneous cosmological models. (paper)

  2. The GALAH survey: chemical tagging of star clusters and new members in the Pleiades

    Science.gov (United States)

    Kos, Janez; Bland-Hawthorn, Joss; Freeman, Ken; Buder, Sven; Traven, Gregor; De Silva, Gayandhi M.; Sharma, Sanjib; Asplund, Martin; Duong, Ly; Lin, Jane; Lind, Karin; Martell, Sarah; Simpson, Jeffrey D.; Stello, Dennis; Zucker, Daniel B.; Zwitter, Tomaž; Anguiano, Borja; Da Costa, Gary; D'Orazi, Valentina; Horner, Jonathan; Kafle, Prajwal R.; Lewis, Geraint; Munari, Ulisse; Nataf, David M.; Ness, Melissa; Reid, Warren; Schlesinger, Katie; Ting, Yuan-Sen; Wyse, Rosemary

    2018-02-01

    The technique of chemical tagging uses the elemental abundances of stellar atmospheres to 'reconstruct' chemically homogeneous star clusters that have long since dispersed. The GALAH spectroscopic survey - which aims to observe one million stars using the Anglo-Australian Telescope - allows us to measure up to 30 elements or dimensions in the stellar chemical abundance space, many of which are not independent. How to find clustering reliably in a noisy high-dimensional space is a difficult problem that remains largely unsolved. Here, we explore t-distributed stochastic neighbour embedding (t-SNE) - which identifies an optimal mapping of a high-dimensional space into fewer dimensions - whilst conserving the original clustering information. Typically, the projection is made to a 2D space to aid recognition of clusters by eye. We show that this method is a reliable tool for chemical tagging because it can: (i) resolve clustering in chemical space alone, (ii) recover known open and globular clusters with high efficiency and low contamination, and (iii) relate field stars to known clusters. t-SNE also provides a useful visualization of a high-dimensional space. We demonstrate the method on a data set of 13 abundances measured in the spectra of 187 000 stars by the GALAH survey. We recover seven of the nine observed clusters (six globular and three open clusters) in chemical space with minimal contamination from field stars and low numbers of outliers. With chemical tagging, we also identify two Pleiades supercluster members (which we confirm kinematically), one as far as 6° - one tidal radius away from the cluster centre.

  3. X-RAY EMISSION FROM SUPERNOVAE IN DENSE CIRCUMSTELLAR MATTER ENVIRONMENTS: A SEARCH FOR COLLISIONLESS SHOCKS

    International Nuclear Information System (INIS)

    Ofek, E. O.; Gal-Yam, A.; Yaron, O.; Arcavi, I.; Fox, D.; Cenko, S. B.; Filippenko, A. V.; Bloom, J. S.; Sullivan, M.; Gnat, O.; Frail, D. A.; Horesh, A.; Kulkarni, S. R.; Corsi, A.; Quimby, R. M.; Gehrels, N.; Nugent, P. E.; Kasliwal, M. M.; Bildsten, L.; Poznanski, D.

    2013-01-01

    The optical light curve of some supernovae (SNe) may be powered by the outward diffusion of the energy deposited by the explosion shock (the so-called shock breakout) in optically thick (τ ∼> 30) circumstellar matter (CSM). Recently, it was shown that the radiation-mediated and radiation-dominated shock in an optically thick wind must transform into a collisionless shock and can produce hard X-rays. The X-rays are expected to peak at late times, relative to maximum visible light. Here we report on a search, using Swift/XRT and Chandra, for X-ray emission from 28 SNe that belong to classes whose progenitors are suspected to be embedded in dense CSM. Our sample includes 19 Type IIn SNe, one Type Ibn SN, and eight hydrogen-poor superluminous SNe (SLSN-I such as SN 2005ap). Two SNe (SN 2006jc and SN 2010jl) have X-ray properties that are roughly consistent with the expectation for X-rays from a collisionless shock in optically thick CSM. However, the X-ray emission from SN 2006jc can also be explained as originating in an optically thin region. Thus, we propose that the optical light curve of SN 2010jl is powered by shock breakout in CSM. We suggest that two other events (SN 2010al and SN 2011ht) were too X-ray bright during the SN maximum optical light to be explained by the shock-breakout model. We conclude that the light curves of some, but not all, SNe IIn/Ibn are powered by shock breakout in CSM. For the rest of the SNe in our sample, including all of the SLSN-I events, our X-ray limits are not deep enough and were typically obtained too early (i.e., near the SN maximum light) for definitive conclusions about their nature. Late-time X-ray observations are required in order to further test whether these SNe are indeed embedded in dense CSM. We review the conditions required for a shock breakout in a wind profile. We argue that the timescale, relative to maximum light, for the SN to peak in X-rays is a probe of the column density and the density profile above the

  4. Intrinsic acid-base properties of a hexa-2'-deoxynucleoside pentaphosphate, d(ApGpGpCpCpT): neighboring effects and isomeric equilibria.

    Science.gov (United States)

    Domínguez-Martín, Alicia; Johannsen, Silke; Sigel, Astrid; Operschall, Bert P; Song, Bin; Sigel, Helmut; Okruszek, Andrzej; González-Pérez, Josefa María; Niclós-Gutiérrez, Juan; Sigel, Roland K O

    2013-06-17

    The intrinsic acid-base properties of the hexa-2'-deoxynucleoside pentaphosphate, d(ApGpGpCpCpT) [=(A1∙G2∙G3∙C4∙C5∙T6)=(HNPP)⁵⁻] have been determined by ¹H NMR shift experiments. The pKa values of the individual sites of the adenosine (A), guanosine (G), cytidine (C), and thymidine (T) residues were measured in water under single-strand conditions (i.e., 10% D₂O, 47 °C, I=0.1 M, NaClO₄). These results quantify the release of H⁺ from the two (N7)H⁺ (G∙G), the two (N3)H⁺ (C∙C), and the (N1)H⁺ (A) units, as well as from the two (N1)H (G∙G) and the (N3)H (T) sites. Based on measurements with 2'-deoxynucleosides at 25 °C and 47 °C, they were transferred to pKa values valid in water at 25 °C and I=0.1 M. Intramolecular stacks between the nucleobases A1 and G2 as well as most likely also between G2 and G3 are formed. For HNPP three pKa clusters occur, that is those encompassing the pKa values of 2.44, 2.97, and 3.71 of G2(N7)H⁺, G3(N7)H⁺, and A1(N1)H⁺, respectively, with overlapping buffer regions. The tautomer populations were estimated, giving for the release of a single proton from five-fold protonated H₅(HNPP)(±) , the tautomers (G2)N7, (G3)N7, and (A1)N1 with formation degrees of about 74, 22, and 4%, respectively. Tautomer distributions reveal pathways for proton-donating as well as for proton-accepting reactions both being expected to be fast and to occur practically at no "cost". The eight pKa values for H₅(HNPP)(±) are compared with data for nucleosides and nucleotides, revealing that the nucleoside residues are in part affected very differently by their neighbors. In addition, the intrinsic acidity constants for the RNA derivative r(A1∙G2∙G3∙C4∙C5∙U6), where U=uridine, were calculated. Finally, the effect of metal ions on the pKa values of nucleobase sites is briefly discussed because in this way deprotonation reactions can easily be shifted to the physiological pH range. Copyright © 2013 WILEY

  5. SINGLE-DEGENERATE TYPE Ia SUPERNOVAE ARE PREFERENTIALLY OVERLUMINOUS

    International Nuclear Information System (INIS)

    Fisher, Robert; Jumper, Kevin

    2015-01-01

    Recent observational and theoretical progress has favored merging and helium-accreting sub-Chandrasekhar mass white dwarfs (WDs) in the double-degenerate and the double-detonation channels, respectively, as the most promising progenitors of normal Type Ia supernovae (SNe Ia). Thus the fate of rapidly accreting Chandrasekhar mass WDs in the single-degenerate channel remains more mysterious then ever. In this paper, we clarify the nature of ignition in Chandrasekhar-mass single-degenerate SNe Ia by analytically deriving the existence of a characteristic length scale which establishes a transition from central ignitions to buoyancy-driven ignitions. Using this criterion, combined with data from three-dimensional simulations of convection and ignition, we demonstrate that the overwhelming majority of ignition events within Chandrasekhar-mass WDs in the single-degenerate channel are buoyancy-driven, and consequently lack a vigorous deflagration phase. We thus infer that single-degenerate SNe Ia are generally expected to lead to overluminous 1991T-like SNe Ia events. We establish that the rates predicted from both the population of supersoft X-ray sources (SSSs) and binary population synthesis models of the single-degenerate channel are broadly consistent with the observed rates of overluminous SNe Ia, and suggest that the population of SSSs are the dominant stellar progenitors of SNe 1991T-like events. We further demonstrate that the single-degenerate channel contribution to the normal and failed 2002cx-like rates is not likely to exceed 1% of the total SNe Ia rate. We conclude with a range of observational tests of overluminous SNe Ia which will either support or strongly constrain the single-degenerate scenario

  6. Competing growth processes induced by next-nearest-neighbor interactions: Effects on meandering wavelength and stiffness

    Science.gov (United States)

    Blel, Sonia; Hamouda, Ajmi BH.; Mahjoub, B.; Einstein, T. L.

    2017-02-01

    In this paper we explore the meandering instability of vicinal steps with a kinetic Monte Carlo simulations (kMC) model including the attractive next-nearest-neighbor (NNN) interactions. kMC simulations show that increase of the NNN interaction strength leads to considerable reduction of the meandering wavelength and to weaker dependence of the wavelength on the deposition rate F. The dependences of the meandering wavelength on the temperature and the deposition rate obtained with simulations are in good quantitative agreement with the experimental result on the meandering instability of Cu(0 2 24) [T. Maroutian et al., Phys. Rev. B 64, 165401 (2001), 10.1103/PhysRevB.64.165401]. The effective step stiffness is found to depend not only on the strength of NNN interactions and the Ehrlich-Schwoebel barrier, but also on F. We argue that attractive NNN interactions intensify the incorporation of adatoms at step edges and enhance step roughening. Competition between NNN and nearest-neighbor interactions results in an alternative form of meandering instability which we call "roughening-limited" growth, rather than attachment-detachment-limited growth that governs the Bales-Zangwill instability. The computed effective wavelength and the effective stiffness behave as λeff˜F-q and β˜eff˜F-p , respectively, with q ≈p /2 .

  7. Spectrally narrowed emissions in 2,5-bis(4-biphenylyl)thiophene crystals pumped by fs laser pulse

    International Nuclear Information System (INIS)

    Kobayashi, S.; Sasaki, F.; Yanagi, H.; Hotta, S.; Ichikawa, M.; Taniguchi, Y.

    2005-01-01

    Spectrally narrowed emission (SNE) in 2,5-bis(4-biphenylyl)thiophene (BP1T) crystals is investigated using fs laser pulse. Two different types of narrowing are observed at different vibronic emission bands with increasing pump intensities. Based on their pump intensity dependence and illumination area dependence, we assign the SNE at 20,200 cm -1 (β-band) to amplified spontaneous emission (ASE) and the SNE at 21,600 cm -1 (α-band) to superfluorescence rather than ASE

  8. [Galaxy/quasar classification based on nearest neighbor method].

    Science.gov (United States)

    Li, Xiang-Ru; Lu, Yu; Zhou, Jian-Ming; Wang, Yong-Jun

    2011-09-01

    With the wide application of high-quality CCD in celestial spectrum imagery and the implementation of many large sky survey programs (e. g., Sloan Digital Sky Survey (SDSS), Two-degree-Field Galaxy Redshift Survey (2dF), Spectroscopic Survey Telescope (SST), Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST) program and Large Synoptic Survey Telescope (LSST) program, etc.), celestial observational data are coming into the world like torrential rain. Therefore, to utilize them effectively and fully, research on automated processing methods for celestial data is imperative. In the present work, we investigated how to recognizing galaxies and quasars from spectra based on nearest neighbor method. Galaxies and quasars are extragalactic objects, they are far away from earth, and their spectra are usually contaminated by various noise. Therefore, it is a typical problem to recognize these two types of spectra in automatic spectra classification. Furthermore, the utilized method, nearest neighbor, is one of the most typical, classic, mature algorithms in pattern recognition and data mining, and often is used as a benchmark in developing novel algorithm. For applicability in practice, it is shown that the recognition ratio of nearest neighbor method (NN) is comparable to the best results reported in the literature based on more complicated methods, and the superiority of NN is that this method does not need to be trained, which is useful in incremental learning and parallel computation in mass spectral data processing. In conclusion, the results in this work are helpful for studying galaxies and quasars spectra classification.

  9. Plant Clonal Integration Mediates the Horizontal Redistribution of Soil Resources, Benefiting Neighboring Plants.

    Science.gov (United States)

    Ye, Xue-Hua; Zhang, Ya-Lin; Liu, Zhi-Lan; Gao, Shu-Qin; Song, Yao-Bin; Liu, Feng-Hong; Dong, Ming

    2016-01-01

    Resources such as water taken up by plants can be released into soils through hydraulic redistribution and can also be translocated by clonal integration within a plant clonal network. We hypothesized that the resources from one (donor) microsite could be translocated within a clonal network, released into different (recipient) microsites and subsequently used by neighbor plants in the recipient microsite. To test these hypotheses, we conducted two experiments in which connected and disconnected ramet pairs of Potentilla anserina were grown under both homogeneous and heterogeneous water regimes, with seedlings of Artemisia ordosica as neighbors. The isotopes [(15)N] and deuterium were used to trace the translocation of nitrogen and water, respectively, within the clonal network. The water and nitrogen taken up by P. anserina ramets in the donor microsite were translocated into the connected ramets in the recipient microsites. Most notably, portions of the translocated water and nitrogen were released into the recipient microsite and were used by the neighboring A. ordosica, which increased growth of the neighboring A. ordosica significantly. Therefore, our hypotheses were supported, and plant clonal integration mediated the horizontal hydraulic redistribution of resources, thus benefiting neighboring plants. Such a plant clonal integration-mediated resource redistribution in horizontal space may have substantial effects on the interspecific relations and composition of the community and consequently on ecosystem processes.

  10. Embedded Control in Wearable Medical Devices: Application to the Artificial Pancreas

    Directory of Open Access Journals (Sweden)

    Stamatina Zavitsanou

    2016-09-01

    Full Text Available Significant increases in processing power, coupled with the miniaturization of processing units operating at low power levels, has motivated the embedding of modern control systems into medical devices. The design of such embedded decision-making strategies for medical applications is driven by multiple crucial factors, such as: (i guaranteed safety in the presence of exogenous disturbances and unexpected system failures; (ii constraints on computing resources; (iii portability and longevity in terms of size and power consumption; and (iv constraints on manufacturing and maintenance costs. Embedded control systems are especially compelling in the context of modern artificial pancreas systems (AP used in glucose regulation for patients with type 1 diabetes mellitus (T1DM. Herein, a review of potential embedded control strategies that can be leveraged in a fully-automated and portable AP is presented. Amongst competing controllers, emphasis is provided on model predictive control (MPC, since it has been established as a very promising control strategy for glucose regulation using the AP. Challenges involved in the design, implementation and validation of safety-critical embedded model predictive controllers for the AP application are discussed in detail. Additionally, the computational expenditure inherent to MPC strategies is investigated, and a comparative study of runtime performances and storage requirements among modern quadratic programming solvers is reported for a desktop environment and a prototype hardware platform.

  11. Embedding of MEMS pressure and temperature sensors in carbon fiber composites: a manufacturing approach

    Science.gov (United States)

    Javidinejad, Amir; Joshi, Shiv P.

    2000-06-01

    In this paper embedding of surface mount pressure and temperature sensors in the Carbon fiber composites are described. A commercially available surface mount pressure and temperature sensor are used for embedding in a composite lay- up of IM6/HST-7, IM6/3501 and AS4/E7T1-2 prepregs. The fabrication techniques developed here are the focus of this paper and provide for a successful embedding procedure of pressure sensors in fibrous composites. The techniques for positioning and insulating, the sensor and the lead wires, from the conductive carbon prepregs are described and illustrated. Procedural techniques are developed and discussed for isolating the sensor's flow-opening, from the exposure to the prepreg epoxy flow and exposure to the fibrous particles, during the autoclave curing of the composite laminate. The effects of the autoclave cycle (if any) on the operation of the embedded pressure sensor are discussed.

  12. Using K-Nearest Neighbor in Optical Character Recognition

    Directory of Open Access Journals (Sweden)

    Veronica Ong

    2016-03-01

    Full Text Available The growth in computer vision technology has aided society with various kinds of tasks. One of these tasks is the ability of recognizing text contained in an image, or usually referred to as Optical Character Recognition (OCR. There are many kinds of algorithms that can be implemented into an OCR. The K-Nearest Neighbor is one such algorithm. This research aims to find out the process behind the OCR mechanism by using K-Nearest Neighbor algorithm; one of the most influential machine learning algorithms. It also aims to find out how precise the algorithm is in an OCR program. To do that, a simple OCR program to classify alphabets of capital letters is made to produce and compare real results. The result of this research yielded a maximum of 76.9% accuracy with 200 training samples per alphabet. A set of reasons are also given as to why the program is able to reach said level of accuracy.

  13. An Improvement To The k-Nearest Neighbor Classifier For ECG Database

    Science.gov (United States)

    Jaafar, Haryati; Hidayah Ramli, Nur; Nasir, Aimi Salihah Abdul

    2018-03-01

    The k nearest neighbor (kNN) is a non-parametric classifier and has been widely used for pattern classification. However, in practice, the performance of kNN often tends to fail due to the lack of information on how the samples are distributed among them. Moreover, kNN is no longer optimal when the training samples are limited. Another problem observed in kNN is regarding the weighting issues in assigning the class label before classification. Thus, to solve these limitations, a new classifier called Mahalanobis fuzzy k-nearest centroid neighbor (MFkNCN) is proposed in this study. Here, a Mahalanobis distance is applied to avoid the imbalance of samples distribition. Then, a surrounding rule is employed to obtain the nearest centroid neighbor based on the distributions of training samples and its distance to the query point. Consequently, the fuzzy membership function is employed to assign the query point to the class label which is frequently represented by the nearest centroid neighbor Experimental studies from electrocardiogram (ECG) signal is applied in this study. The classification performances are evaluated in two experimental steps i.e. different values of k and different sizes of feature dimensions. Subsequently, a comparative study of kNN, kNCN, FkNN and MFkCNN classifier is conducted to evaluate the performances of the proposed classifier. The results show that the performance of MFkNCN consistently exceeds the kNN, kNCN and FkNN with the best classification rates of 96.5%.

  14. Embedding Complementarity in HCI Methods

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    2007-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...

  15. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very...... specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention...... and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation. Describes tools and programming models for multicore embedded systems Emphasizes throughout performance per watt scalability Discusses realistic limits of software parallelization Enables...

  16. Nearest Neighbor Networks: clustering expression data based on gene neighborhoods

    Directory of Open Access Journals (Sweden)

    Olszewski Kellen L

    2007-07-01

    Full Text Available Abstract Background The availability of microarrays measuring thousands of genes simultaneously across hundreds of biological conditions represents an opportunity to understand both individual biological pathways and the integrated workings of the cell. However, translating this amount of data into biological insight remains a daunting task. An important initial step in the analysis of microarray data is clustering of genes with similar behavior. A number of classical techniques are commonly used to perform this task, particularly hierarchical and K-means clustering, and many novel approaches have been suggested recently. While these approaches are useful, they are not without drawbacks; these methods can find clusters in purely random data, and even clusters enriched for biological functions can be skewed towards a small number of processes (e.g. ribosomes. Results We developed Nearest Neighbor Networks (NNN, a graph-based algorithm to generate clusters of genes with similar expression profiles. This method produces clusters based on overlapping cliques within an interaction network generated from mutual nearest neighborhoods. This focus on nearest neighbors rather than on absolute distance measures allows us to capture clusters with high connectivity even when they are spatially separated, and requiring mutual nearest neighbors allows genes with no sufficiently similar partners to remain unclustered. We compared the clusters generated by NNN with those generated by eight other clustering methods. NNN was particularly successful at generating functionally coherent clusters with high precision, and these clusters generally represented a much broader selection of biological processes than those recovered by other methods. Conclusion The Nearest Neighbor Networks algorithm is a valuable clustering method that effectively groups genes that are likely to be functionally related. It is particularly attractive due to its simplicity, its success in the

  17. Near Neighbor Distribution in Sets of Fractal Nature

    Czech Academy of Sciences Publication Activity Database

    Jiřina, Marcel

    2013-01-01

    Roč. 5, č. 1 (2013), s. 159-166 ISSN 2150-7988 R&D Projects: GA MŠk(CZ) LG12020 Institutional support: RVO:67985807 Keywords : nearest neighbor * fractal set * multifractal * Erlang distribution Subject RIV: BB - Applied Statistics, Operational Research http://www.mirlabs.org/ijcisim/regular_papers_2013/Paper91.pdf

  18. CLEAVAGE FRACTURE ANALYSIS OF CLADDED BEAMS WITH AN EMBEDDED FLAW UNDER FOUR-POINT BENDING

    International Nuclear Information System (INIS)

    Yin, Shengjun; Williams, Paul T; Bass, Bennett Richard

    2008-01-01

    Semi-large scale embedded flaw beams were tested at Nuclear Research Institute (NRI) Rez in the Czech Republic for the 6th Network for Evaluating Structural Components (NESC-VI) project. The experiments included, among others, a series of semi-large scale tests on cladded beam specimens containing simulated sub-clad flaws. Oak Ridge National Laboratory (ORNL) conducted numerical studies to analyze the constraint issues associated with embedded flaws using various fracture mechanics methods, including T-Stress, hydrostatic stress based QH stress, and the Weibull stress model. The recently developed local approach using the modified Weibull stress model combined with the Master Curve methodology was also utilized to predict the failure probability (Pf) of semi-large scale beams. For this study, the Weibull statistical model associated with the Master Curve methodology was employed to stochastically simulate the fracture toughness data using the available Master Curve reference temperature T0 for the tested base material from the 'aged' WWER-440 Reactor Pressure Vessel (RPV). The study was also conducted to investigate the sensitivity of predicated probability of failure of semi-large scale beams with embedded flaw with different Weibull shape parameters, m

  19. Exchange bias of Ni nanoparticles embedded in an antiferromagnetic IrMn matrix

    International Nuclear Information System (INIS)

    Kuerbanjiang, Balati; Herr, Ulrich; Wiedwald, Ulf; Haering, Felix; Ziemann, Paul; Biskupek, Johannes; Kaiser, Ute

    2013-01-01

    The magnetic properties of Ni nanoparticles (Ni-NPs) embedded in an antiferromagnetic IrMn matrix were investigated. The Ni-NPs of 8.4 nm mean diameter were synthesized by inert gas aggregation. In a second processing step, the Ni-NPs were in situ embedded in IrMn films or SiO x films under ultrahigh vacuum (UHV) conditions. Findings showed that Ni-NPs embedded in IrMn have an exchange bias field H EB = 821 Oe at 10 K, and 50 Oe at 300 K. The extracted value of the exchange energy density is 0.06 mJ m −2 at 10 K, which is in good accordance with the results from multilayered thin film systems. The Ni-NPs embedded in SiO x did not show exchange bias. As expected for this particle size, they are superparamagnetic at T = 300 K. A direct comparison of the Ni-NPs embedded in IrMn or SiO x reveals an increase of the blocking temperature from 210 K to around 400 K. The coercivity of the Ni-NPs exchange coupled to the IrMn matrix at 10 K is 8 times larger than the value for Ni-NPs embedded in SiO x . We studied time-dependent remanent magnetization at different temperatures. The relaxation behavior is described by a magnetic viscosity model which reflects a rather flat distribution of energy barriers. Furthermore, we investigated the effects of different field cooling processes on the magnetic properties of the embedded Ni-NPs. Exchange bias values fit to model calculations which correlate the contribution of the antiferromagnetic IrMn matrix to its grain size. (paper)

  20. A Novel Preferential Diffusion Recommendation Algorithm Based on User’s Nearest Neighbors

    Directory of Open Access Journals (Sweden)

    Fuguo Zhang

    2017-01-01

    Full Text Available Recommender system is a very efficient way to deal with the problem of information overload for online users. In recent years, network based recommendation algorithms have demonstrated much better performance than the standard collaborative filtering methods. However, most of network based algorithms do not give a high enough weight to the influence of the target user’s nearest neighbors in the resource diffusion process, while a user or an object with high degree will obtain larger influence in the standard mass diffusion algorithm. In this paper, we propose a novel preferential diffusion recommendation algorithm considering the significance of the target user’s nearest neighbors and evaluate it in the three real-world data sets: MovieLens 100k, MovieLens 1M, and Epinions. Experiments results demonstrate that the novel preferential diffusion recommendation algorithm based on user’s nearest neighbors can significantly improve the recommendation accuracy and diversity.

  1. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  2. Advances in embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2014-01-01

    This illuminating collection offers a fresh look at the very latest advances in the field of embedded computer vision. Emerging areas covered by this comprehensive text/reference include the embedded realization of 3D vision technologies for a variety of applications, such as stereo cameras on mobile devices. Recent trends towards the development of small unmanned aerial vehicles (UAVs) with embedded image and video processing algorithms are also examined. The authoritative insights range from historical perspectives to future developments, reviewing embedded implementation, tools, technolog

  3. An embedded face-classification system for infrared images on an FPGA

    Science.gov (United States)

    Soto, Javier E.; Figueroa, Miguel

    2014-10-01

    We present a face-classification architecture for long-wave infrared (IR) images implemented on a Field Programmable Gate Array (FPGA). The circuit is fast, compact and low power, can recognize faces in real time and be embedded in a larger image-processing and computer vision system operating locally on an IR camera. The algorithm uses Local Binary Patterns (LBP) to perform feature extraction on each IR image. First, each pixel in the image is represented as an LBP pattern that encodes the similarity between the pixel and its neighbors. Uniform LBP codes are then used to reduce the number of patterns to 59 while preserving more than 90% of the information contained in the original LBP representation. Then, the image is divided into 64 non-overlapping regions, and each region is represented as a 59-bin histogram of patterns. Finally, the algorithm concatenates all 64 regions to create a 3,776-bin spatially enhanced histogram. We reduce the dimensionality of this histogram using Linear Discriminant Analysis (LDA), which improves clustering and enables us to store an entire database of 53 subjects on-chip. During classification, the circuit applies LBP and LDA to each incoming IR image in real time, and compares the resulting feature vector to each pattern stored in the local database using the Manhattan distance. We implemented the circuit on a Xilinx Artix-7 XC7A100T FPGA and tested it with the UCHThermalFace database, which consists of 28 81 x 150-pixel images of 53 subjects in indoor and outdoor conditions. The circuit achieves a 98.6% hit ratio, trained with 16 images and tested with 12 images of each subject in the database. Using a 100 MHz clock, the circuit classifies 8,230 images per second, and consumes only 309mW.

  4. Embedded Ag Grid Electrodes as Current Collector for Ultraflexible Transparent Solid-State Supercapacitor.

    Science.gov (United States)

    Xu, Jian-Long; Liu, Yan-Hua; Gao, Xu; Sun, Yilin; Shen, Su; Cai, Xinlei; Chen, Linsen; Wang, Sui-Dong

    2017-08-23

    Flexible transparent solid-state supercapacitors have attracted immerse attention for the power supply of next-generation flexible "see-through" or "invisible" electronics. For fabrication of such devices, high-performance flexible transparent current collectors are highly desired. In this paper, the utilization of embedded Ag grid transparent conductive electrodes (TCEs) fabricated by a facile soft ultraviolet imprinting lithography method combined with scrap techniques, as the current collector for flexible transparent solid-state supercapacitors, is demonstrated. The embedded Ag grid TCEs exhibit not only excellent optoelectronic properties (R S ∼ 2.0 Ω sq -1 and T ∼ 89.74%) but also robust mechanical properties, which could meet the conductivity, transparency, and flexibility needs of current collectors for flexible transparent supercapacitors. The obtained supercapacitor exhibits large specific capacitance, long cycling life, high optical transparency (T ∼ 80.58% at 550 nm), high flexibility, and high stability. Owing to the embedded Ag grid TCE structure, the device shows a slight capacitance loss of 2.6% even after 1000 cycles of repetitive bending for a bending radius of up to 2.0 mm. This paves the way for developing high-performance current collectors and thus flexible transparent energy storage devices, and their general applicability opens up opportunities for flexible transparent electronics.

  5. Neighbor discovery in multi-hop wireless networks: evaluation and dimensioning with interferences considerations

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2008-04-01

    Full Text Available In this paper, we study the impact of collisions and interferences on a neighbor discovery process in the context of multi-hop wireless networks. We consider three models in which interferences and collisions are handled in very different ways. From an ideal channel where simultaneous transmissions do not interfere, we derive an alternate channel where simultaneous transmissions are considered two-by-two under the form of collisions, to finally reach a more realistic channel where simultaneous transmissions are handled under the form of shot-noise interferences. In these models, we analytically compute the link probability success between two neighbors as well as the expected number of nodes that correctly receive a Hello packet. Using this analysis, we show that if the neighbor discovery process is asymptotically equivalent in the three models, it offers very different behaviors locally in time. In particular, the scalability of the process is not the same depending on the way interferences are handled. Finally, we apply our results to the dimensioning of a Hello protocol parameters. We propose a method to adapt the protocol parameters to meet application constraints on the neighbor discovery process and to minimize the protocol energy consumption.

  6. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  7. A 4-kbit low-cost antifuse one-time programmable memory macro for embedded applications

    International Nuclear Information System (INIS)

    Li Xian; Zhong Huicai; Jia Cheng; Li Xin

    2014-01-01

    A 4-kbit low-cost one-time programmable (OTP) memory macro for embedded applications is designed and implemented in a 0.18-μm standard CMOS process. The area of the proposed 1.5 transistor (1.5T) OTP cell is 2.13 μm 2 , which is a 49.3% size reduction compared to the previously reported cells. The 1.5T cell is fabricated and measured and shows a large programming window without any disturbance. A novel high voltage switch (HVSW) circuit is also proposed to make sure the OTP macro, implemented in a standard CMOS process, works reliably with the high program voltage. The OTP macro is embedded in negative radio frequency identification (RFID) tags. The full chip size, including the analog front-end, digital controller and the 4-kbit OTP macro, is 600 × 600 μm 2 . The 4-kbit OTP macro only consumes 200 × 260 μm 2 . The measurement shows a 100% program yield by adjusting the program time and has obvious advantages in the core area and power consumption compared to the reported 3T and 2T OTP cores. (semiconductor integrated circuits)

  8. Velocity correlations and spatial dependencies between neighbors in a unidirectional flow of pedestrians

    Science.gov (United States)

    Porzycki, Jakub; WÄ s, Jarosław; Hedayatifar, Leila; Hassanibesheli, Forough; Kułakowski, Krzysztof

    2017-08-01

    The aim of the paper is an analysis of self-organization patterns observed in the unidirectional flow of pedestrians. On the basis of experimental data from Zhang et al. [J. Zhang et al., J. Stat. Mech. (2011) P06004, 10.1088/1742-5468/2011/06/P06004], we analyze the mutual positions and velocity correlations between pedestrians when walking along a corridor. The angular and spatial dependencies of the mutual positions reveal a spatial structure that remains stable during the crowd motion. This structure differs depending on the value of n , for the consecutive n th -nearest-neighbor position set. The preferred position for the first-nearest neighbor is on the side of the pedestrian, while for further neighbors, this preference shifts to the axis of movement. The velocity correlations vary with the angle formed by the pair of neighboring pedestrians and the direction of motion and with the time delay between pedestrians' movements. The delay dependence of the correlations shows characteristic oscillations, produced by the velocity oscillations when striding; however, a filtering of the main frequency of individual striding out reduces the oscillations only partially. We conclude that pedestrians select their path directions so as to evade the necessity of continuously adjusting their speed to their neighbors'. They try to keep a given distance, but follow the person in front of them, as well as accepting and observing pedestrians on their sides. Additionally, we show an empirical example that illustrates the shape of a pedestrian's personal space during movement.

  9. Error Analysis for RADAR Neighbor Matching Localization in Linear Logarithmic Strength Varying Wi-Fi Environment

    Directory of Open Access Journals (Sweden)

    Mu Zhou

    2014-01-01

    Full Text Available This paper studies the statistical errors for the fingerprint-based RADAR neighbor matching localization with the linearly calibrated reference points (RPs in logarithmic received signal strength (RSS varying Wi-Fi environment. To the best of our knowledge, little comprehensive analysis work has appeared on the error performance of neighbor matching localization with respect to the deployment of RPs. However, in order to achieve the efficient and reliable location-based services (LBSs as well as the ubiquitous context-awareness in Wi-Fi environment, much attention has to be paid to the highly accurate and cost-efficient localization systems. To this end, the statistical errors by the widely used neighbor matching localization are significantly discussed in this paper to examine the inherent mathematical relations between the localization errors and the locations of RPs by using a basic linear logarithmic strength varying model. Furthermore, based on the mathematical demonstrations and some testing results, the closed-form solutions to the statistical errors by RADAR neighbor matching localization can be an effective tool to explore alternative deployment of fingerprint-based neighbor matching localization systems in the future.

  10. Error Analysis for RADAR Neighbor Matching Localization in Linear Logarithmic Strength Varying Wi-Fi Environment

    Science.gov (United States)

    Tian, Zengshan; Xu, Kunjie; Yu, Xiang

    2014-01-01

    This paper studies the statistical errors for the fingerprint-based RADAR neighbor matching localization with the linearly calibrated reference points (RPs) in logarithmic received signal strength (RSS) varying Wi-Fi environment. To the best of our knowledge, little comprehensive analysis work has appeared on the error performance of neighbor matching localization with respect to the deployment of RPs. However, in order to achieve the efficient and reliable location-based services (LBSs) as well as the ubiquitous context-awareness in Wi-Fi environment, much attention has to be paid to the highly accurate and cost-efficient localization systems. To this end, the statistical errors by the widely used neighbor matching localization are significantly discussed in this paper to examine the inherent mathematical relations between the localization errors and the locations of RPs by using a basic linear logarithmic strength varying model. Furthermore, based on the mathematical demonstrations and some testing results, the closed-form solutions to the statistical errors by RADAR neighbor matching localization can be an effective tool to explore alternative deployment of fingerprint-based neighbor matching localization systems in the future. PMID:24683349

  11. Study of interface influence on bending performance of CFRP with embedded optical fibers

    Science.gov (United States)

    Liu, Rong-mei; Liang, Da-kai

    2008-11-01

    Studies showed that the bending strength of composite would be affected by embedded optical fibers. Interface strength between the embedded optical fiber and the matrix was studied in this paper. Based on the single fiber pull out tests, the interfacial shear strength between the coating and the clad is the weakest. The shear strength of the optical fiber used in this study is near to 0.8MPa. In order to study the interfacial effect on bending property of generic smart structure, a quasi-isotropic composite laminates were produced from Toray T300C/ epoxy prepreg. Optical fibers were embedded within different orientation plies of the plates, with the optical fibers embedded in the same direction. Accordingly, five different types of plates were produced. Impact tests were carried out on the 5 different plate types. It is shown that when the fiber was embedded at the upper layer, the bending strength drops mostly. The bending normal stress on material arrives at the maximum. So does the normal stress applied on the optical fiber at the surface. Therefore, destructions could originate at the interface between the coating and the clad foremost. The ultimate strength of the smart structure will be affected furthest.

  12. Pneumatic artificial rubber muscle using shape-memory polymer sheet with embedded electrical heating wire

    International Nuclear Information System (INIS)

    Takashima, Kazuto; Sugitani, Kazuhiro; Morimoto, Naohiro; Sakaguchi, Seiya; Noritsugu, Toshiro; Mukai, Toshiharu

    2014-01-01

    Shape-memory polymer (SMP) can be deformed by applying a small load above its glass transition temperature (T g ). Shape-memory polymer maintains its shape after it has cooled below T g and returns to a predefined shape when subsequently heated above T g . The reversible change in the elastic modulus between the glassy and rubbery states of an SMP can be on the order of several hundred times. Based on the change in stiffness of the SMP in relation to the change in temperature, the present study attempts to evaluate the application of the SMP to soft actuators of a robot. In order to control the temperature of the SMP, we developed an SMP sheet with an embedded electrical heating wire. We formed a uniform, thin SMP sheet without air bubbles using a heat press. The SMP sheet with a heating wire can be heated quickly and can be maintained at a constant temperature. Moreover, the effects of the embedded wire on the mechanical properties in bending and tensile tests were small. Then, we applied the SMP sheet with the embedded electrical heating wire to a pneumatic artificial rubber muscle. The enhanced versatility of SMP sheet applications is demonstrated through a series of experiments conducted using a prototype. The initial shape and bending displacement of the pneumatic artificial rubber muscle can be changed by controlling the temperature of the SMP sheet. (paper)

  13. ACTION RECOGNITION USING SALIENT NEIGHBORING HISTOGRAMS

    DEFF Research Database (Denmark)

    Ren, Huamin; Moeslund, Thomas B.

    2013-01-01

    Combining spatio-temporal interest points with Bag-of-Words models achieves state-of-the-art performance in action recognition. However, existing methods based on “bag-ofwords” models either are too local to capture the variance in space/time or fail to solve the ambiguity problem in spatial...... and temporal dimensions. Instead, we propose a salient vocabulary construction algorithm to select visual words from a global point of view, and form compact descriptors to represent discriminative histograms in the neighborhoods. Those salient neighboring histograms are then trained to model different actions...

  14. Proposed Embedded Security Framework for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives...

  15. Belowground neighbor perception in Arabidopsis thaliana studied by transcriptome analysis: roots of Hieracium pilosella cause biotic stress

    Directory of Open Access Journals (Sweden)

    Christoph eSchmid

    2013-08-01

    Full Text Available Root-root interactions are much more sophisticated than previously thought, yet the mechanisms of belowground neighbor perception remain largely obscure. Genome-wide transcriptome analyses allow detailed insight into plant reactions to environmental cues.A root interaction trial was set up to explore both morphological and whole genome transcriptional responses in roots of Arabidopsis thaliana in the presence or absence of an inferior competitor, Hieracium pilosella.Neighbor perception was indicated by Arabidopsis roots predominantly growing away from the neighbor (segregation, while solitary plants placed more roots towards the middle of the pot. Total biomass remained unaffected. Database comparisons in transcriptome analysis revealed considerable similarity between Arabidopsis root reactions to neighbors and reactions to pathogens. Detailed analyses of the functional category ‘biotic stress’ using MapMan tools found the sub-category ‘pathogenesis-related proteins’ highly significantly induced. A comparison to a study on intraspecific competition brought forward a core of genes consistently involved in reactions to neighbor roots.We conclude that beyond resource depletion roots perceive neighboring roots or their associated microorganisms by a relatively uniform mechanism that involves the strong induction of pathogenesis-related proteins. In an ecological context the findings reveal that belowground neighbor detection may occur independently of resource depletion, allowing for a time advantage for the root to prepare for potential interactions.

  16. Electronics for embedded systems

    CERN Document Server

    Bindal, Ahmet

    2017-01-01

    This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bipolar transistor circuits, the state-of-the-art CMOS logic family and its interface with older logic families such as TTL, sensors and sensor physics, operational amplifier circuits to condition sensor signals, data converters and various circuits used in electro-mechanical device control in embedded systems. The book also provides numerous hardware design examples by integrating the topics learned in earlier chapters. The last chapter extensively reviews the combinational and sequential logic design principles to be able to design the digital part of embedded system hardware.

  17. Brauer type embedding problems

    CERN Document Server

    Ledet, Arne

    2005-01-01

    This monograph is concerned with Galois theoretical embedding problems of so-called Brauer type with a focus on 2-groups and on finding explicit criteria for solvability and explicit constructions of the solutions. The advantage of considering Brauer type embedding problems is their comparatively simple condition for solvability in the form of an obstruction in the Brauer group of the ground field. This book presupposes knowledge of classical Galois theory and the attendant algebra. Before considering questions of reducing the embedding problems and reformulating the solvability criteria, the

  18. Embedded Systems Design with FPGAs

    CERN Document Server

    Pnevmatikatos, Dionisios; Sklavos, Nicolas

    2013-01-01

    This book presents methodologies for modern applications of embedded systems design, using field programmable gate array (FPGA) devices.  Coverage includes state-of-the-art research from academia and industry on a wide range of topics, including advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration and applications. Describes a variety of methodologies for modern embedded systems design;  Implements methodologies presented on FPGAs; Covers a wide variety of applications for reconfigurable embedded systems, including Bioinformatics, Communications and networking, Application acceleration, Medical solutions, Experiments for high energy physics, Astronomy, Aerospace, Biologically inspired systems and Computational fluid dynamics (CFD).

  19. Permutation entropy with vector embedding delays

    Science.gov (United States)

    Little, Douglas J.; Kane, Deb M.

    2017-12-01

    Permutation entropy (PE) is a statistic used widely for the detection of structure within a time series. Embedding delay times at which the PE is reduced are characteristic timescales for which such structure exists. Here, a generalized scheme is investigated where embedding delays are represented by vectors rather than scalars, permitting PE to be calculated over a (D -1 ) -dimensional space, where D is the embedding dimension. This scheme is applied to numerically generated noise, sine wave and logistic map series, and experimental data sets taken from a vertical-cavity surface emitting laser exhibiting temporally localized pulse structures within the round-trip time of the laser cavity. Results are visualized as PE maps as a function of embedding delay, with low PE values indicating combinations of embedding delays where correlation structure is present. It is demonstrated that vector embedding delays enable identification of structure that is ambiguous or masked, when the embedding delay is constrained to scalar form.

  20. Grain price spikes and beggar-thy-neighbor policy responses

    DEFF Research Database (Denmark)

    Boysen, Ole; Jensen, Hans Grinsted

    on the agenda of various international policy fora, including the annual meetings of G20 countries in recent years. For that reason, recent studies have attempted to quantify the extent to which such policy actions contributed to the rise in food prices. A study by Jensen & Anderson (2014) uses the global AGE...... model GTAP and the corresponding database to quantify the global policy actions contributions to the raise in food prices by modeling the changes in distortions to agricultural incentives in the period 2006 to 2008. We link the results from this global model into a national AGE model, highlighting how...... global "Beggar-thy-Neighbor Policy Responses" impacted on poor households in Uganda. More specifically we examine the following research questions: What were the Ugandan economy-wide and poverty impacts of the price spikes? What was the impact of other countries "Beggar-thy-Neighbor Policy Responses...

  1. Low-temperature specific heat of the degenerate supersymmetric t-J model in one dimension

    International Nuclear Information System (INIS)

    Lee, K.; Schlottmann, P.

    1996-01-01

    We consider the one-dimensional SU(N)-invariant t-J model, which consists of electrons with N spin components on a lattice with nearest-neighbor hopping t constrained by the excluded multiple occupancy of the sites and spin-exchange J between neighboring lattice sites. The model is integrable and has been diagonalized in terms of nested Bethe ansatze at the supersymmetric point t=J. The low-T specific heat is proportional to T. The γ-coefficient is extracted from the thermodynamic Bethe-ansatz equations and is expressed in terms of the spin wave velocities and the group velocity of the charges for arbitrary N, band filling, and splitting of the levels (magnetic and crystalline fields). Our results contain the following special cases: (i) For N=2 the traditional spin-1/2 supersymmetric t-J model, (ii) for exactly one electron per site the SU(N)-Heisenberg chain, and (iii) for N=4 the two-band supersymmetric t-J model with crystalline field splitting. copyright 1996 American Institute of Physics

  2. Collective Behaviors of Mobile Robots Beyond the Nearest Neighbor Rules With Switching Topology.

    Science.gov (United States)

    Ning, Boda; Han, Qing-Long; Zuo, Zongyu; Jin, Jiong; Zheng, Jinchuan

    2018-05-01

    This paper is concerned with the collective behaviors of robots beyond the nearest neighbor rules, i.e., dispersion and flocking, when robots interact with others by applying an acute angle test (AAT)-based interaction rule. Different from a conventional nearest neighbor rule or its variations, the AAT-based interaction rule allows interactions with some far-neighbors and excludes unnecessary nearest neighbors. The resulting dispersion and flocking hold the advantages of scalability, connectivity, robustness, and effective area coverage. For the dispersion, a spring-like controller is proposed to achieve collision-free coordination. With switching topology, a new fixed-time consensus-based energy function is developed to guarantee the system stability. An upper bound of settling time for energy consensus is obtained, and a uniform time interval is accordingly set so that energy distribution is conducted in a fair manner. For the flocking, based on a class of generalized potential functions taking nonsmooth switching into account, a new controller is proposed to ensure that the same velocity for all robots is eventually reached. A co-optimizing problem is further investigated to accomplish additional tasks, such as enhancing communication performance, while maintaining the collective behaviors of mobile robots. Simulation results are presented to show the effectiveness of the theoretical results.

  3. The Influence of Neighbor Effect and Urbanization Toward Organ Donation in Thailand.

    Science.gov (United States)

    Wongboonsin, Kua; Jindahra, Pavitra; Teerakapibal, Surat

    2018-03-01

    Toward population wellness, an extreme scarcity of organ supply is proven to be an enormous hindrance. Preferences toward organ donation are vital to raise the organ donation rate. Notably, the area people live in can address the social influence on individual preference toward organ donation. This article studies the impact of the neighbor effect on organ donation decisions, addressing the social influence of urbanization on preferences. How neighborhood-specific variables, population density, and socioeconomic status drive the neighbor effect is investigated. The pursuit of organ donor traits is to be answered. The study uses organ donation interview survey data and neighborhood-specific data from Thailand to estimate a series of logistic regression models. Individuals residing in urban areas exhibit a greater likelihood to sign the donor card than those in rural areas. The neighborhood socioeconomic status is the key driver. An individual is more willing to be an organ donor when having neighbors with higher socioeconomic statuses. Results also reveal positive influences of males and education on the organ donation rate. This article documents the "neighbor effect" on the organ donation decision via living area type, offering an alternative exposition in raising the organ donation rate. In shifting the society norm toward organ donation consent, policy-makers should acknowledge the benefit of urbanization on organ donation decision derived from resourceful urban areas. Moreover, raising education levels does improve not only citizens' well-being but also their tendency to exhibit an altruistic act toward others.

  4. The influence of neighbors' family size preference on progression to high parity births in rural Nepal.

    Science.gov (United States)

    Jennings, Elyse A; Barber, Jennifer S

    2013-03-01

    Large families can have a negative impact on the health and well-being of women, children, and their communities. Seventy-three percent of the individuals in our rural Nepalese sample report that two children is their ideal number, yet about half of the married women continue childbearing after their second child. Using longitudinal data from the Chitwan Valley Family Study, we explore the influence of women's and neighbors' family size preferences on women's progression to high parity births, comparing this influence across two cohorts. We find that neighbors' family size preferences influence women's fertility, that older cohorts of women are more influenced by their neighbors' preferences than are younger cohorts of women, and that the influence of neighbors' preferences is independent of women's own preferences. © 2013 The Population Council, Inc.

  5. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where ve...

  6. Reentrant behavior in the nearest-neighbor Ising antiferromagnet in a magnetic field

    Science.gov (United States)

    Neto, Minos A.; de Sousa, J. Ricardo

    2004-12-01

    Motived by the H-T phase diagram in the bcc Ising antiferromagnetic with nearest-neighbor interactions obtained by Monte Carlo simulation [Landau, Phys. Rev. B 16, 4164 (1977)] that shows a reentrant behavior at low temperature, with two critical temperatures in magnetic field about 2% greater than the critical value Hc=8J , we apply the effective field renormalization group (EFRG) approach in this model on three-dimensional lattices (simple cubic-sc and body centered cubic-bcc). We find that the critical curve TN(H) exhibits a maximum point around of H≃Hc only in the bcc lattice case. We also discuss the critical behavior by the effective field theory in clusters with one (EFT-1) and two (EFT-2) spins, and a reentrant behavior is observed for the sc and bcc lattices. We have compared our results of EFRG in the bcc lattice with Monte Carlo and series expansion, and we observe a good accordance between the methods.

  7. Experimental study of reinforced concrete pile caps with external, embedded and partially embedded socket with smooth interface

    Directory of Open Access Journals (Sweden)

    R. Barros

    Full Text Available On Precast concrete structures the column foundation connections can occur through the socket foundation, which can be embedded, partially embedded or external, with socket walls over the pile caps. This paper presents an experimental study about two pile caps reinforced concrete with external, partially embedded and embedded socket submitted to central load, using 1:2 scaled models. In the analyzed models, the smooth interface between the socket walls and column was considered. The results are compared to a reference model that presents monolithic connections between the column and pile cap. It is observed that the ultimate load of pile cap with external sockets has the same magnitude as the reference pile cap, but the ultimate load of models with partially embedded and embedded socket present less magnitude than the reference model.

  8. Clustered K nearest neighbor algorithm for daily inflow forecasting

    NARCIS (Netherlands)

    Akbari, M.; Van Overloop, P.J.A.T.M.; Afshar, A.

    2010-01-01

    Instance based learning (IBL) algorithms are a common choice among data driven algorithms for inflow forecasting. They are based on the similarity principle and prediction is made by the finite number of similar neighbors. In this sense, the similarity of a query instance is estimated according to

  9. Contrasting demographic histories of the neighboring bonobo and chimpanzee

    DEFF Research Database (Denmark)

    Hvilsom, Christina; Carlsen, Frands; Heller, Rasmus

    2014-01-01

    of the neighboring bonobo remained constant. The changes in population size are likely linked to changes in habitat area due to climate oscillations during the late Pleistocene. Furthermore, the timing of population expansion for the rainforest-adapted chimpanzee is concurrent with the expansion of the savanna...

  10. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  11. Poincare ball embeddings of the optical geometry

    International Nuclear Information System (INIS)

    Abramowicz, M A; Bengtsson, I; Karas, V; Rosquist, K

    2002-01-01

    It is shown that the optical geometry of the Reissner-Nordstroem exterior metric can be embedded in a hyperbolic space all the way down to its outer horizon. The adopted embedding procedure removes a breakdown of flat-space embeddings which occurs outside the horizon, at and below the Buchdahl-Bondi limit (R/M=9/4 in the Schwarzschild case). In particular, the horizon can be captured in the optical geometry embedding diagram. Moreover, by using the compact Poincare ball representation of the hyperbolic space, the embedding diagram can cover the whole extent of radius from spatial infinity down to the horizon. Attention is drawn to the advantages of such embeddings in an appropriately curved space: this approach gives compact embeddings and it clearly distinguishes the case of an extremal black hole from a non-extremal one in terms of the topology of the embedded horizon

  12. Homomorphic embeddings in n-groups

    Directory of Open Access Journals (Sweden)

    Mona Cristescu

    2013-06-01

    Full Text Available We prove that an cancellative n-groupoid A can be homotopic embedded in an n-group if and only if in A are satisfied all n-ary Malcev conditions. Now we shall prove that in the presence of associative law we obtain homomorphic embeddings. Furthermore, if A has a lateral identity a such embeddings is assured by a subset of n-ary Malcev conditions - unary Malcev conditions.

  13. Neighbor-dependent Ramachandran probability distributions of amino acids developed from a hierarchical Dirichlet process model.

    Directory of Open Access Journals (Sweden)

    Daniel Ting

    2010-04-01

    Full Text Available Distributions of the backbone dihedral angles of proteins have been studied for over 40 years. While many statistical analyses have been presented, only a handful of probability densities are publicly available for use in structure validation and structure prediction methods. The available distributions differ in a number of important ways, which determine their usefulness for various purposes. These include: 1 input data size and criteria for structure inclusion (resolution, R-factor, etc.; 2 filtering of suspect conformations and outliers using B-factors or other features; 3 secondary structure of input data (e.g., whether helix and sheet are included; whether beta turns are included; 4 the method used for determining probability densities ranging from simple histograms to modern nonparametric density estimation; and 5 whether they include nearest neighbor effects on the distribution of conformations in different regions of the Ramachandran map. In this work, Ramachandran probability distributions are presented for residues in protein loops from a high-resolution data set with filtering based on calculated electron densities. Distributions for all 20 amino acids (with cis and trans proline treated separately have been determined, as well as 420 left-neighbor and 420 right-neighbor dependent distributions. The neighbor-independent and neighbor-dependent probability densities have been accurately estimated using Bayesian nonparametric statistical analysis based on the Dirichlet process. In particular, we used hierarchical Dirichlet process priors, which allow sharing of information between densities for a particular residue type and different neighbor residue types. The resulting distributions are tested in a loop modeling benchmark with the program Rosetta, and are shown to improve protein loop conformation prediction significantly. The distributions are available at http://dunbrack.fccc.edu/hdp.

  14. Density functional theory embedding for correlated wavefunctions: improved methods for open-shell systems and transition metal complexes.

    Science.gov (United States)

    Goodpaster, Jason D; Barnes, Taylor A; Manby, Frederick R; Miller, Thomas F

    2012-12-14

    Density functional theory (DFT) embedding provides a formally exact framework for interfacing correlated wave-function theory (WFT) methods with lower-level descriptions of electronic structure. Here, we report techniques to improve the accuracy and stability of WFT-in-DFT embedding calculations. In particular, we develop spin-dependent embedding potentials in both restricted and unrestricted orbital formulations to enable WFT-in-DFT embedding for open-shell systems, and develop an orbital-occupation-freezing technique to improve the convergence of optimized effective potential calculations that arise in the evaluation of the embedding potential. The new techniques are demonstrated in applications to the van-der-Waals-bound ethylene-propylene dimer and to the hexa-aquairon(II) transition-metal cation. Calculation of the dissociation curve for the ethylene-propylene dimer reveals that WFT-in-DFT embedding reproduces full CCSD(T) energies to within 0.1 kcal/mol at all distances, eliminating errors in the dispersion interactions due to conventional exchange-correlation (XC) functionals while simultaneously avoiding errors due to subsystem partitioning across covalent bonds. Application of WFT-in-DFT embedding to the calculation of the low-spin/high-spin splitting energy in the hexaaquairon(II) cation reveals that the majority of the dependence on the DFT XC functional can be eliminated by treating only the single transition-metal atom at the WFT level; furthermore, these calculations demonstrate the substantial effects of open-shell contributions to the embedding potential, and they suggest that restricted open-shell WFT-in-DFT embedding provides better accuracy than unrestricted open-shell WFT-in-DFT embedding due to the removal of spin contamination.

  15. Quality and efficiency in high dimensional Nearest neighbor search

    KAUST Repository

    Tao, Yufei; Yi, Ke; Sheng, Cheng; Kalnis, Panos

    2009-01-01

    Nearest neighbor (NN) search in high dimensional space is an important problem in many applications. Ideally, a practical solution (i) should be implementable in a relational database, and (ii) its query cost should grow sub-linearly with the dataset size, regardless of the data and query distributions. Despite the bulk of NN literature, no solution fulfills both requirements, except locality sensitive hashing (LSH). The existing LSH implementations are either rigorous or adhoc. Rigorous-LSH ensures good quality of query results, but requires expensive space and query cost. Although adhoc-LSH is more efficient, it abandons quality control, i.e., the neighbor it outputs can be arbitrarily bad. As a result, currently no method is able to ensure both quality and efficiency simultaneously in practice. Motivated by this, we propose a new access method called the locality sensitive B-tree (LSB-tree) that enables fast highdimensional NN search with excellent quality. The combination of several LSB-trees leads to a structure called the LSB-forest that ensures the same result quality as rigorous-LSH, but reduces its space and query cost dramatically. The LSB-forest also outperforms adhoc-LSH, even though the latter has no quality guarantee. Besides its appealing theoretical properties, the LSB-tree itself also serves as an effective index that consumes linear space, and supports efficient updates. Our extensive experiments confirm that the LSB-tree is faster than (i) the state of the art of exact NN search by two orders of magnitude, and (ii) the best (linear-space) method of approximate retrieval by an order of magnitude, and at the same time, returns neighbors with much better quality. © 2009 ACM.

  16. Protein function prediction using neighbor relativity in protein-protein interaction network.

    Science.gov (United States)

    Moosavi, Sobhan; Rahgozar, Masoud; Rahimi, Amir

    2013-04-01

    There is a large gap between the number of discovered proteins and the number of functionally annotated ones. Due to the high cost of determining protein function by wet-lab research, function prediction has become a major task for computational biology and bioinformatics. Some researches utilize the proteins interaction information to predict function for un-annotated proteins. In this paper, we propose a novel approach called "Neighbor Relativity Coefficient" (NRC) based on interaction network topology which estimates the functional similarity between two proteins. NRC is calculated for each pair of proteins based on their graph-based features including distance, common neighbors and the number of paths between them. In order to ascribe function to an un-annotated protein, NRC estimates a weight for each neighbor to transfer its annotation to the unknown protein. Finally, the unknown protein will be annotated by the top score transferred functions. We also investigate the effect of using different coefficients for various types of functions. The proposed method has been evaluated on Saccharomyces cerevisiae and Homo sapiens interaction networks. The performance analysis demonstrates that NRC yields better results in comparison with previous protein function prediction approaches that utilize interaction network. Copyright © 2012 Elsevier Ltd. All rights reserved.

  17. ANN-Benchmarks: A Benchmarking Tool for Approximate Nearest Neighbor Algorithms

    DEFF Research Database (Denmark)

    Aumüller, Martin; Bernhardsson, Erik; Faithfull, Alexander

    2017-01-01

    This paper describes ANN-Benchmarks, a tool for evaluating the performance of in-memory approximate nearest neighbor algorithms. It provides a standard interface for measuring the performance and quality achieved by nearest neighbor algorithms on different standard data sets. It supports several...... visualise these as images, Open image in new window plots, and websites with interactive plots. ANN-Benchmarks aims to provide a constantly updated overview of the current state of the art of k-NN algorithms. In the short term, this overview allows users to choose the correct k-NN algorithm and parameters...... for their similarity search task; in the longer term, algorithm designers will be able to use this overview to test and refine automatic parameter tuning. The paper gives an overview of the system, evaluates the results of the benchmark, and points out directions for future work. Interestingly, very different...

  18. What Will the Neighbors Think? Building Large-Scale Science Projects Around the World

    International Nuclear Information System (INIS)

    Jones, Craig; Mrotzek, Christian; Toge, Nobu; Sarno, Doug

    2007-01-01

    Public participation is an essential ingredient for turning the International Linear Collider into a reality. Wherever the proposed particle accelerator is sited in the world, its neighbors -- in any country -- will have something to say about hosting a 35-kilometer-long collider in their backyards. When it comes to building large-scale physics projects, almost every laboratory has a story to tell. Three case studies from Japan, Germany and the US will be presented to examine how community relations are handled in different parts of the world. How do particle physics laboratories interact with their local communities? How do neighbors react to building large-scale projects in each region? How can the lessons learned from past experiences help in building the next big project? These and other questions will be discussed to engage the audience in an active dialogue about how a large-scale project like the ILC can be a good neighbor.

  19. THE FIRST SYSTEMATIC STUDY OF TYPE Ibc SUPERNOVA MULTI-BAND LIGHT CURVES

    International Nuclear Information System (INIS)

    Drout, Maria R.; Soderberg, Alicia M.; Gal-Yam, Avishay; Arcavi, Iair; Green, Yoav; Cenko, S. Bradley; Fox, Derek B.; Leonard, Douglas C.; Sand, David J.; Moon, Dae-Sik

    2011-01-01

    We present detailed optical photometry for 25 Type Ibc supernovae (SNe Ibc) within d ≈ 150 Mpc obtained with the robotic Palomar 60 inch telescope in 2004-2007. This study represents the first uniform, systematic, and statistical sample of multi-band SNe Ibc light curves available to date. We correct the light curves for host galaxy extinction using a new technique based on the photometric color evolution, namely, we show that the (V – R) color of extinction-corrected SNe Ibc at Δt ≈ 10 days after V-band maximum is tightly distributed, ((V – R) V10 ) = 0.26 ± 0.06 mag. Using this technique, we find that SNe Ibc typically suffer from significant host galaxy extinction, (E(B – V)) ≈ 0.4 mag. A comparison of the extinction-corrected light curves for helium-rich (Type Ib) and helium-poor (Type Ic) SNe reveals that they are statistically indistinguishable, both in luminosity and decline rate. We report peak absolute magnitudes of (M R ) = –17.9 ± 0.9 mag and (M R ) = –18.3 ± 0.6 mag for SNe Ib and Ic, respectively. Focusing on the broad-lined (BL) SNe Ic, we find that they are more luminous than the normal SNe Ibc sample, (M R ) = –19.0 ± 1.1 mag, with a probability of only 1.6% that they are drawn from the same population of explosions. By comparing the peak absolute magnitudes of SNe Ic-BL with those inferred for local engine-driven explosions (GRB-SN 1998bw, XRF-SN 2006aj, and SN 2009bb) we find a 25% probability that relativistic SNe are drawn from the overall SNe Ic-BL population. Finally, we fit analytic models to the light curves to derive typical 56 Ni masses of M Ni ≈ 0.2 and 0.5 M ☉ for SNe Ibc and SNe Ic-BL, respectively. With reasonable assumptions for the photospheric velocities, we further extract kinetic energy and ejecta mass values of M ej ≈ 2 M ☉ and E K ≈ 10 51 erg for SNe Ibc, while for SNe Ic-BL we find higher values, M ej ≈ 5 M ☉ and E K ≈ 10 52 erg. We discuss the implications for the progenitors of SNe Ibc

  20. Embedded Linux projects using Yocto project cookbook

    CERN Document Server

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  1. Reconstruction of the interaction term between dark matter and dark energy using SNe Ia

    Energy Technology Data Exchange (ETDEWEB)

    Solano, Freddy Cueva; Nucamendi, Ulises, E-mail: freddy@ifm.umich.mx, E-mail: ulises@ifm.umich.mx [Instituto de Física y Matemáticas, Universidad Michoacana de San Nicolás de Hidalgo, Edificio C-3, Ciudad Universitaria, CP. 58040, Morelia, Michoacán (Mexico)

    2012-04-01

    We apply a parametric reconstruction method to a homogeneous, isotropic and spatially flat Friedmann-Robertson-Walker (FRW) cosmological model filled of a fluid of dark energy (DE) with constant equation of state (EOS) parameter interacting with dark matter (DM)\\@. The reconstruction method is based on expansions of the general interaction term and the relevant cosmological variables in terms of Chebyshev polynomials which form a complete set orthonormal functions. This interaction term describes an exchange of energy flow between the DE and DM within dark sector. To show how the method works we do the reconstruction of the interaction function expanding it in terms of only the first six Chebyshev polynomials and obtain the best estimation for the coefficients of the expansion assuming three models: (a) a DE equation of the state parameter w = −1 (an interacting cosmological Λ), (b) a DE equation of the state parameter w = constant with a dark matter density parameter fixed, (c) a DE equation of the state parameter w = constant with a free constant dark matter density parameter to be estimated, and using the Union2 SNe Ia data set from ''The Supernova Cosmology Project'' (SCP) composed by 557 type Ia supernovae. In both cases, the preliminary reconstruction shows that in the best scenario there exist the possibility of a crossing of the noninteracting line Q = 0 in the recent past within the 1σ and 2σ errors from positive values at early times to negative values at late times. This means that, in this reconstruction, there is an energy transfer from DE to DM at early times and an energy transfer from DM to DE at late times. We conclude that this fact is an indication of the possible existence of a crossing behavior in a general interaction coupling between dark components.

  2. Optimizing Neighbor Discovery for Ad hoc Networks based on the Bluetooth PAN Profile

    DEFF Research Database (Denmark)

    Kuijpers, Gerben; Nielsen, Thomas Toftegaard; Prasad, Ramjee

    2002-01-01

    IP layer neighbor discovery mechanisms rely highly on broadcast/multicast capabilities of the underlying link layer. The Bluetooth personal area network (PAN) profile has no native link layer broadcast/multicast capabilities and can only emulate this by repeatedly unicast link layer frames....... This paper introduces a neighbor discovery mechanism that utilizes the resources in the Bluetooth PAN profile more efficient. The performance of the new mechanism is investigated using a IPv6 network simulator and compared with emulated broadcasting. It is shown that the signaling overhead can...

  3. Integration and analysis of neighbor discovery and link quality estimation in wireless sensor networks.

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Abd Razak, Shukor

    2014-01-01

    Network connectivity and link quality information are the fundamental requirements of wireless sensor network protocols to perform their desired functionality. Most of the existing discovery protocols have only focused on the neighbor discovery problem, while a few number of them provide an integrated neighbor search and link estimation. As these protocols require a careful parameter adjustment before network deployment, they cannot provide scalable and accurate network initialization in large-scale dense wireless sensor networks with random topology. Furthermore, performance of these protocols has not entirely been evaluated yet. In this paper, we perform a comprehensive simulation study on the efficiency of employing adaptive protocols compared to the existing nonadaptive protocols for initializing sensor networks with random topology. In this regard, we propose adaptive network initialization protocols which integrate the initial neighbor discovery with link quality estimation process to initialize large-scale dense wireless sensor networks without requiring any parameter adjustment before network deployment. To the best of our knowledge, this work is the first attempt to provide a detailed simulation study on the performance of integrated neighbor discovery and link quality estimation protocols for initializing sensor networks. This study can help system designers to determine the most appropriate approach for different applications.

  4. Integration and Analysis of Neighbor Discovery and Link Quality Estimation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Marjan Radi

    2014-01-01

    Full Text Available Network connectivity and link quality information are the fundamental requirements of wireless sensor network protocols to perform their desired functionality. Most of the existing discovery protocols have only focused on the neighbor discovery problem, while a few number of them provide an integrated neighbor search and link estimation. As these protocols require a careful parameter adjustment before network deployment, they cannot provide scalable and accurate network initialization in large-scale dense wireless sensor networks with random topology. Furthermore, performance of these protocols has not entirely been evaluated yet. In this paper, we perform a comprehensive simulation study on the efficiency of employing adaptive protocols compared to the existing nonadaptive protocols for initializing sensor networks with random topology. In this regard, we propose adaptive network initialization protocols which integrate the initial neighbor discovery with link quality estimation process to initialize large-scale dense wireless sensor networks without requiring any parameter adjustment before network deployment. To the best of our knowledge, this work is the first attempt to provide a detailed simulation study on the performance of integrated neighbor discovery and link quality estimation protocols for initializing sensor networks. This study can help system designers to determine the most appropriate approach for different applications.

  5. Transfer-Efficient Face Routing Using the Planar Graphs of Neighbors in High Density WSNs

    Directory of Open Access Journals (Sweden)

    Eun-Seok Cho

    2017-10-01

    Full Text Available Face routing has been adopted in wireless sensor networks (WSNs where topological changes occur frequently or maintaining full network information is difficult. For message forwarding in networks, a planar graph is used to prevent looping, and because long edges are removed by planarization and the resulting planar graph is composed of short edges, and messages are forwarded along multiple nodes connected by them even though they can be forwarded directly. To solve this, face routing using information on all nodes within 2-hop range was adopted to forward messages directly to the farthest node within radio range. However, as the density of the nodes increases, network performance plunges because message transfer nodes receive and process increased node information. To deal with this problem, we propose a new face routing using the planar graphs of neighboring nodes to improve transfer efficiency. It forwards a message directly to the farthest neighbor and reduces loads and processing time by distributing network graph construction and planarization to the neighbors. It also decreases the amount of location information to be transmitted by sending information on the planar graph nodes rather than on all neighboring nodes. Simulation results show that it significantly improves transfer efficiency.

  6. A Markov chain Monte Carlo Expectation Maximization Algorithm for Statistical Analysis of DNA Sequence Evolution with Neighbor-Dependent Substitution Rates

    DEFF Research Database (Denmark)

    Hobolth, Asger

    2008-01-01

    The evolution of DNA sequences can be described by discrete state continuous time Markov processes on a phylogenetic tree. We consider neighbor-dependent evolutionary models where the instantaneous rate of substitution at a site depends on the states of the neighboring sites. Neighbor...

  7. 75 FR 62412 - Notice of Proposed Information Collection: Comment Request; HUD-Owned Real Estate-Good Neighbor...

    Science.gov (United States)

    2010-10-08

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5380-N-36] Notice of Proposed Information Collection: Comment Request; HUD- Owned Real Estate-Good Neighbor Next Door Program AGENCY: Office... information: Title of Proposal: HUD-Owned Real Estate-Good Neighbor Next Door Program. OMB Control Number, if...

  8. Local and neighboring patch conditions alter sex-specific movement in banana weevils.

    Science.gov (United States)

    Carval, Dominique; Perrin, Benjamin; Duyck, Pierre-François; Tixier, Philippe

    2015-12-01

    Understanding the mechanisms underlying the movements and spread of a species over time and space is a major concern of ecology. Here, we assessed the effects of an individual's sex and the density and sex ratio of conspecifics in the local and neighboring environment on the movement probability of the banana weevil, Cosmopolites sordidus. In a "two patches" experiment, we used radiofrequency identification tags to study the C. sordidus movement response to patch conditions. We showed that local and neighboring densities of conspecifics affect the movement rates of individuals but that the density-dependent effect can be either positive or negative depending on the relative densities of conspecifics in local and neighboring patches. We demonstrated that sex ratio also influences the movement of C. sordidus, that is, the weevil exhibits nonfixed sex-biased movement strategies. Sex-biased movement may be the consequence of intrasexual competition for resources (i.e., oviposition sites) in females and for mates in males. We also detected a high individual variability in the propensity to move. Finally, we discuss the role of demographic stochasticity, sex-biased movement, and individual heterogeneity in movement on the colonization process.

  9. Tensor Train Neighborhood Preserving Embedding

    Science.gov (United States)

    Wang, Wenqi; Aggarwal, Vaneet; Aeron, Shuchin

    2018-05-01

    In this paper, we propose a Tensor Train Neighborhood Preserving Embedding (TTNPE) to embed multi-dimensional tensor data into low dimensional tensor subspace. Novel approaches to solve the optimization problem in TTNPE are proposed. For this embedding, we evaluate novel trade-off gain among classification, computation, and dimensionality reduction (storage) for supervised learning. It is shown that compared to the state-of-the-arts tensor embedding methods, TTNPE achieves superior trade-off in classification, computation, and dimensionality reduction in MNIST handwritten digits and Weizmann face datasets.

  10. Impact of Training Bolivian Farmers on Integrated Pest Management and Diffusion of Knowledge to Neighboring Farmers.

    Science.gov (United States)

    Jørs, Erik; Konradsen, Flemming; Huici, Omar; Morant, Rafael C; Volk, Julie; Lander, Flemming

    2016-01-01

    Teaching farmers integrated pest management (IPM) in farmer field schools (FFS) has led to reduced pesticide use and safer handling. This article evaluates the long-term impact of training farmers on IPM and the diffusion of knowledge from trained farmers to neighboring farmers, a subject of importance to justify training costs and to promote a healthy and sustainable agriculture. Training on IPM of farmers took place from 2002 to 2004 in their villages in La Paz County, Bolivia, whereas dissemination of knowledge from trained farmer to neighboring farmer took place until 2009. To evaluate the impact of the intervention, self-reported knowledge and practice on pesticide handling and IPM among trained farmers (n = 23) and their neighboring farmers (n = 47) were analyzed in a follow-up study and compared in a cross-sectional analysis with a control group of farmers (n = 138) introduced in 2009. Variables were analyzed using χ2 test and analysis of variance (ANOVA). Trained farmers improved and performed significantly better in all tested variables than their neighboring farmers, although the latter also improved their performance from 2002 to 2009. Including a control group showed an increasing trend in all variables, with the control farmers having the poorest performance and trained farmers the best. The same was seen in an aggregated variable where trained farmers had a mean score of 16.55 (95% confidence interval [CI]: 15.45-17.65), neighboring farmers a mean score of 11.97 (95% CI: 10.56-13.38), and control farmers a mean score of 9.18 (95% CI: 8.55-9.80). Controlling for age and living altitude did not change these results. Trained farmers and their neighboring farmers improved and maintained knowledge and practice on IPM and pesticide handling. Diffusion of knowledge from trained farmers might explain the better performance of the neighboring farmers compared with the control farmers. Dissemination of knowledge can contribute to justify the cost and convince

  11. Cryptosporidiosis in Saudi Arabia and neighboring countries

    International Nuclear Information System (INIS)

    Areeshi, Mohammed Y.; Hart, C.A.; Beeching, N.J.

    2007-01-01

    Cryptosporidium is a coccidian protozoan parasite of the intestinal tract that causes severe and sometimes fatal watery diarrhea in immunocompromised patients and self-limiting but prolonged diarrheal disease in immunocompetent individuals. It exists naturally in animals and can be zoonotic. Although cryptosporidiosis is a significant cause of diarrheal disease in both developing and developed countries, it is more prevalent in developing countries and in tropical environments. We examined the epidemiology and disease burden of Cryptosporidium in Saudi Arabia and neighboring countries by reviewing 23 published studies of Cryptosporidium and etiology of diarrhea in between 1986 and 2006. The prevalence of Cryptosporidium infection in human's ranged from 1% to 37% with a median of 4%, while in animals it was for different species of animals and geographic locations of the studies. Most cases of cryptosporidiosis occurred among children less than 7 years of age and particularly in the first two years of life. The seasonality of Cryptosporidium varied depending on the geographic locations of the studies but it generally most prevalent in the rainy season. The most commonly identified species was Cryptosporidium parvum while C.hominis was detected only in one study from Kuwait. The cumulative experience from Saudi Arabia and four neighboring countries (Kuwait, Oman, Jordan and Iraq) suggest that Cryptosporidium is an important cause of diarrhea in human and cattle. However, the findings of this review also demonstrate the limitations of the available data regarding Cryptosporidium species and strains in circulation in these countries. (author)

  12. Feature-based component model for design of embedded systems

    Science.gov (United States)

    Zha, Xuan Fang; Sriram, Ram D.

    2004-11-01

    An embedded system is a hybrid of hardware and software, which combines software's flexibility and hardware real-time performance. Embedded systems can be considered as assemblies of hardware and software components. An Open Embedded System Model (OESM) is currently being developed at NIST to provide a standard representation and exchange protocol for embedded systems and system-level design, simulation, and testing information. This paper proposes an approach to representing an embedded system feature-based model in OESM, i.e., Open Embedded System Feature Model (OESFM), addressing models of embedded system artifacts, embedded system components, embedded system features, and embedded system configuration/assembly. The approach provides an object-oriented UML (Unified Modeling Language) representation for the embedded system feature model and defines an extension to the NIST Core Product Model. The model provides a feature-based component framework allowing the designer to develop a virtual embedded system prototype through assembling virtual components. The framework not only provides a formal precise model of the embedded system prototype but also offers the possibility of designing variation of prototypes whose members are derived by changing certain virtual components with different features. A case study example is discussed to illustrate the embedded system model.

  13. Effect of Floquet engineering on the p-wave superconductor with second-neighbor couplings

    Science.gov (United States)

    Li, X. P.; Li, C. F.; Wang, L. C.; Zhou, L.

    2018-06-01

    The influence of the Floquet engineering on a particular one-dimensional p-wave superconductor, Kitaev model, with second-neighbor couplings is investigated in this paper. The effective Hamiltonians in the rotated reference frames have been obtained, and the convergent regions of the approximated Hamiltonian as well as the topological phase diagrams have been analyzed and discussed. We show that by modulating the external driving field amplitude, frequency as well as the second-neighbor hopping amplitude, the rich phase diagrams and transitions between different topological phases can be obtained.

  14. Classification of EEG Signals using adaptive weighted distance nearest neighbor algorithm

    Directory of Open Access Journals (Sweden)

    E. Parvinnia

    2014-01-01

    Full Text Available Electroencephalogram (EEG signals are often used to diagnose diseases such as seizure, alzheimer, and schizophrenia. One main problem with the recorded EEG samples is that they are not equally reliable due to the artifacts at the time of recording. EEG signal classification algorithms should have a mechanism to handle this issue. It seems that using adaptive classifiers can be useful for the biological signals such as EEG. In this paper, a general adaptive method named weighted distance nearest neighbor (WDNN is applied for EEG signal classification to tackle this problem. This classification algorithm assigns a weight to each training sample to control its influence in classifying test samples. The weights of training samples are used to find the nearest neighbor of an input query pattern. To assess the performance of this scheme, EEG signals of thirteen schizophrenic patients and eighteen normal subjects are analyzed for the classification of these two groups. Several features including, fractal dimension, band power and autoregressive (AR model are extracted from EEG signals. The classification results are evaluated using Leave one (subject out cross validation for reliable estimation. The results indicate that combination of WDNN and selected features can significantly outperform the basic nearest-neighbor and the other methods proposed in the past for the classification of these two groups. Therefore, this method can be a complementary tool for specialists to distinguish schizophrenia disorder.

  15. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Steinmann, Casper; Ruud, Kenneth

    2015-01-01

    We present a new QM/QM/MM-based model for calculating molecular properties and excited states of solute-solvent systems. We denote this new approach the polarizable density embedding (PDE) model and it represents an extension of our previously developed polarizable embedding (PE) strategy. The PDE...... model is a focused computational approach in which a core region of the system studied is represented by a quantum-chemical method, whereas the environment is divided into two other regions: an inner and an outer region. Molecules belonging to the inner region are described by their exact densities...

  16. Expression of inhibitory receptors on intratumoral T cells modulates the activity of a T cell-bispecific antibody targeting folate receptor

    OpenAIRE

    Schreiner, Jens; Thommen, Daniela S.; Herzig, Petra; Bacac, Marina; Klein, Christian; Roller, Andreas; Belousov, Anton; Levitsky, Victor; Savic, Spasenija; Moersig, Wolfgang; Uhlenbrock, Franziska; Heinzelmann-Schwarz, Viola A.; Umana, Pablo; Pisa, Pavel; Lardinois, Didier

    2015-01-01

    T-cell bispecific antibodies (TCBs) are a novel therapeutic tool designed to selectively recruit T-cells to tumor cells and simultaneously activate them. However, it is currently unknown whether the dysfunctional state of T-cells, embedded into the tumor microenvironment, imprints on the therapeutic activity of TCBs. We performed a comprehensive analysis of activation and effector functions of tumor-infiltrating T-cells (TILs) in different tumor types, upon stimulation by a TCB targeting fola...

  17. REVEALING TYPE Ia SUPERNOVA PHYSICS WITH COSMIC RATES AND NUCLEAR GAMMA RAYS

    International Nuclear Information System (INIS)

    Horiuchi, Shunsaku; Beacom, John F.

    2010-01-01

    Type Ia supernovae (SNe Ia) remain mysterious despite their central importance in cosmology and their rapidly increasing discovery rate. The progenitors of SNe Ia can be probed by the delay time between progenitor birth and explosion as SNe Ia. The explosions and progenitors of SNe Ia can be probed by MeV nuclear gamma rays emitted in the decays of radioactive nickel and cobalt into iron. We compare the cosmic star formation and SN Ia rates, finding that their different redshift evolution requires a large fraction of SNe Ia to have large delay times. A delay-time distribution of the form t -α with α = 1.0 ± 0.3 provides a good fit, implying that 50% of SNe Ia explode more than ∼1 Gyr after progenitor birth. The extrapolation of the cosmic SN Ia rate to z = 0 agrees with the rate we deduce from catalogs of local SNe Ia. We investigate prospects for gamma-ray telescopes to exploit the facts that escaping gamma rays directly reveal the power source of SNe Ia and uniquely provide tomography of the expanding ejecta. We find large improvements relative to earlier studies by Gehrels et al. in 1987 and Timmes and Woosley in 1997 due to larger and more certain SN Ia rates and advances in gamma-ray detectors. The proposed Advanced Compton Telescope, with a narrow-line sensitivity ∼60 times better than that of current satellites, would, on an annual basis, detect up to ∼100 SNe Ia (3σ) and provide revolutionary model discrimination for SNe Ia within 20 Mpc, with gamma-ray light curves measured with ∼10σ significance daily for ∼100 days. Even more modest improvements in detector sensitivity would open a new and invaluable astronomy with frequent SN Ia gamma-ray detections.

  18. Raman scattering mediated by neighboring molecules

    Science.gov (United States)

    Williams, Mathew D.; Bradshaw, David S.; Andrews, David L.

    2016-05-01

    Raman scattering is most commonly associated with a change in vibrational state within individual molecules, the corresponding frequency shift in the scattered light affording a key way of identifying material structures. In theories where both matter and light are treated quantum mechanically, the fundamental scattering process is represented as the concurrent annihilation of a photon from one radiation mode and creation of another in a different mode. Developing this quantum electrodynamical formulation, the focus of the present work is on the spectroscopic consequences of electrodynamic coupling between neighboring molecules or other kinds of optical center. To encompass these nanoscale interactions, through which the molecular states evolve under the dual influence of the input light and local fields, this work identifies and determines two major mechanisms for each of which different selection rules apply. The constituent optical centers are considered to be chemically different and held in a fixed orientation with respect to each other, either as two components of a larger molecule or a molecular assembly that can undergo free rotation in a fluid medium or as parts of a larger, solid material. The two centers are considered to be separated beyond wavefunction overlap but close enough together to fall within an optical near-field limit, which leads to high inverse power dependences on their local separation. In this investigation, individual centers undergo a Stokes transition, whilst each neighbor of a different species remains in its original electronic and vibrational state. Analogous principles are applicable for the anti-Stokes case. The analysis concludes by considering the experimental consequences of applying this spectroscopic interpretation to fluid media; explicitly, the selection rules and the impact of pressure on the radiant intensity of this process.

  19. Raman scattering mediated by neighboring molecules

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Mathew D.; Bradshaw, David S.; Andrews, David L., E-mail: david.andrews@physics.org [School of Chemistry, University of East Anglia, Norwich NR4 7TJ (United Kingdom)

    2016-05-07

    Raman scattering is most commonly associated with a change in vibrational state within individual molecules, the corresponding frequency shift in the scattered light affording a key way of identifying material structures. In theories where both matter and light are treated quantum mechanically, the fundamental scattering process is represented as the concurrent annihilation of a photon from one radiation mode and creation of another in a different mode. Developing this quantum electrodynamical formulation, the focus of the present work is on the spectroscopic consequences of electrodynamic coupling between neighboring molecules or other kinds of optical center. To encompass these nanoscale interactions, through which the molecular states evolve under the dual influence of the input light and local fields, this work identifies and determines two major mechanisms for each of which different selection rules apply. The constituent optical centers are considered to be chemically different and held in a fixed orientation with respect to each other, either as two components of a larger molecule or a molecular assembly that can undergo free rotation in a fluid medium or as parts of a larger, solid material. The two centers are considered to be separated beyond wavefunction overlap but close enough together to fall within an optical near-field limit, which leads to high inverse power dependences on their local separation. In this investigation, individual centers undergo a Stokes transition, whilst each neighbor of a different species remains in its original electronic and vibrational state. Analogous principles are applicable for the anti-Stokes case. The analysis concludes by considering the experimental consequences of applying this spectroscopic interpretation to fluid media; explicitly, the selection rules and the impact of pressure on the radiant intensity of this process.

  20. Detecting PM2.5's Correlations between Neighboring Cities Using a Time-Lagged Cross-Correlation Coefficient.

    Science.gov (United States)

    Wang, Fang; Wang, Lin; Chen, Yuming

    2017-08-31

    In order to investigate the time-dependent cross-correlations of fine particulate (PM2.5) series among neighboring cities in Northern China, in this paper, we propose a new cross-correlation coefficient, the time-lagged q-L dependent height crosscorrelation coefficient (denoted by p q (τ, L)), which incorporates the time-lag factor and the fluctuation amplitude information into the analogous height cross-correlation analysis coefficient. Numerical tests are performed to illustrate that the newly proposed coefficient ρ q (τ, L) can be used to detect cross-correlations between two series with time lags and to identify different range of fluctuations at which two series possess cross-correlations. Applying the new coefficient to analyze the time-dependent cross-correlations of PM2.5 series between Beijing and the three neighboring cities of Tianjin, Zhangjiakou, and Baoding, we find that time lags between the PM2.5 series with larger fluctuations are longer than those between PM2.5 series withsmaller fluctuations. Our analysis also shows that cross-correlations between the PM2.5 series of two neighboring cities are significant and the time lags between two PM2.5 series of neighboring cities are significantly non-zero. These findings providenew scientific support on the view that air pollution in neighboring cities can affect one another not simultaneously but with a time lag.

  1. Social dilemma alleviated by sharing the gains with immediate neighbors

    Science.gov (United States)

    Wu, Zhi-Xi; Yang, Han-Xin

    2014-01-01

    We study the evolution of cooperation in the evolutionary spatial prisoner's dilemma game (PDG) and snowdrift game (SG), within which a fraction α of the payoffs of each player gained from direct game interactions is shared equally by the immediate neighbors. The magnitude of the parameter α therefore characterizes the degree of the relatedness among the neighboring players. By means of extensive Monte Carlo simulations as well as an extended mean-field approximation method, we trace the frequency of cooperation in the stationary state. We find that plugging into relatedness can significantly promote the evolution of cooperation in the context of both studied games. Unexpectedly, cooperation can be more readily established in the spatial PDG than that in the spatial SG, given that the degree of relatedness and the cost-to-benefit ratio of mutual cooperation are properly formulated. The relevance of our model with the stakeholder theory is also briefly discussed.

  2. Enhancement of breast CADx with unlabeled data1

    Science.gov (United States)

    Jamieson, Andrew R.; Giger, Maryellen L.; Drukker, Karen; Pesce, Lorenzo L.

    2010-01-01

    Purpose: Unlabeled medical image data are abundant, yet the process of converting them into a labeled (“truth-known”) database is time and resource expensive and fraught with ethical and logistics issues. The authors propose a dual-stage CADx scheme in which both labeled and unlabeled (truth-known and “truth-unknown”) data are used. This study is an initial exploration of the potential for leveraging unlabeled data toward enhancing breast CADx. Methods: From a labeled ultrasound image database consisting of 1126 lesions with an empirical cancer prevalence of 14%, 200 different randomly sampled subsets were selected and the truth status of a variable number of cases was masked to the algorithm to mimic different types of labeled and unlabeled data sources. The prevalence was fixed at 50% cancerous for the labeled data and 5% cancerous for the unlabeled. In the first stage of the dual-stage CADx scheme, the authors term “transductive dimension reduction regularization” (TDR-R), both labeled and unlabeled images characterized by extracted lesion features were combined using dimension reduction (DR) techniques and mapped to a lower-dimensional representation. (The first stage ignored truth status therefore was an unsupervised algorithm.) In the second stage, the labeled data from the reduced dimension embedding were used to train a classifier toward estimating the probability of malignancy. For the first CADx stage, the authors investigated three DR approaches: Laplacian eigenmaps, t-distributed stochastic neighbor embedding (t-SNE), and principal component analysis. For the TDR-R methods, the classifier in the second stage was a supervised (i.e., utilized truth) Bayesian neural net. The dual-stage CADx schemes were compared to a single-stage scheme based on manifold regularization (MR) in a semisupervised setting via the LapSVM algorithm. Performance in terms of areas under the ROC curve (AUC) of the CADx schemes was evaluated in leave-one-out and .632

  3. Phylogenetic trees and Euclidean embeddings.

    Science.gov (United States)

    Layer, Mark; Rhodes, John A

    2017-01-01

    It was recently observed by de Vienne et al. (Syst Biol 60(6):826-832, 2011) that a simple square root transformation of distances between taxa on a phylogenetic tree allowed for an embedding of the taxa into Euclidean space. While the justification for this was based on a diffusion model of continuous character evolution along the tree, here we give a direct and elementary explanation for it that provides substantial additional insight. We use this embedding to reinterpret the differences between the NJ and BIONJ tree building algorithms, providing one illustration of how this embedding reflects tree structures in data.

  4. Multi-strategy based quantum cost reduction of linear nearest-neighbor quantum circuit

    Science.gov (United States)

    Tan, Ying-ying; Cheng, Xue-yun; Guan, Zhi-jin; Liu, Yang; Ma, Haiying

    2018-03-01

    With the development of reversible and quantum computing, study of reversible and quantum circuits has also developed rapidly. Due to physical constraints, most quantum circuits require quantum gates to interact on adjacent quantum bits. However, many existing quantum circuits nearest-neighbor have large quantum cost. Therefore, how to effectively reduce quantum cost is becoming a popular research topic. In this paper, we proposed multiple optimization strategies to reduce the quantum cost of the circuit, that is, we reduce quantum cost from MCT gates decomposition, nearest neighbor and circuit simplification, respectively. The experimental results show that the proposed strategies can effectively reduce the quantum cost, and the maximum optimization rate is 30.61% compared to the corresponding results.

  5. IDE Support of String-Embedded Languages

    Directory of Open Access Journals (Sweden)

    S. Grigorev

    2014-01-01

    Full Text Available Complex information systems are often implemented by using more than one programming language. Sometimes this variety takes a form of one host and one or few string-embedded languages. Textual representation of clauses in a string-embedded language is built at run time by a host program and then analyzed, compiled or interpreted by a dedicated runtime component (database, web browser etc. Most general-purpose programming languages may play the role of the host; one of the most evident examples of the string-embedded language is the dynamic SQL which was specified in ISO SQL standard and is supported by the majority of DBMS. Standard IDE functionality such as code completion or syntax highlighting can really helps the developers who use this technique. There are several tools providing this functionality, but they all process only one concrete string-embedded language and cannot be easily extended for supporting another language. We present a platform which allows to easily create tools for string-embedded language processing.

  6. A Markov chain Monte Carlo Expectation Maximization Algorithm for Statistical Analysis of DNA Sequence Evolution with Neighbor-Dependent Substitution Rates

    DEFF Research Database (Denmark)

    Hobolth, Asger

    2008-01-01

    -dimensional integrals required in the EM algorithm are estimated using MCMC sampling. The MCMC sampler requires simulation of sample paths from a continuous time Markov process, conditional on the beginning and ending states and the paths of the neighboring sites. An exact path sampling algorithm is developed......The evolution of DNA sequences can be described by discrete state continuous time Markov processes on a phylogenetic tree. We consider neighbor-dependent evolutionary models where the instantaneous rate of substitution at a site depends on the states of the neighboring sites. Neighbor......-dependent substitution models are analytically intractable and must be analyzed using either approximate or simulation-based methods. We describe statistical inference of neighbor-dependent models using a Markov chain Monte Carlo expectation maximization (MCMC-EM) algorithm. In the MCMC-EM algorithm, the high...

  7. Thermodynamic systematics of oxides of americium, curium, and neighboring elements

    International Nuclear Information System (INIS)

    Morss, L.R.

    1984-01-01

    Recently-obtained calorimetric data on the sesquioxides and dioxides of americium and curium are summarized. These data are combined with other properties of the actinide elements to elucidate the stability relationships among these oxides and to predict the behavior of neighboring actinide oxides. 45 references, 4 figures, 5 tables

  8. A Hybrid Instance Selection Using Nearest-Neighbor for Cross-Project Defect Prediction

    Institute of Scientific and Technical Information of China (English)

    Duksan Ryu; Jong-In Jang; Jongmoon Baik; Member; ACM; IEEE

    2015-01-01

    Software defect prediction (SDP) is an active research field in software engineering to identify defect-prone modules. Thanks to SDP, limited testing resources can be effectively allocated to defect-prone modules. Although SDP requires suffcient local data within a company, there are cases where local data are not available, e.g., pilot projects. Companies without local data can employ cross-project defect prediction (CPDP) using external data to build classifiers. The major challenge of CPDP is different distributions between training and test data. To tackle this, instances of source data similar to target data are selected to build classifiers. Software datasets have a class imbalance problem meaning the ratio of defective class to clean class is far low. It usually lowers the performance of classifiers. We propose a Hybrid Instance Selection Using Nearest-Neighbor (HISNN) method that performs a hybrid classification selectively learning local knowledge (via k-nearest neighbor) and global knowledge (via na¨ıve Bayes). Instances having strong local knowledge are identified via nearest-neighbors with the same class label. Previous studies showed low PD (probability of detection) or high PF (probability of false alarm) which is impractical to use. The experimental results show that HISNN produces high overall performance as well as high PD and low PF.

  9. Parametric embedding for class visualization.

    Science.gov (United States)

    Iwata, Tomoharu; Saito, Kazumi; Ueda, Naonori; Stromsten, Sean; Griffiths, Thomas L; Tenenbaum, Joshua B

    2007-09-01

    We propose a new method, parametric embedding (PE), that embeds objects with the class structure into a low-dimensional visualization space. PE takes as input a set of class conditional probabilities for given data points and tries to preserve the structure in an embedding space by minimizing a sum of Kullback-Leibler divergences, under the assumption that samples are generated by a gaussian mixture with equal covariances in the embedding space. PE has many potential uses depending on the source of the input data, providing insight into the classifier's behavior in supervised, semisupervised, and unsupervised settings. The PE algorithm has a computational advantage over conventional embedding methods based on pairwise object relations since its complexity scales with the product of the number of objects and the number of classes. We demonstrate PE by visualizing supervised categorization of Web pages, semisupervised categorization of digits, and the relations of words and latent topics found by an unsupervised algorithm, latent Dirichlet allocation.

  10. McVittie solution in f(T) gravity

    Energy Technology Data Exchange (ETDEWEB)

    Bejarano, Cecilia; Jose Guzman, Maria [Instituto de Astronomia y Fisica del Espacio (IAFE, CONICET-UBA), Buenos Aires (Argentina); Ferraro, Rafael [Instituto de Astronomia y Fisica del Espacio (IAFE, CONICET-UBA), Buenos Aires (Argentina); Universidad de Buenos Aires, Departamento de Fisica, Facultad de Ciencias Exactas y Naturales, Buenos Aires (Argentina)

    2017-12-15

    We show that McVittie geometry, which describes a black hole embedded in a FLRW universe, not only solves the Einstein equations but also remains as a non-deformable solution of f(T) gravity. This search for GR solutions that survive in f(T) gravity is facilitated by a null tetrad approach. We also show that flat FLRW geometry is a consistent solution of f(T) dynamical equations not only for T = -6H{sup 2} but also for T = 0, which could be a manifestation of the additional degrees of freedom involved in f(T) theories. (orig.)

  11. McVittie solution in f(T) gravity

    International Nuclear Information System (INIS)

    Bejarano, Cecilia; Jose Guzman, Maria; Ferraro, Rafael

    2017-01-01

    We show that McVittie geometry, which describes a black hole embedded in a FLRW universe, not only solves the Einstein equations but also remains as a non-deformable solution of f(T) gravity. This search for GR solutions that survive in f(T) gravity is facilitated by a null tetrad approach. We also show that flat FLRW geometry is a consistent solution of f(T) dynamical equations not only for T = -6H 2 but also for T = 0, which could be a manifestation of the additional degrees of freedom involved in f(T) theories. (orig.)

  12. Sequence correction of random coil chemical shifts: correlation between neighbor correction factors and changes in the Ramachandran distribution

    DEFF Research Database (Denmark)

    Kjærgaard, Magnus; Poulsen, Flemming Martin

    2011-01-01

    Random coil chemical shifts are necessary for secondary chemical shift analysis, which is the main NMR method for identification of secondary structure in proteins. One of the largest challenges in the determination of random coil chemical shifts is accounting for the effect of neighboring residues....... The contributions from the neighboring residues are typically removed by using neighbor correction factors determined based on each residue's effect on glycine chemical shifts. Due to its unusual conformational freedom, glycine may be particularly unrepresentative for the remaining residue types. In this study, we...... in the conformational ensemble are an important source of neighbor effects in disordered proteins. Glutamine derived random coil chemical shifts and correction factors modestly improve our ability to predict (13)C chemical shifts of intrinsically disordered proteins compared to existing datasets, and may thus improve...

  13. Embedded micro-sensor for monitoring pH in concrete structures

    Science.gov (United States)

    Srinivasan, Rengaswamy; Phillips, Terry E.; Bargeron, C. Brent; Carlson, Micah A.; Schemm, Elizabeth R.; Saffarian, Hassan M.

    2000-04-01

    Three major causes of corrosion of steel in concrete are chloride ions (Cl-), temperature (T) and acidity (pH). Under normal operating temperatures and with pH above 13, steel does not undergo pitting corrosion. In presence of Cl-, if the pH decreases below 12, the probability of pitting increases. Acid rain and atmospheric carbon dioxide cause the pH to drop in concrete, often leading to corrosion of the structure with the concomitant cost of repair or replacement. Currently, the pH level in concrete is estimated through destructive testing of the structures. Glass ISFET, and other pH sensors that need maintenance and calibration cannot be embedded in concrete. In this paper, we describe an inexpensive solid state pH sensor that can be embedded in concrete, to detect pH changes at the early stages. It employs a chemical reagent, trinitrobenzenesulfonic acid (TNBS) that exhibits changes in optical properties in the 12 - 14 pH range, and is held in a film of a sol-gel/TNBS composite on an optically transparent surface. A simple LED/filter/photodiode transducer monitors pH-induced changes in TNBS. Such a device needs no periodic calibration or maintenance. The optical window, the light-source and sensor can be easily housed and encapsulated in a chemically inert structure, and embedded in concrete.

  14. Sistem Rekomendasi Pada E-Commerce Menggunakan K-Nearest Neighbor

    Directory of Open Access Journals (Sweden)

    Chandra Saha Dewa Prasetya

    2017-09-01

    The growing number of product information available on the internet brings challenges to both customer and online businesses in the e-commerce environment. Customer often have difficulty when looking for products on the internet because of the number of products sold on the internet. In addition, online businessman often experience difficulties because they has much data about products, customers and transactions, thus causing online businessman have difficulty to promote the right product to a particular customer target. A recommendation system was developed to address those problem with various methods such as Collaborative Filtering, ContentBased, and Hybrid. Collaborative filtering method uses customer’s rating data, content based using product content such as title or description, and hybrid using both as the basis of the recommendation. In this research, the k-nearest neighbor algorithm is used to determine the top-n product recommendations for each buyer. The result of this research method Content Based outperforms other methods because the sparse data, that is the condition where the number of rating given by the customers is relatively little compared the number of products available in e-commerce. Keywords: recomendation system, k-nearest neighbor, collaborative filtering, content based.

  15. Laser assisted embedding of nanoparticles into metallic materials

    International Nuclear Information System (INIS)

    Lin Dong; Suslov, Sergey; Ye Chang; Liao Yiliang; Liu, C. Richard; Cheng, Gary J.

    2012-01-01

    This paper reports a methodology of half-embedding nanoparticles into metallic materials. Transparent and opaque nanoparticles are chosen to demonstrate the process of laser assisted nanoparticle embedding. Dip coating method is used to coat transparent or opaque nanoparticle on the surface of metallic material. Nanoparticles are embedded into substrate by laser irradiation. In this study, the mechanism and process of nanoparticle embedding are investigated. It is found both transparent and opaque nanoparticles embedding are with high densities and good uniformities.

  16. Evaluation of Maintenance and EOL Operation Performance of Sensor-Embedded Laptops

    Directory of Open Access Journals (Sweden)

    Mehmet Talha Dulman

    2018-01-01

    Full Text Available Sensors are commonly employed to monitor products during their life cycles and to remotely and continuously track their usage patterns. Installing sensors into products can help generate useful data related to the conditions of products and their components, and this information can subsequently be used to inform EOL decision-making. As such, embedded sensors can enhance the performance of EOL product processing operations. The information collected by the sensors can also be used to estimate and predict product failures, thereby helping to improve maintenance operations. This paper describes a study in which system maintenance and EOL processes were combined and closed-loop supply chain systems were constructed to analyze the financial contribution that sensors can make to these procedures by using discrete event simulation to model and compare regular systems and sensor-embedded systems. The factors that had an impact on the performance measures, such as disassembly cost, maintenance cost, inspection cost, sales revenues, and profitability, were determined and a design of experiments study was carried out. The experiment results were compared, and pairwise t-tests were executed. The results reveal that sensor-embedded systems are significantly superior to regular systems in terms of the identified performance measures.

  17. Crimean-Congo hemorrhagic fever in Iran and neighboring countries

    DEFF Research Database (Denmark)

    Chinikar, S; Ghiasi, Seyed Mojtaba; Hewson, R

    2010-01-01

    Crimean-Congo hemorrhagic fever (CCHF) is a zoonotic viral disease that is asymptomatic in infected livestock, but a serious threat to humans. Human infections begin with nonspecific febrile symptoms, but progress to a serious hemorrhagic syndrome with a case fatality rate of 2-50%. Although the ...... in Iran and neighboring countries and provide evidence of over 5000 confirmed cases of CCHF in a single period/season....

  18. Projective embeddings of homogeneous spaces with small boundary

    International Nuclear Information System (INIS)

    Arzhantsev, Ivan V

    2009-01-01

    We study open equivariant projective embeddings of homogeneous spaces such that the complement of the open orbit has codimension at least 2. We establish a criterion for the existence of such an embedding, prove that the set of isomorphism classes of such embeddings is finite, and give a construction of the embeddings in terms of Geometric Invariant Theory. A generalization of Cox's construction and the theory of bunched rings enable us to describe in combinatorial terms the basic geometric properties of embeddings with small boundary

  19. The surprising power of neighborly advice.

    Science.gov (United States)

    Gilbert, Daniel T; Killingsworth, Matthew A; Eyre, Rebecca N; Wilson, Timothy D

    2009-03-20

    Two experiments revealed that (i) people can more accurately predict their affective reactions to a future event when they know how a neighbor in their social network reacted to the event than when they know about the event itself and (ii) people do not believe this. Undergraduates made more accurate predictions about their affective reactions to a 5-minute speed date (n = 25) and to a peer evaluation (n = 88) when they knew only how another undergraduate had reacted to these events than when they had information about the events themselves. Both participants and independent judges mistakenly believed that predictions based on information about the event would be more accurate than predictions based on information about how another person had reacted to it.

  20. Time-Scale Invariant Audio Data Embedding

    Directory of Open Access Journals (Sweden)

    Mansour Mohamed F

    2003-01-01

    Full Text Available We propose a novel algorithm for high-quality data embedding in audio. The algorithm is based on changing the relative length of the middle segment between two successive maximum and minimum peaks to embed data. Spline interpolation is used to change the lengths. To ensure smooth monotonic behavior between peaks, a hybrid orthogonal and nonorthogonal wavelet decomposition is used prior to data embedding. The possible data embedding rates are between 20 and 30 bps. However, for practical purposes, we use repetition codes, and the effective embedding data rate is around 5 bps. The algorithm is invariant after time-scale modification, time shift, and time cropping. It gives high-quality output and is robust to mp3 compression.

  1. The impact of vacant, tax-delinquent, and foreclosed property on sales prices of neighboring homes

    OpenAIRE

    Stephan Whitaker; Thomas J. Fitzpatrick

    2012-01-01

    In this empirical analysis, we estimate the impact of vacancy, neglect associated with property-tax delinquency, and foreclosures on the value of neighboring homes using parcel-level observations. Numerous studies have estimated the impact of foreclosures on neighboring properties, and these papers theorize that the foreclosure impact works partially through creating vacant and neglected homes. To our knowledge, this is only the second attempt to estimate the impact of vacancy itself and the ...

  2. The Activation of Embedded Words in Spoken Word Recognition.

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster ) indexed activation of the embedded words (e.g., ham ). When the listening conditions were optimal, isolated embedded words (e.g., ham ) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster ), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions.

  3. Embedding Complementarity in HCI Methods and Techniques

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... the HCI paradigm in system development....

  4. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...

  5. Resampling nucleotide sequences with closest-neighbor trimming and its comparison to other methods.

    Directory of Open Access Journals (Sweden)

    Kouki Yonezawa

    Full Text Available A large number of nucleotide sequences of various pathogens are available in public databases. The growth of the datasets has resulted in an enormous increase in computational costs. Moreover, due to differences in surveillance activities, the number of sequences found in databases varies from one country to another and from year to year. Therefore, it is important to study resampling methods to reduce the sampling bias. A novel algorithm-called the closest-neighbor trimming method-that resamples a given number of sequences from a large nucleotide sequence dataset was proposed. The performance of the proposed algorithm was compared with other algorithms by using the nucleotide sequences of human H3N2 influenza viruses. We compared the closest-neighbor trimming method with the naive hierarchical clustering algorithm and [Formula: see text]-medoids clustering algorithm. Genetic information accumulated in public databases contains sampling bias. The closest-neighbor trimming method can thin out densely sampled sequences from a given dataset. Since nucleotide sequences are among the most widely used materials for life sciences, we anticipate that our algorithm to various datasets will result in reducing sampling bias.

  6. Smart multicore embedded systems

    CERN Document Server

    Bertels, Koen; Karlsson, Sven; Pacull, François

    2014-01-01

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors’ approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generati...

  7. Dynamical correlation functions of the S=1/2 nearest-neighbor and Haldane-Shastry Heisenberg antiferromagnetic chains in zero and applied fields

    DEFF Research Database (Denmark)

    Lefmann, K.; Rischel, C.

    1996-01-01

    We present a numerical diagonalization study of two one-dimensional S=1/2 antiferromagnetic Heisenberg chains, having nearest-neighbor and Haldane-Shastry (1/r(2)) interactions, respectively. We have obtained the T=0 dynamical correlation function, S-alpha alpha(q,omega), for chains of length N=8......-28. We have studied S-zz(q,omega) for the Heisenberg chain in zero field, and from finite-size scaling we have obtained a limiting behavior that for large omega deviates from the conjecture proposed earlier by Muller ct al. For both chains we describe the behavior of S-zz(q,omega) and S...

  8. Seismic clusters analysis in Northeastern Italy by the nearest-neighbor approach

    Science.gov (United States)

    Peresan, Antonella; Gentili, Stefania

    2018-01-01

    The main features of earthquake clusters in Northeastern Italy are explored, with the aim to get new insights on local scale patterns of seismicity in the area. The study is based on a systematic analysis of robustly and uniformly detected seismic clusters, which are identified by a statistical method, based on nearest-neighbor distances of events in the space-time-energy domain. The method permits us to highlight and investigate the internal structure of earthquake sequences, and to differentiate the spatial properties of seismicity according to the different topological features of the clusters structure. To analyze seismicity of Northeastern Italy, we use information from local OGS bulletins, compiled at the National Institute of Oceanography and Experimental Geophysics since 1977. A preliminary reappraisal of the earthquake bulletins is carried out and the area of sufficient completeness is outlined. Various techniques are considered to estimate the scaling parameters that characterize earthquakes occurrence in the region, namely the b-value and the fractal dimension of epicenters distribution, required for the application of the nearest-neighbor technique. Specifically, average robust estimates of the parameters of the Unified Scaling Law for Earthquakes, USLE, are assessed for the whole outlined region and are used to compute the nearest-neighbor distances. Clusters identification by the nearest-neighbor method turn out quite reliable and robust with respect to the minimum magnitude cutoff of the input catalog; the identified clusters are well consistent with those obtained from manual aftershocks identification of selected sequences. We demonstrate that the earthquake clusters have distinct preferred geographic locations, and we identify two areas that differ substantially in the examined clustering properties. Specifically, burst-like sequences are associated with the north-western part and swarm-like sequences with the south-eastern part of the study

  9. Energy Efficiency of Task Allocation for Embedded JPEG Systems

    Directory of Open Access Journals (Sweden)

    Yang-Hsin Fan

    2014-01-01

    Full Text Available Embedded system works everywhere for repeatedly performing a few particular functionalities. Well-known products include consumer electronics, smart home applications, and telematics device, and so forth. Recently, developing methodology of embedded systems is applied to conduct the design of cloud embedded system resulting in the applications of embedded system being more diverse. However, the more energy consumes result from the more embedded system works. This study presents hyperrectangle technology (HT to embedded system for obtaining energy saving. The HT adopts drift effect to construct embedded systems with more hardware circuits than software components or vice versa. It can fast construct embedded system with a set of hardware circuits and software components. Moreover, it has a great benefit to fast explore energy consumption for various embedded systems. The effects are presented by assessing a JPEG benchmarks. Experimental results demonstrate that the HT, respectively, achieves the energy saving by 29.84%, 2.07%, and 68.80% on average to GA, GHO, and Lin.

  10. Energy efficiency of task allocation for embedded JPEG systems.

    Science.gov (United States)

    Fan, Yang-Hsin; Wu, Jan-Ou; Wang, San-Fu

    2014-01-01

    Embedded system works everywhere for repeatedly performing a few particular functionalities. Well-known products include consumer electronics, smart home applications, and telematics device, and so forth. Recently, developing methodology of embedded systems is applied to conduct the design of cloud embedded system resulting in the applications of embedded system being more diverse. However, the more energy consumes result from the more embedded system works. This study presents hyperrectangle technology (HT) to embedded system for obtaining energy saving. The HT adopts drift effect to construct embedded systems with more hardware circuits than software components or vice versa. It can fast construct embedded system with a set of hardware circuits and software components. Moreover, it has a great benefit to fast explore energy consumption for various embedded systems. The effects are presented by assessing a JPEG benchmarks. Experimental results demonstrate that the HT, respectively, achieves the energy saving by 29.84%, 2.07%, and 68.80% on average to GA, GHO, and Lin.

  11. The neighbor enclosed area tracking algorithm and its application to cyclone merger in the midlatitudes

    Science.gov (United States)

    Inatsu, Masaru; Amada, Shotarou; Satake, Yuya

    2010-05-01

    The neighbor enclosed area tracking (NEAT) algorithm is proposed as an alternative method to conventional point-to-point cyclone tracking approaches. Most automated Lagrangian tracking algorithms contain three procedures: cyclone identification, cyclone tracking, and quantification of cyclone intensity and activity. The cyclone identification was simply based on a comparison of neighboring grid points; cyclone tracking mainly employed a near-neighbor point search to neighbor-time cyclone-center datasets; and cyclone intensity and activity are mainly quantified as cyclone track density, and other accompanying products such as genesis and lysis densities, mean lifetime, average moving vector, and mean growth rate can also be obtained in the final procedure. But a crucial problem in the above technique is its requirement of some complicated connecting conditions for near-neighbor tracking. To overcome the problem, NEAT completes cyclone identification and cyclone tracking in a single process of equivalent labeling for spatiotemporally connected domains, i.e., if two spatially enclosed areas in a neighboring time frame overlap, they should be connected. NEAT enables us to count the genesis and tracks of individual cyclones as the conventional tracking. Moreover, NEAT has the ability to produce fruitful information on cyclone mergers and separations, cyclone shape, and material transport by individual eddies (the latter two features will be reported elsewhere). There are many possible applications of NEAT to meteorology and oceanography, but now we focus on the situation, well-known by Japanese synopticians, that two cyclones pass respectively over the north and south of Japan and then they frequently merge and are rapidly deepened in the western Pacific. For the case, the southern cyclones tend to be stimulated just above the sea surface temperature front to the north of oceanic western boundary currents, while the northern cyclones, moving eastward along the polar

  12. Stuttering Attitudes among Turkish Family Generations and Neighbors from Representative Samples

    Science.gov (United States)

    Ozdemir, R. Sertan; St. Louis, Kenneth O.; Topbas, Seyhun

    2011-01-01

    Purpose: Attitudes toward stuttering, measured by the "Public Opinion Survey of Human Attributes-Stuttering" ("POSHA-S"), are compared among (a) two different representative samples; (b) family generations (children, parents, and either grandparents or uncles and aunts) and neighbors; (c) children, parents, grandparents/adult…

  13. The Activation of Embedded Words in Spoken Word Recognition

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G.

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster) indexed activation of the embedded words (e.g., ham). When the listening conditions were optimal, isolated embedded words (e.g., ham) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions. PMID:25593407

  14. Type Ia supernova rate measurements to redshift 2.5 from CANDELS: Searching for prompt explosions in the early universe

    Energy Technology Data Exchange (ETDEWEB)

    Rodney, Steven A.; Riess, Adam G.; Graur, Or; Jones, David O. [Department of Physics and Astronomy, The Johns Hopkins University, Baltimore, MD 21218 (United States); Strolger, Louis-Gregory; Dahlen, Tomas; Casertano, Stefano; Ferguson, Henry C.; Koekemoer, Anton M. [Space Telescope Science Institute, Baltimore, MD 21218 (United States); Dickinson, Mark E. [National Optical Astronomy Observatory, 950 North Cherry Avenue, Tucson, AZ 85719 (United States); Garnavich, Peter [Department of Physics, University of Notre Dame, Notre Dame, IN 46556 (United States); Hayden, Brian [E.O. Lawrence Berkeley National Lab, 1 Cyclotron Road, Berkeley, CA 94720 (United States); Jha, Saurabh W.; McCully, Curtis; Patel, Brandon [Department of Physics and Astronomy, Rutgers, The State University of New Jersey, Piscataway, NJ 08854 (United States); Kirshner, Robert P. [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA 02138 (United States); Mobasher, Bahram [Department of Physics and Astronomy, University of California, Riverside, CA 92521 (United States); Weiner, Benjamin J. [Department of Astronomy, University of Arizona, Tucson, AZ 85721 (United States); Cenko, S. Bradley [Astrophysics Science Division, NASA Goddard Space Flight Center, Mail Code 661, Greenbelt, MD 20771 (United States); Clubb, Kelsey I. [Department of Astronomy, University of California, Berkeley, CA 94720 (United States); and others

    2014-07-01

    The Cosmic Assembly Near-infrared Deep Extragalactic Legacy Survey (CANDELS) was a multi-cycle treasury program on the Hubble Space Telescope (HST) that surveyed a total area of ∼0.25 deg{sup 2} with ∼900 HST orbits spread across five fields over three years. Within these survey images we discovered 65 supernovae (SNe) of all types, out to z ∼ 2.5. We classify ∼24 of these as Type Ia SNe (SNe Ia) based on host galaxy redshifts and SN photometry (supplemented by grism spectroscopy of six SNe). Here we present a measurement of the volumetric SN Ia rate as a function of redshift, reaching for the first time beyond z = 2 and putting new constraints on SN Ia progenitor models. Our highest redshift bin includes detections of SNe that exploded when the universe was only ∼3 Gyr old and near the peak of the cosmic star formation history. This gives the CANDELS high redshift sample unique leverage for evaluating the fraction of SNe Ia that explode promptly after formation (<500 Myr). Combining the CANDELS rates with all available SN Ia rate measurements in the literature we find that this prompt SN Ia fraction is f{sub P} = 0.53{sub stat0.10}{sup ±0.09}{sub sys0.26}{sup ±0.10}, consistent with a delay time distribution that follows a simple t {sup –1} power law for all times t > 40 Myr. However, mild tension is apparent between ground-based low-z surveys and space-based high-z surveys. In both CANDELS and the sister HST program CLASH (Cluster Lensing And Supernova Survey with Hubble), we find a low rate of SNe Ia at z > 1. This could be a hint that prompt progenitors are in fact relatively rare, accounting for only 20% of all SN Ia explosions—though further analysis and larger samples will be needed to examine that suggestion.

  15. Costs and benefits of embedded generation

    International Nuclear Information System (INIS)

    1999-11-01

    This project sought to evaluate the costs and benefits of embedded generation in the light of the UK government's consultation paper on the future of green generation, the government's aim to increase the levels of generation from renewable energy sources and cogeneration, the current Review of the Electricity Trading Arrangements, and the form of the Distribution Price Control. Definitions are given for embedded, centrally dispatched, and pooled generation, and licensed suppliers, and commercial and economic values. The commercial and economic value of embedded generation is examined in terms of generation prices, costs to electrical suppliers, losses (electrical, transmission, distribution), and effects on the national grid and distribution network. Diagrams showing the cost elements of trading through the Pool and the elements that are avoided by non-Pool embedded generator trading are presented

  16. Steganographic embedding in containers-images

    Science.gov (United States)

    Nikishova, A. V.; Omelchenko, T. A.; Makedonskij, S. A.

    2018-05-01

    Steganography is one of the approaches to ensuring the protection of information transmitted over the network. But a steganographic method should vary depending on a used container. According to statistics, the most widely used containers are images and the most common image format is JPEG. Authors propose a method of data embedding into a frequency area of images in format JPEG 2000. It is proposed to use the method of Benham-Memon- Yeo-Yeung, in which instead of discrete cosine transform, discrete wavelet transform is used. Two requirements for images are formulated. Structure similarity is chosen to obtain quality assessment of data embedding. Experiments confirm that requirements satisfaction allows achieving high quality assessment of data embedding.

  17. The Patient-Centered Medical Home Neighbor: A Critical Concept for a Redesigned Healthcare Delivery System

    Science.gov (United States)

    2011-01-25

    Sharing Knowledge: Achieving Breakthrough Performance 2010 Military Health System Conference The Patient -Centered Medical Home Neighbor: A Critical...DATE 25 JAN 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE The Patient -Centered Medical Home Neighbor: A...Conference What is the Patient -Centered Medical Home?  …a vision of health care as it should be  …a framework for organizing systems of care at both the

  18. A two-step nearest neighbors algorithm using satellite imagery for predicting forest structure within species composition classes

    Science.gov (United States)

    Ronald E. McRoberts

    2009-01-01

    Nearest neighbors techniques have been shown to be useful for predicting multiple forest attributes from forest inventory and Landsat satellite image data. However, in regions lacking good digital land cover information, nearest neighbors selected to predict continuous variables such as tree volume must be selected without regard to relevant categorical variables such...

  19. Investigating the diversity of supernovae type Iax

    DEFF Research Database (Denmark)

    Lyman, J. D.; Taddia, F.; Stritzinger, M. D.

    2018-01-01

    to either normal SNe Ia or SN 1991T-like events. Fainter members, speculated to form distinctly from brighter SN Iax, are found at a range of metallicities, extending to very metal poor environments. Although the SN Iax explosion-sites' ages and star formation rates are comparatively older and less intense...... than the distribution of star-forming regions across their host galaxies, we confirm the presence of young stellar populations (SPs) at explosion environments for most SNe Iax, expanded here to a larger sample. Ages of the young SPs (several x 10(7) to 10(8) yr) are consistent with predictions...... both integral-field and long-slit visual-wavelength spectroscopy of the host galaxies and explosion sites of SNe Iax to provide constraints on their progenitor formation scenarios. The SN Iax explosion-site metallicity distribution is similar to that of core-collapse SNe and metal poor compared...

  20. Embedding initial data for black hole collisions

    OpenAIRE

    Romano, Joseph D.; Price, Richard H.

    1994-01-01

    We discuss isometric embedding diagrams for the visualization of initial data for the problem of the head-on collision of two black holes. The problem of constructing the embedding diagrams is explicitly presented for the best studied initial data, the Misner geometry. We present a partial solution of the embedding diagrams and discuss issues related to completing the solution.

  1. Single cell transcriptomics of neighboring hyphae of Aspergillus niger

    Science.gov (United States)

    2011-01-01

    Single cell profiling was performed to assess differences in RNA accumulation in neighboring hyphae of the fungus Aspergillus niger. A protocol was developed to isolate and amplify RNA from single hyphae or parts thereof. Microarray analysis resulted in a present call for 4 to 7% of the A. niger genes, of which 12% showed heterogeneous RNA levels. These genes belonged to a wide range of gene categories. PMID:21816052

  2. Embedded Academic Librarianship: A Review of the Literature

    Directory of Open Access Journals (Sweden)

    Stephanie J. Schulte

    2012-12-01

    Full Text Available Objectives – The purpose of this review is to examine the development of embedded librarianship, its multiple meanings, and activities in practice. The review will also report on published outcomes and future research needs of embedded librarian programs.Methods – A search of current literature was conducted and summarized searching PubMed, CINAHL, Library, Information Science & Technology Abstracts (EBSCO, Academic Search Complete, and ERIC (EBSCO through August 23, 2012. Articles wereselected for inclusion in the review if they reported research findings related to embedded librarianship, if they provided unique case reports about embedded librarian programs, or if they provided substantive editorial comments on the topic. Relevant study findings were assessed for quality and presented in tabular and narrative form.Results – Currently, there is disparity in how embedded librarianship is being definedand used in common practice, ranging from embedding an online component into asingle course to full physical and cultural integration into an academic college orbusiness unit of an organization. Activities of embedded librarians include creatingcourse integrated instruction modules for either face-to-face or online courses, providingin depth research assistance to students or faculty, and co-locating within colleges orcustomer units via office hours for a few hours to all hours per week. Several case reports exist in the recent literature. Few high quality research studies reporting outcomes of librarians or library programs labeled as embedded exist at this point. Some evidence suggests that embedded librarians are effective with regards to student learning of information literacy objectives. Surveys suggest that both students and faculty appreciate embedded librarian services.Conclusion – Most published accounts discuss librarians embedding content and ready access to services in an online course management system. A few notable cases

  3. Modeling of Embedded Human Systems

    Science.gov (United States)

    2013-07-01

    ISAT study [7] for DARPA in 20051 concretized the notion of an embedded human, who is a necessary component of the system. The proposed work integrates...Technology, IEEE Transactions on, vol. 16, no. 2, pp. 229–244, March 2008. [7] C. J. Tomlin and S. S. Sastry, “Embedded humans,” tech. rep., DARPA ISAT

  4. Methodology and Supporting Toolset Advancing Embedded Systems Quality

    DEFF Research Database (Denmark)

    Berger, Michael Stübert; Soler, José; Brewka, Lukasz Jerzy

    2013-01-01

    Software quality is of primary importance in the development of embedded systems that are often used in safety-critical applications. Moreover, as the life cycle of embedded products becomes increasingly tighter, productivity and quality are simultaneously required and closely interrelated towards...... delivering competitive products. In this context, the MODUS (Methodology and supporting toolset advancing embedded systems quality) project aims to provide a pragmatic and viable solution that will allow SMEs to substantially improve their positioning in the embedded-systems development market. This paper...... will describe the MODUS project with focus on the technical methodologies that will be developed advancing embedded system quality....

  5. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  6. Novel photodefined polymer-embedded vias for silicon interposers

    International Nuclear Information System (INIS)

    Thadesar, Paragkumar A; Bakir, Muhannad S

    2013-01-01

    This paper describes the fabrication and characterization of novel photodefined polymer-embedded vias for silicon interposers. The fabricated polymer-embedded vias can help obtain ∼3.8× reduction in via-to-via capacitance as well as a reduction in insertion loss compared to TSVs with a silicon dioxide liner. Polymer-embedded vias 100 μm in diameter, 270 μm tall and at 250 μm pitch were fabricated. Resistance and leakage measurements were performed for the fabricated polymer-embedded vias. The average value of the measured resistance for 20 polymer-embedded vias is 2.54 mΩ and the maximum measured via-to-via leakage current for 10 pairs of polymer-embedded vias is 80.8 pA for an applied voltage of 200 V. (paper)

  7. Numerical Simulation of the Diffusion Processes in Nanoelectrode Arrays Using an Axial Neighbor Symmetry Approximation.

    Science.gov (United States)

    Peinetti, Ana Sol; Gilardoni, Rodrigo S; Mizrahi, Martín; Requejo, Felix G; González, Graciela A; Battaglini, Fernando

    2016-06-07

    Nanoelectrode arrays have introduced a complete new battery of devices with fascinating electrocatalytic, sensitivity, and selectivity properties. To understand and predict the electrochemical response of these arrays, a theoretical framework is needed. Cyclic voltammetry is a well-fitted experimental technique to understand the undergoing diffusion and kinetics processes. Previous works describing microelectrode arrays have exploited the interelectrode distance to simulate its behavior as the summation of individual electrodes. This approach becomes limited when the size of the electrodes decreases to the nanometer scale due to their strong radial effect with the consequent overlapping of the diffusional fields. In this work, we present a computational model able to simulate the electrochemical behavior of arrays working either as the summation of individual electrodes or being affected by the overlapping of the diffusional fields without previous considerations. Our computational model relays in dividing a regular electrode array in cells. In each of them, there is a central electrode surrounded by neighbor electrodes; these neighbor electrodes are transformed in a ring maintaining the same active electrode area than the summation of the closest neighbor electrodes. Using this axial neighbor symmetry approximation, the problem acquires a cylindrical symmetry, being applicable to any diffusion pattern. The model is validated against micro- and nanoelectrode arrays showing its ability to predict their behavior and therefore to be used as a designing tool.

  8. Compact FPGA hardware architecture for public key encryption in embedded devices.

    Science.gov (United States)

    Rodríguez-Flores, Luis; Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in [Formula: see text], commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x).

  9. Uniaxial in-plane magnetization of iron nanolayers grown within an amorphous matrix

    Energy Technology Data Exchange (ETDEWEB)

    Ghafari, M., E-mail: mohammad.ghafari@kit.edu; Hahn, H. [Herbert Gleiter Institute of Nanoscience, Nanjing University of Science and Technology, Nanjing 210094 (China); Institute of Nanotechnology, Karlsruhe Institute of Technology (KIT), Hermann-von-Helmholtz-Platz 1, 76344 Eggenstein-Leopoldshafen (Germany); Mattheis, R. [Leibniz Institute for Photonic Technology IPHT, Jena (Germany); McCord, J. [Institute for Materials Science, Kiel University Kiel, Kaiserstraße 2, 24143 Kiel (Germany); Brand, R. A. [Institute of Nanotechnology, Karlsruhe Institute of Technology (KIT), Hermann-von-Helmholtz-Platz 1, 76344 Eggenstein-Leopoldshafen (Germany); Macedo, W. A. A. [Laboratório de Física Aplicada, Centro de Desenvolvimento da Tecnologia Nuclear (CDTN), 31270-901 Belo Horizonte, MG (Brazil)

    2014-08-18

    Conversion electron Mössbauer spectroscopy is used to determine the magnetic ground state at zero magnetic field of four-monolayer thick amorphous iron layers as part of a CoFeB-Fe multilayer stack. By comparing the intensities of the magnetic hyperfine field, an easy in-plane axis of the amorphous embedded Fe layer is verified, which is collinear to the uniaxial anisotropy axis of the neighboring amorphous CoFeB. Despite the soft magnetic character of the Fe layers, external fields up to 4 T perpendicular to the film plane are insufficient to completely align the embedded Fe moments parallel to the magnetic field due to a local disorder of the magnetic moments of the Fe atoms.

  10. Genome sequencing and annotation of Amycolatopsis vancoresmycina strain DSM 44592T

    Directory of Open Access Journals (Sweden)

    Navjot Kaur

    2014-12-01

    Full Text Available We report the 9.0-Mb draft genome of Amycolatopsis vancoresmycina strain DSM 44592T, isolated from Indian soil sample; produces antibiotic vancoresmycin. Draft genome of strain DSM44592T consists of 9,037,069 bp with a G+C content of 71.79% and 8340 predicted protein coding genes and 57 RNAs. RAST annotation indicates that strains Streptomyces sp. AA4 (score 521, Saccharomonospora viridis DSM 43017 (score 400 and Actinosynnema mirum DSM 43827 (score 372 are the closest neighbors of the strain DSM 44592T.

  11. Effect of electrode design on crosstalk between neighboring organic field-effect transistors based on one single crystal

    Science.gov (United States)

    Li, Mengjie; Tang, Qingxin; Tong, Yanhong; Zhao, Xiaoli; Zhou, Shujun; Liu, Yichun

    2018-03-01

    The design of high-integration organic circuits must be such that the interference between neighboring devices is eliminated. Here, rubrene crystals were used to study the effect of the electrode design on crosstalk between neighboring organic field-effect transistors (OFETs). Results show that a decreased source/drain interval and gate electrode width can decrease the diffraction distance of the current, and therefore can weaken the crosstalk. In addition, the inherent low carrier concentration in organic semiconductors can create a high-resistance barrier at the space between gate electrodes of neighboring devices, limiting or even eliminating the crosstalk as a result of the gate electrode width being smaller than the source/drain electrode width.

  12. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    embedding theory, a given spacetime (or 'brane') is embedded in a higher- ..... If one recalls that the motivation (at least in part) for non-compact extra ... to successfully embed (apparently perfect fluid) astrophysical models, we typically need to.

  13. Embedded Hyperchaotic Generators: A Comparative Analysis

    Science.gov (United States)

    Sadoudi, Said; Tanougast, Camel; Azzaz, Mohamad Salah; Dandache, Abbas

    In this paper, we present a comparative analysis of FPGA implementation performances, in terms of throughput and resources cost, of five well known autonomous continuous hyperchaotic systems. The goal of this analysis is to identify the embedded hyperchaotic generator which leads to designs with small logic area cost, satisfactory throughput rates, low power consumption and low latency required for embedded applications such as secure digital communications between embedded systems. To implement the four-dimensional (4D) chaotic systems, we use a new structural hardware architecture based on direct VHDL description of the forth order Runge-Kutta method (RK-4). The comparative analysis shows that the hyperchaotic Lorenz generator provides attractive performances compared to that of others. In fact, its hardware implementation requires only 2067 CLB-slices, 36 multipliers and no block RAMs, and achieves a throughput rate of 101.6 Mbps, at the output of the FPGA circuit, at a clock frequency of 25.315 MHz with a low latency time of 316 ns. Consequently, these good implementation performances offer to the embedded hyperchaotic Lorenz generator the advantage of being the best candidate for embedded communications applications.

  14. Attribute Weighting Based K-Nearest Neighbor Using Gain Ratio

    Science.gov (United States)

    Nababan, A. A.; Sitompul, O. S.; Tulus

    2018-04-01

    K- Nearest Neighbor (KNN) is a good classifier, but from several studies, the result performance accuracy of KNN still lower than other methods. One of the causes of the low accuracy produced, because each attribute has the same effect on the classification process, while some less relevant characteristics lead to miss-classification of the class assignment for new data. In this research, we proposed Attribute Weighting Based K-Nearest Neighbor Using Gain Ratio as a parameter to see the correlation between each attribute in the data and the Gain Ratio also will be used as the basis for weighting each attribute of the dataset. The accuracy of results is compared to the accuracy acquired from the original KNN method using 10-fold Cross-Validation with several datasets from the UCI Machine Learning repository and KEEL-Dataset Repository, such as abalone, glass identification, haberman, hayes-roth and water quality status. Based on the result of the test, the proposed method was able to increase the classification accuracy of KNN, where the highest difference of accuracy obtained hayes-roth dataset is worth 12.73%, and the lowest difference of accuracy obtained in the abalone dataset of 0.07%. The average result of the accuracy of all dataset increases the accuracy by 5.33%.

  15. The art of designing embedded systems

    CERN Document Server

    Ganssle, Jack G

    2000-01-01

    Art of Designing Embedded Systems is apart primer and part reference, aimed at practicing embedded engineers, whether working on the code or the hardware design. Embedded systems suffer from a chaotic, ad hoc development process. This books lays out a very simple seven-step plan to get firmware development under control. There are no formal methodologies to master; the ideas are immediately useful. Most designers are unaware that code complexity grows faster than code size. This book shows a number of ways to linearize the complexity/size curve and get products out faster

  16. Embedded Solenoid Transformer for Power Conversion

    DEFF Research Database (Denmark)

    2015-01-01

    A resonant power converter for operation in the radio frequency range, preferably in the VHF, comprises at least one PCB-embedded transformer. The transformer is configured for radio frequency operation and comprises a printed circuit board defining a horizontal plane, the printed circuit board...... comprising at least two horizontal conductive layers separated by an isolating layer, a first embedded solenoid forming a primary winding of the transformer and a second embedded solenoid being arranged parallel to the first solenoid and forming a secondary winding of the transformer, wherein the first...

  17. Bootstrap embedding: An internally consistent fragment-based method

    Energy Technology Data Exchange (ETDEWEB)

    Welborn, Matthew; Tsuchimochi, Takashi; Van Voorhis, Troy [Department of Chemistry, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, Massachusetts 02139 (United States)

    2016-08-21

    Strong correlation poses a difficult problem for electronic structure theory, with computational cost scaling quickly with system size. Fragment embedding is an attractive approach to this problem. By dividing a large complicated system into smaller manageable fragments “embedded” in an approximate description of the rest of the system, we can hope to ameliorate the steep cost of correlated calculations. While appealing, these methods often converge slowly with fragment size because of small errors at the boundary between fragment and bath. We describe a new electronic embedding method, dubbed “Bootstrap Embedding,” a self-consistent wavefunction-in-wavefunction embedding theory that uses overlapping fragments to improve the description of fragment edges. We apply this method to the one dimensional Hubbard model and a translationally asymmetric variant, and find that it performs very well for energies and populations. We find Bootstrap Embedding converges rapidly with embedded fragment size, overcoming the surface-area-to-volume-ratio error typical of many embedding methods. We anticipate that this method may lead to a low-scaling, high accuracy treatment of electron correlation in large molecular systems.

  18. Nearest neighbor affects G:C to A:T transitions induced by alkylating agents.

    OpenAIRE

    Glickman, B W; Horsfall, M J; Gordon, A J; Burns, P A

    1987-01-01

    The influence of local DNA sequence on the distribution of G:C to A:T transitions induced in the lacI gene of E. coli by a series of alkylating agents has been analyzed. In the case of nitrosoguanidine, two nitrosoureas and a nitrosamine, a strong preference for mutation at sites proceeded 5' by a purine base was noted. This preference was observed with both methyl and ethyl donors where the predicted common ultimate alkylating species is the alkyl diazonium ion. In contrast, this preference ...

  19. Embedded librarianship what every academic librarian should know

    CERN Document Server

    Russo, Michael F

    2013-01-01

    Is the embedded librarian an equal partner in the course, or is the librarian perceived as a "value-added" extra? What is the place of technology in this effort? Is there a line librarians should not cross? Taking into account both theory and practice to discuss multiple facets of the subject, Embedded Librarianship: What Every Academic Librarian Should Know thoroughly examines these questions and more from the perspectives of experienced embedded librarian contributors who have worked in higher education settings. The chapters illuminate the benefits and challenges of embedding, explain the planning required to set up an embedded course, identify the different forms of embedding, and consider information literacy instruction in various contexts. Readers who will benefit from this work include not only academic librarians but any professor who wants their students to be able to do better research in their fields.

  20. The very young resolved stellar populations around stripped-envelope supernovae

    Science.gov (United States)

    Maund, Justyn R.

    2018-05-01

    The massive star origins for Type IIP supernovae (SNe) have been established through direct detection of their red supergiants progenitors in pre-explosion observations; however, there has been limited success in the detection of the progenitors of H-deficient SNe. The final fate of more massive stars, capable of undergoing a Wolf-Rayet phase, and the origins of Type Ibc SNe remain debated, including the relative importance of single massive star progenitors or lower mass stars stripped in binaries. We present an analysis of the ages and spatial distributions of massive stars around the sites of 23 stripped-envelope SNe, as observed with the Hubble Space Telescope, to probe the possible origins of the progenitors of these events. Using a Bayesian stellar populations analysis scheme, we find characteristic ages for the populations observed within 150 pc of the target Type IIb, Ib, and Ic SNe to be log (t) = 7.20, 7.05, and 6.57, respectively. The Type Ic SNe in the sample are nearly all observed within 100 pc of young, dense stellar populations. The environment around SN 2002ap is an important exception both in terms of age and spatial properties. These findings may support the hypothesis that stars with Minit > 30 M⊙ produce a relatively large proportion of Type Ibc SNe, and that these SN subtypes arise from progressively more massive progenitors. Significantly higher extinctions are derived towards the populations hosting these SNe than previously used in analysis of constraints from pre-explosion observations. The large initial masses inferred for the progenitors are in stark contrast with the low ejecta masses estimated from SN light curves.

  1. Development of an Embedded Networked Sensing System for Structural Health Monitoring

    OpenAIRE

    Whang, Daniel; Xu, Ning; Rangwala, Sumit; Chintalapudi, Krishna; Govindan, Ramesh; Wallace, J W

    2004-01-01

    An innovative networked embedded sensing system for structural health monitoring is currently being developed. This sensor network has been prototyped in the laboratory, and will be deployed in a series of forced-vibration tests involving a full-scale, four-story office building in the next coming months. The low-power wireless seismic sensor system enables the acquisition of 15–30 channels of 16-bit accelerometer data at 128 Hz over a wireless network. The advantage of such a system is its t...

  2. Multithreading for Embedded Reconfigurable Multicore Systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  3. Multithreading for embedded reconfigurable multicore systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  4. Heterogeneous Embedded Real-Time Systems Environment

    Science.gov (United States)

    2003-12-01

    AFRL-IF-RS-TR-2003-290 Final Technical Report December 2003 HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT Integrated...HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT 6. AUTHOR(S) Cosmo Castellano and James Graham 5. FUNDING NUMBERS C - F30602-97-C-0259

  5. Learn good from bad: Effects of good and bad neighbors in spatial prisoners' dilemma games

    Science.gov (United States)

    Lu, Peng

    2015-10-01

    Cooperation is vital for the human society and this study focuses on how to promote cooperation. In our stratification model, there exist three classes: two minorities are elites who are prone to cooperate and scoundrels who are born to defect; one majority is the class of common people. Agents of these three classes interact with each other on a square lattice. Commons' cooperation and its factors are investigated. Contradicting our common sense, it indicates that elites play a negative role while scoundrels play a positive one in promoting commons' cooperation. Besides, effects of good and bad neighbors vary with temptation. When the temptation is smaller the positive effect is able to overcome the negative effect, but the later prevails when the temptation is larger. It concludes that common people are more prone to cooperate in harsh environment with bad neighbors, and a better environment with good neighbors merely leads to laziness and free riding of commons.

  6. The nearest neighbor and the bayes error rates.

    Science.gov (United States)

    Loizou, G; Maybank, S J

    1987-02-01

    The (k, l) nearest neighbor method of pattern classification is compared to the Bayes method. If the two acceptance rates are equal then the asymptotic error rates satisfy the inequalities Ek,l + 1 ¿ E*(¿) ¿ Ek,l dE*(¿), where d is a function of k, l, and the number of pattern classes, and ¿ is the reject threshold for the Bayes method. An explicit expression for d is given which is optimal in the sense that for some probability distributions Ek,l and dE* (¿) are equal.

  7. Cell membrane disruption stimulates cAMP and Ca2+ signaling to potentiate cell membrane resealing in neighboring cells

    Directory of Open Access Journals (Sweden)

    Tatsuru Togo

    2017-12-01

    Full Text Available Disruption of cellular plasma membranes is a common event in many animal tissues, and the membranes are usually rapidly resealed. Moreover, repeated membrane disruptions within a single cell reseal faster than the initial wound in a protein kinase A (PKA- and protein kinase C (PKC-dependent manner. In addition to wounded cells, recent studies have demonstrated that wounding of Madin-Darby canine kidney (MDCK cells potentiates membrane resealing in neighboring cells in the short-term by purinergic signaling, and in the long-term by nitric oxide/protein kinase G signaling. In the present study, real-time imaging showed that cell membrane disruption stimulated cAMP synthesis and Ca2+ mobilization from intracellular stores by purinergic signaling in neighboring MDCK cells. Furthermore, inhibition of PKA and PKC suppressed the ATP-mediated short-term potentiation of membrane resealing in neighboring cells. These results suggest that cell membrane disruption stimulates PKA and PKC via purinergic signaling to potentiate cell membrane resealing in neighboring MDCK cells.

  8. Fast Most Similar Neighbor (MSN) classifiers for Mixed Data

    OpenAIRE

    Hernández Rodríguez, Selene

    2010-01-01

    The k nearest neighbor (k-NN) classifier has been extensively used in Pattern Recognition because of its simplicity and its good performance. However, in large datasets applications, the exhaustive k-NN classifier becomes impractical. Therefore, many fast k-NN classifiers have been developed; most of them rely on metric properties (usually the triangle inequality) to reduce the number of prototype comparisons. Hence, the existing fast k-NN classifiers are applicable only when the comparison f...

  9. Antiferromagnetic geometric frustration under the influence of the next-nearest-neighbor interaction. An exactly solvable model

    Science.gov (United States)

    Jurčišinová, E.; Jurčišin, M.

    2018-02-01

    The influence of the next-nearest-neighbor interaction on the properties of the geometrically frustrated antiferromagnetic systems is investigated in the framework of the exactly solvable antiferromagnetic spin- 1 / 2 Ising model in the external magnetic field on the square-kagome recursive lattice, where the next-nearest-neighbor interaction is supposed between sites within each elementary square of the lattice. The thermodynamic properties of the model are investigated in detail and it is shown that the competition between the nearest-neighbor antiferromagnetic interaction and the next-nearest-neighbor ferromagnetic interaction changes properties of the single-point ground states but does not change the frustrated character of the basic model. On the other hand, the presence of the antiferromagnetic next-nearest-neighbor interaction leads to the enhancement of the frustration effects with the formation of additional plateau and single-point ground states at low temperatures. Exact expressions for magnetizations and residual entropies of all ground states of the model are found. It is shown that the model exhibits various ground states with the same value of magnetization but different macroscopic degeneracies as well as the ground states with different values of magnetization but the same value of the residual entropy. The specific heat capacity is investigated and it is shown that the model exhibits the Schottky-type anomaly behavior in the vicinity of each single-point ground state value of the magnetic field. The formation of the field-induced double-peak structure of the specific heat capacity at low temperatures is demonstrated and it is shown that its very existence is directly related to the presence of highly macroscopically degenerated single-point ground states in the model.

  10. Association of food access and neighbor relationships with diet and underweight among community-dwelling older Japanese.

    Science.gov (United States)

    Nakamura, Hideko; Nakamura, Mieko; Okada, Eisaku; Ojima, Toshiyuki; Kondo, Katsunori

    2017-11-01

    Food access is important for maintaining dietary variety, which predicts underweight. The aim of this study was to examine the association of food access and neighbor relationships with eating and underweight. We analyzed cross-sectional data from 102,869 Japanese individuals aged 65 years or older. The perceived availability of food was assessed using the presence or absence of food stores within 1 km of the home. Level of relationships with neighbors was also assessed. The odds ratios (ORs) and 95% confidence intervals (CIs) for infrequent food intake and underweight were determined using logistic regression analysis. The proportion of men and women having low access to food was 25-30%. Having low food access (OR 1.18; 95% CI, 1.12-1.25 for men and OR 1.26; 95% CI, 1.19-1.33 for women) and a low level of relationship with neighbors (OR 1.38; 95% CI, 1.31-1.45 for men and OR 1.57; 95% CI, 1.48-1.67 for women) was associated with infrequent intake of fruits and vegetables in both sexes. Association between low food access and infrequent intake of fruits and vegetables was higher among men with low levels of neighbor relationship (OR 1.34; 95% CI, 1.23-1.46) than among men with high levels of relationship (OR 1.10; 95% CI, 1.03-1.18). Low perceived availability of food is a risk factor for low dietary variety among older people. Furthermore, high levels of relationship with neighbors may relieve the harmful effect of low food access. Copyright © 2017 The Authors. Production and hosting by Elsevier B.V. All rights reserved.

  11. Critical points in an algebra of elementary embeddings

    OpenAIRE

    Dougherty, Randall

    1992-01-01

    Given two elementary embeddings from the collection of sets of rank less than $\\lambda$ to itself, one can combine them to obtain another such embedding in two ways: by composition, and by applying one to (initial segments of) the other. Hence, a single such nontrivial embedding $j$ generates an algebra of embeddings via these two operations, which satisfies certain laws (for example, application distributes over both composition and application). Laver has shown, among other things, that thi...

  12. Distributed, Embedded and Real-time Java Systems

    CERN Document Server

    Wellings, Andy

    2012-01-01

    Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems.  This book is aimed primarily at researchers in real-time embedded systems, particularly those who wish to understand the current state of the art in using Java in this domain.  Much of the work in real-time distributed, embedded and real-time Java has focused on the Real-time Specification for Java (RTSJ) as the underlying base technology, and consequently many of the Chapters in this book address issues with, or solve problems using, this framework. Describes innovative techniques in: scheduling, memory management, quality of service and communication systems supporting real-time Java applications; Includes coverage of multiprocessor embedded systems and parallel programming; Discusses state-of-the-art resource management for embedded systems, including Java’s real-time garbage collect...

  13. Embedding the dynamics of a single delay system into a feed-forward ring.

    Science.gov (United States)

    Klinshov, Vladimir; Shchapin, Dmitry; Yanchuk, Serhiy; Wolfrum, Matthias; D'Huys, Otti; Nekorkin, Vladimir

    2017-10-01

    We investigate the relation between the dynamics of a single oscillator with delayed self-feedback and a feed-forward ring of such oscillators, where each unit is coupled to its next neighbor in the same way as in the self-feedback case. We show that periodic solutions of the delayed oscillator give rise to families of rotating waves with different wave numbers in the corresponding ring. In particular, if for the single oscillator the periodic solution is resonant to the delay, it can be embedded into a ring with instantaneous couplings. We discover several cases where the stability of a periodic solution for the single unit can be related to the stability of the corresponding rotating wave in the ring. As a specific example, we demonstrate how the complex bifurcation scenario of simultaneously emerging multijittering solutions can be transferred from a single oscillator with delayed pulse feedback to multijittering rotating waves in a sufficiently large ring of oscillators with instantaneous pulse coupling. Finally, we present an experimental realization of this dynamical phenomenon in a system of coupled electronic circuits of FitzHugh-Nagumo type.

  14. Limited numbers of apoptotic cells in fresh paraffin embedded bone marrow samples of patients with myelodysplastic syndrome

    NARCIS (Netherlands)

    Brada, SJL; van de Loosdrecht, AA; Koudstaal, J; de Wolf, JTM; Vellenga, E

    In myelodysplasia (MDS) the precise mechanism of ineffective erythropoiesis is not fully elucidated, but it is suggested that apoptosis may contribute to this process. We performed TdT-mediated dUTP-nick end labelling (TUNEL) staining of paraffin embedded bone marrow specimens to assess the amount

  15. Anchor Bolt Position in Base Plate In Terms Of T and J Anchor Bolt

    Directory of Open Access Journals (Sweden)

    b Osman Mohamad Hairi

    2017-01-01

    Full Text Available Generally, L anchor bolt system has been used for a long period of time in construction industry as one of the distributing load structures. However, there are some weaknesses in L anchor bolt which may straighten and pullup when charged with tensile load. Current practices prefer to use other types of anchor bolt systems, such as headed studs anchor bolt system to replace the L anchor bolt design. There has been lack of studies to prove that it is more effective in terms of performance. A new T anchor bolt which was basically modified from headed studs anchor bolt was proposed in this study to compare its performance of tensile loading in concrete failure to typical L design. This study aims to determine whether the T anchor bolt system gives better performance as compared to an L anchor bolt system. The performance was rated based on tensile loading on concrete failure pattern. A pullout test was conducted on two different anchor bolt systems, namely L and T. The anchor bolt embedded depth, h in concrete were varied according to their hook or bend radius. Each sample was repeated twice. There were totally eight samples. The hook or bend radius used were 50 mm and 57.5 mm for sample L1 and L2, respectively. 90-degree bend were used on sample T1 and T2. Based on test results, it can be seen that the performance of concrete failure pattern under tensile load on both L and T anchor bolt design samples with 200 mm embedment depth was better than deeper embedment depth of 230 mm. But the L anchor bolt design gives the best results as compared to T design. Although T anchor bolt design shows higher resistance before first bond failure to the concrete sample. T anchor bolt was analysed and needed deeper embedment depth to allow formation of cone pull-out shape to acquire better performance.

  16. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.; Inayat, Salman Bin; Smith, Casey Eben

    2013-01-01

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  17. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.

    2013-08-08

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  18. TIDALLY ENHANCED STELLAR WIND: A WAY TO MAKE THE SYMBIOTIC CHANNEL TO TYPE Ia SUPERNOVA VIABLE

    International Nuclear Information System (INIS)

    Chen, X.; Han, Z.; Tout, C. A.

    2011-01-01

    In the symbiotic (or WD+RG) channel of the single-degenerate scenario for type Ia supernovae (SNe Ia), the explosions occur a relatively long time after star formation. The birthrate from this channel would be too low to account for all observed SNe Ia were it not for some mechanism to enhance the rate of accretion on to the white dwarf. A tidally enhanced stellar wind, of the type which has been postulated to explain many phenomena related to giant star evolution in binary systems, can do this. Compared to mass stripping, this model extends the space of SNe Ia progenitors to longer orbital periods and hence increases the birthrate to about 0.0069 yr -1 for the symbiotic channel. Two symbiotic stars, T CrB and RS Oph, considered to be the most likely progenitors of SNe Ia through the symbiotic channel, are well inside the period-companion mass space predicted by our models.

  19. Incorporating the information from direct and indirect neighbors into fitness evaluation enhances the cooperation in the social dilemmas

    International Nuclear Information System (INIS)

    Hu, Menglong; Wang, Juan; Kong, Lingcong; An, Kang; Bi, Tao; Guo, Baohong; Dong, Enzeng

    2015-01-01

    Highlights: •A novel fitness evaluation method integrating environmental information is presented. •The introduction of neighbors’ payoff favors the promotion of cooperation in the PDG. •The role of direct neighbors becomes much more prominent. •In the SDG, the cooperative behavior is also improved by this new mechanism. -- Abstract: We propose an improved fitness evaluation method to investigate the evolution of cooperation in the spatial social dilemmas. In our model, a focal player’s fitness is calculated as the linear combination of his own payoff, the average payoffs of direct and indirect neighbors in which two independent selection parameters (α and β) are used to control the proportion of various payoff contribution to the current fitness. Then, the fitness-based strategy update rule is still Fermi-like, and asynchronous update is adopted here. A large plethora of numerical simulations are performed to validate the behaviors of the current model, and the results unambiguously demonstrate that the cooperation level is greatly enhanced by introducing the payoffs from the surrounding players. In particular, the influence of direct neighbors become more evident when compared with indirect neighbors since the correlation between focal players and their direct neighbors is much closer. Current outcomes are significant for us to further illustrate the origin and emergence of cooperation within a wide variety of natural and man-made systems

  20. Exact solutions for isometric embeddings of pseudo-Riemannian manifolds

    International Nuclear Information System (INIS)

    Amery, G; Moodley, J

    2014-01-01

    Embeddings into higher dimensions are of direct importance in the study of higher dimensional theories of our Universe, in high energy physics and in classical general relativity. Theorems have been established that guarantee the existence of local and global codimension-1 embeddings between pseudo-Riemannian manifolds, particularly for Einstein embedding spaces. A technique has been provided to determine solutions to such embeddings. However, general solutions have not yet been found and most known explicit solutions are for embedded spaces with relatively simple Ricci curvature. Motivated by this, we have considered isometric embeddings of 4-dimensional pseudo-Riemannian spacetimes into 5-dimensional Einstein manifolds. We have applied the technique to treat specific 4-dimensional cases of interest in astrophysics and cosmology (including the global monopole exterior and Vaidya-de Sitter-class solutions), and provided novel physical insights into, for example, Einstein-Gauss-Bonnet gravity. Since difficulties arise in solving the 5-dimensional equations for given 4-dimensional spaces, we have also investigated embedded spaces, which admit bulks with a particular metric form. These analyses help to provide insight to the general embedding problem

  1. Liquid-Embedded Elastomer Electronics

    Science.gov (United States)

    Kramer, Rebecca; Majidi, Carmel; Park, Yong-Lae; Paik, Jamie; Wood, Robert

    2012-02-01

    Hyperelastic sensors are fabricated by embedding a silicone rubber film with microchannels of conductive liquid. In the case of soft tactile sensors, pressing the surface of the elastomer will deform the cross-section of underlying channels and change their electrical resistance. Soft pressure sensors may be employed in a variety of applications. For example, a network of pressure sensors can serve as artificial skin by yielding detailed information about contact pressures. This concept was demonstrated in a hyperelastic keypad, where perpendicular conductive channels form a quasi-planar network within an elastomeric matrix that registers the location, intensity and duration of applied pressure. In a second demonstration, soft curvature sensors were used for joint angle proprioception. Because the sensors are soft and stretchable, they conform to the host without interfering with the natural mechanics of motion. This marked the first use of liquid-embedded elastomer electronics to monitor human or robotic motion. Finally, liquid-embedded elastomers may be implemented as conductors in applications that call for flexible or stretchable circuitry, such as robotic origami.

  2. Modern Embedded Computing Designing Connected, Pervasive, Media-Rich Systems

    CERN Document Server

    Barry, Peter

    2012-01-01

    Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions for industrial applications. While most books focus on these controllers, Modern Embedded Computing provides a thorough understanding of the platform architecture of modern embedded computing systems that drive mobile devices. The book offers a comprehen

  3. Elliptic Painlevé equations from next-nearest-neighbor translations on the E_8^{(1)} lattice

    Science.gov (United States)

    Joshi, Nalini; Nakazono, Nobutaka

    2017-07-01

    The well known elliptic discrete Painlevé equation of Sakai is constructed by a standard translation on the E_8(1) lattice, given by nearest neighbor vectors. In this paper, we give a new elliptic discrete Painlevé equation obtained by translations along next-nearest-neighbor vectors. This equation is a generic (8-parameter) version of a 2-parameter elliptic difference equation found by reduction from Adler’s partial difference equation, the so-called Q4 equation. We also provide a projective reduction of the well known equation of Sakai.

  4. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  5. Molecular Properties through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2011-01-01

    We review the theory related to the calculation of electric and magnetic molecular properties through polarizable embedding. In particular, we derive the expressions for the response functions up to the level of cubic response within the density functional theory-based polarizable embedding (PE......-DFT) formalism. In addition, we discuss some illustrative applications related to the calculation of nuclear magnetic resonance parameters, nonlinear optical properties, and electronic excited states in solution....

  6. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  7. Embedded computer systems for control applications in EBR-II

    International Nuclear Information System (INIS)

    Carlson, R.B.; Start, S.E.

    1993-01-01

    The purpose of this paper is to describe the embedded computer systems approach taken at Experimental Breeder Reactor II (EBR-II) for non-safety related systems. The hardware and software structures for typical embedded systems are presented The embedded systems development process is described. Three examples are given which illustrate typical embedded computer applications in EBR-II

  8. Bubbling and on-off intermittency in bailout embeddings.

    Science.gov (United States)

    Cartwright, Julyan H E; Magnasco, Marcelo O; Piro, Oreste; Tuval, Idan

    2003-07-01

    We establish and investigate the conceptual connection between the dynamics of the bailout embedding of a Hamiltonian system and the dynamical regimes associated with the occurrence of bubbling and blowout bifurcations. The roles of the invariant manifold and the dynamics restricted to it, required in bubbling and blowout bifurcating systems, are played in the bailout embedding by the embedded Hamiltonian dynamical system. The Hamiltonian nature of the dynamics is precisely the distinctive feature of this instance of a bubbling or blowout bifurcation. The detachment of the embedding trajectories from the original ones can thus be thought of as transient on-off intermittency, and noise-induced avoidance of some regions of the embedded phase space can be recognized as Hamiltonian bubbling.

  9. Embeddings for the Schwarzschild metric: classification and new results

    International Nuclear Information System (INIS)

    Paston, S A; Sheykin, A A

    2012-01-01

    We suggest a method to search the embeddings of Riemannian spaces with a high enough symmetry in a flat ambient space. It is based on a procedure of construction surfaces with a given symmetry. The method is used to classify the embeddings of the Schwarzschild metric which have the symmetry of this solution, and all such embeddings in a six-dimensional ambient space (i.e. a space with a minimal possible dimension) are constructed. Four of the six possible embeddings are already known, while the two others are new. One of the new embeddings is asymptotically flat, while the other embeddings in a six-dimensional ambient space do not have this property. The asymptotically flat embedding can be of use in the analysis of the many-body problem, as well as for the development of gravity description as a theory of a surface in a flat ambient space. (paper)

  10. Knowledgeable Neighbors: a mobile clinic model for disease prevention and screening in underserved communities.

    Science.gov (United States)

    Hill, Caterina; Zurakowski, David; Bennet, Jennifer; Walker-White, Rainelle; Osman, Jamie L; Quarles, Aaron; Oriol, Nancy

    2012-03-01

    The Family Van mobile health clinic uses a "Knowledgeable Neighbor" model to deliver cost-effective screening and prevention activities in underserved neighborhoods in Boston, MA. We have described the Knowledgeable Neighbor model and used operational data collected from 2006 to 2009 to evaluate the service. The Family Van successfully reached mainly minority low-income men and women. Of the clients screened, 60% had previously undetected elevated blood pressure, 14% had previously undetected elevated blood glucose, and 38% had previously undetected elevated total cholesterol. This represents an important model for reaching underserved communities to deliver proven cost-effective prevention activities, both to help control health care costs and to reduce health disparities.

  11. Response properties of neighboring neurons in the auditory midbrain for pure-tone stimulation: a tetrode study.

    Science.gov (United States)

    Seshagiri, Chandran V; Delgutte, Bertrand

    2007-10-01

    The complex anatomical structure of the central nucleus of the inferior colliculus (ICC), the principal auditory nucleus in the midbrain, may provide the basis for functional organization of auditory information. To investigate this organization, we used tetrodes to record from neighboring neurons in the ICC of anesthetized cats and studied the similarity and difference among the responses of these neurons to pure-tone stimuli using widely used physiological characterizations. Consistent with the tonotopic arrangement of neurons in the ICC and reports of a threshold map, we found a high degree of correlation in the best frequencies (BFs) of neighboring neurons, which were mostly binaural beats. However, the characteristic phases (CPs) of neighboring neurons revealed a significant correlation. Because the CP is related to the neural mechanisms generating the ITD sensitivity, this result is consistent with segregation of inputs to the ICC from the lateral and medial superior olives.

  12. Potential-functional embedding theory for molecules and materials.

    Science.gov (United States)

    Huang, Chen; Carter, Emily A

    2011-11-21

    We introduce a potential-functional embedding theory by reformulating a recently proposed density-based embedding theory in terms of functionals of the embedding potential. This potential-functional based theory completes the dual problem in the context of embedding theory for which density-functional embedding theory has existed for two decades. With this potential-functional formalism, it is straightforward to solve for the unique embedding potential shared by all subsystems. We consider charge transfer between subsystems and discuss how to treat fractional numbers of electrons in subsystems. We show that one is able to employ different energy functionals for different subsystems in order to treat different regions with theories of different levels of accuracy, if desired. The embedding potential is solved for by directly minimizing the total energy functional, and we discuss how to efficiently calculate the gradient of the total energy functional with respect to the embedding potential. Forces are also derived, thereby making it possible to optimize structures and account for nuclear dynamics. We also extend the theory to spin-polarized cases. Numerical examples of the theory are given for some homo- and hetero-nuclear diatomic molecules and a more complicated test of a six-hydrogen-atom chain. We also test our theory in a periodic bulk environment with calculations of basic properties of bulk NaCl, by treating each atom as a subsystem. Finally, we demonstrate the theory for water adsorption on the MgO(001)surface.

  13. Photometric Investigation of Novae T Pyx, BT Mon and V574 Pup at Quiescence by using the 2.4-m Thai National Telescope

    Science.gov (United States)

    Thipboon, Ritthichai; Kaewrakmuk, Metichai; Surina, Farung; Sanguansak, Nuanwan

    2017-09-01

    Recurrent novae (RNe) are novae with multiple recorded outbursts powered by a thermonuclear runaway. The outburst occurs on the surface of the white dwarf which accompanies with a late type main-sequence or giant secondary star transferring material onto the white dwarf primary star. They resemble classical novae (CNe) outbursts but only RNe has more than one recorded outbursts. RNe play an important role as one of the suspected progenitor systems of Type Ia supernovae (SNe) which are used as primary distance indicators in cosmology. Thus, it is important to investigate the outburst type of CNe and RNe and finally ascertain the population of objects that might ultimately be candidates for Type Ia SNe explosions. The proposal that RNe occupy a region separated from CNe in an outburst amplitude versus speed class diagram was adopted. Since the low amplitude results from the existence of an evolved secondary and/or high mass transfer rate in the quiescent system, RNe candidates should accordingly have low amplitude. We selected 3 preliminary targets including T Pyx, BT Mon and V574 Pup. Their amplitudes are not that low but the lowest amplitude that can be observed with Thai National Telescope (TNT). We obtained their magnitudes at quiescence using ULTRASPEC camera on the 2.4-m TNT. The positions of three targets on optical and near-infrared color-magnitude diagrams suggest that all three should have main-sequence secondary stars. This is true for T Pyx, whose secondary star has been confirmed its spectroscopy to be a main-sequence star, but not yet confirmed for BT Mon and V574 Pup.

  14. Implementation of the k -Neighbors Technique in a recommender algorithm for a purchasing system using NFC and Android

    Directory of Open Access Journals (Sweden)

    Oscar Arley Riveros

    2017-01-01

    Full Text Available Introduction: This paper aims to present the design of a mobile application involving NFC technology and a collaborative recommendation algorithm under the K-neighbors technique, allowing to observe personalized suggestions for each client. Objective: Design and develop a mobile application, using NFC technologies and K-Neighbors Technique in a recommendation algorithm, for a Procurement System. Methodology: The process followed for the design and development of the application focuses on: • Review of the state of the art in mobile shopping systems. • State-of-the-art construction in the use of NFC technology and AI techniques for recommending systems focused on K-Neighbors Algorithms • Proposed system design • Parameterization and implementation of the K-Neighbors Technique and integration of NFC Technology • Proposed System Implementation and Testing. Results: Among the results obtained are detailed: • Mobile application that integrates Android, NFC Technologies and a Technique of Algorithm Recommendation • Parameterization of the K-Neighbors Technique, to be used within the recommended algorithm. • Implementation of functional requirements that allow the generation of personalized recommendations for purchase to the user, user ratings Conclusions: The k-neighbors technique in a recommendation algorithm allows the client to provide a series of recommendations with a level of security, since this algorithm performs calculations taking into account multiple parameters and contrasts the results obtained for other users, finding the articles with a Greater degree of similarity with the customer profile. This algorithm starts from a sample of similar, complementary and other unrelated products, applying its respective formulation, we obtain that the recommendation is made only with the complementary products that obtained higher qualification; Making a big difference with most recommending systems on the market, which are limited to

  15. Complete genome sequence of DSM 30083(T), the type strain (U5/41(T)) of Escherichia coli, and a proposal for delineating subspecies in microbial taxonomy.

    Science.gov (United States)

    Meier-Kolthoff, Jan P; Hahnke, Richard L; Petersen, Jörn; Scheuner, Carmen; Michael, Victoria; Fiebig, Anne; Rohde, Christine; Rohde, Manfred; Fartmann, Berthold; Goodwin, Lynne A; Chertkov, Olga; Reddy, Tbk; Pati, Amrita; Ivanova, Natalia N; Markowitz, Victor; Kyrpides, Nikos C; Woyke, Tanja; Göker, Markus; Klenk, Hans-Peter

    2014-01-01

    Although Escherichia coli is the most widely studied bacterial model organism and often considered to be the model bacterium per se, its type strain was until now forgotten from microbial genomics. As a part of the G enomic E ncyclopedia of B acteria and A rchaea project, we here describe the features of E. coli DSM 30083(T) together with its genome sequence and annotation as well as novel aspects of its phenotype. The 5,038,133 bp containing genome sequence includes 4,762 protein-coding genes and 175 RNA genes as well as a single plasmid. Affiliation of a set of 250 genome-sequenced E. coli strains, Shigella and outgroup strains to the type strain of E. coli was investigated using digital DNA:DNA-hybridization (dDDH) similarities and differences in genomic G+C content. As in the majority of previous studies, results show Shigella spp. embedded within E. coli and in most cases forming a single subgroup of it. Phylogenomic trees also recover the proposed E. coli phylotypes as monophyla with minor exceptions and place DSM 30083(T) in phylotype B2 with E. coli S88 as its closest neighbor. The widely used lab strain K-12 is not only genomically but also physiologically strongly different from the type strain. The phylotypes do not express a uniform level of character divergence as measured using dDDH, however, thus an alternative arrangement is proposed and discussed in the context of bacterial subspecies. Analyses of the genome sequences of a large number of E. coli strains and of strains from > 100 other bacterial genera indicate a value of 79-80% dDDH as the most promising threshold for delineating subspecies, which in turn suggests the presence of five subspecies within E. coli.

  16. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jin-Xin Hu

    2017-01-01

    Full Text Available Internet of Things (IoT is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly’s privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.

  17. Neighboring Structure Visualization on a Grid-based Layout.

    Science.gov (United States)

    Marcou, G; Horvath, D; Varnek, A

    2017-10-01

    Here, we describe an algorithm to visualize chemical structures on a grid-based layout in such a way that similar structures are neighboring. It is based on structure reordering with the help of the Hilbert Schmidt Independence Criterion, representing an empirical estimate of the Hilbert-Schmidt norm of the cross-covariance operator. The method can be applied to any layout of bi- or three-dimensional shape. The approach is demonstrated on a set of dopamine D5 ligands visualized on squared, disk and spherical layouts. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Unsupervised Document Embedding With CNNs

    OpenAIRE

    Liu, Chundi; Zhao, Shunan; Volkovs, Maksims

    2017-01-01

    We propose a new model for unsupervised document embedding. Leading existing approaches either require complex inference or use recurrent neural networks (RNN) that are difficult to parallelize. We take a different route and develop a convolutional neural network (CNN) embedding model. Our CNN architecture is fully parallelizable resulting in over 10x speedup in inference time over RNN models. Parallelizable architecture enables to train deeper models where each successive layer has increasin...

  19. Diverse Power Iteration Embeddings and Its Applications

    Energy Technology Data Exchange (ETDEWEB)

    Huang H.; Yoo S.; Yu, D.; Qin, H.

    2014-12-14

    Abstract—Spectral Embedding is one of the most effective dimension reduction algorithms in data mining. However, its computation complexity has to be mitigated in order to apply it for real-world large scale data analysis. Many researches have been focusing on developing approximate spectral embeddings which are more efficient, but meanwhile far less effective. This paper proposes Diverse Power Iteration Embeddings (DPIE), which not only retains the similar efficiency of power iteration methods but also produces a series of diverse and more effective embedding vectors. We test this novel method by applying it to various data mining applications (e.g. clustering, anomaly detection and feature selection) and evaluating their performance improvements. The experimental results show our proposed DPIE is more effective than popular spectral approximation methods, and obtains the similar quality of classic spectral embedding derived from eigen-decompositions. Moreover it is extremely fast on big data applications. For example in terms of clustering result, DPIE achieves as good as 95% of classic spectral clustering on the complex datasets but 4000+ times faster in limited memory environment.

  20. Technical solutions to enable embedded generation growth

    Energy Technology Data Exchange (ETDEWEB)

    Lynch, C.A.; Todd, S.; Millar, W.; Wood, H.S.

    2003-07-01

    This report describes the results of one of a series of studies commissioned by the UK Department of Trade and Industry into various aspects of embedded generation with the aim of supporting the development and deployment of electrical sources (particularly their ease of connection to the network) to deliver power to consumers. The first phase of the project involved a literature review and meetings with embedded generation developers and planning engineers from distribution network operators (DNOs). The second phase investigated embedded generation at different levels of the distribution network and included modelling a representative network. Technologies that could facilitate a significant increase in embedded generation were identified and estimates made of when and where significant development would be needed. Technical problems identified by DNOs were concerned with thermal loading, voltage regulation, fault levels, protection and network operation. A number of non-technical (commercial and regulatory) problems were also identified. The report describes the UK regulatory framework, the present situation, the British power system, the accommodation of embedded generation by established means, the representative model and technical innovations.

  1. An Overview of Reconfigurable Hardware in Embedded Systems

    Directory of Open Access Journals (Sweden)

    Wenyin Fu

    2006-09-01

    Full Text Available Over the past few years, the realm of embedded systems has expanded to include a wide variety of products, ranging from digital cameras, to sensor networks, to medical imaging systems. Consequently, engineers strive to create ever smaller and faster products, many of which have stringent power requirements. Coupled with increasing pressure to decrease costs and time-to-market, the design constraints of embedded systems pose a serious challenge to embedded systems designers. Reconfigurable hardware can provide a flexible and efficient platform for satisfying the area, performance, cost, and power requirements of many embedded systems. This article presents an overview of reconfigurable computing in embedded systems, in terms of benefits it can provide, how it has already been used, design issues, and hurdles that have slowed its adoption.

  2. Multidimensional k-nearest neighbor model based on EEMD for financial time series forecasting

    Science.gov (United States)

    Zhang, Ningning; Lin, Aijing; Shang, Pengjian

    2017-07-01

    In this paper, we propose a new two-stage methodology that combines the ensemble empirical mode decomposition (EEMD) with multidimensional k-nearest neighbor model (MKNN) in order to forecast the closing price and high price of the stocks simultaneously. The modified algorithm of k-nearest neighbors (KNN) has an increasingly wide application in the prediction of all fields. Empirical mode decomposition (EMD) decomposes a nonlinear and non-stationary signal into a series of intrinsic mode functions (IMFs), however, it cannot reveal characteristic information of the signal with much accuracy as a result of mode mixing. So ensemble empirical mode decomposition (EEMD), an improved method of EMD, is presented to resolve the weaknesses of EMD by adding white noise to the original data. With EEMD, the components with true physical meaning can be extracted from the time series. Utilizing the advantage of EEMD and MKNN, the new proposed ensemble empirical mode decomposition combined with multidimensional k-nearest neighbor model (EEMD-MKNN) has high predictive precision for short-term forecasting. Moreover, we extend this methodology to the case of two-dimensions to forecast the closing price and high price of the four stocks (NAS, S&P500, DJI and STI stock indices) at the same time. The results indicate that the proposed EEMD-MKNN model has a higher forecast precision than EMD-KNN, KNN method and ARIMA.

  3. Time-dependent potential-functional embedding theory

    International Nuclear Information System (INIS)

    Huang, Chen; Libisch, Florian; Peng, Qing; Carter, Emily A.

    2014-01-01

    We introduce a time-dependent potential-functional embedding theory (TD-PFET), in which atoms are grouped into subsystems. In TD-PFET, subsystems can be propagated by different suitable time-dependent quantum mechanical methods and their interactions can be treated in a seamless, first-principles manner. TD-PFET is formulated based on the time-dependent quantum mechanics variational principle. The action of the total quantum system is written as a functional of the time-dependent embedding potential, i.e., a potential-functional formulation. By exploiting the Runge-Gross theorem, we prove the uniqueness of the time-dependent embedding potential under the constraint that all subsystems share a common embedding potential. We derive the integral equation that such an embedding potential needs to satisfy. As proof-of-principle, we demonstrate TD-PFET for a Na 4 cluster, in which each Na atom is treated as one subsystem and propagated by time-dependent Kohn-Sham density functional theory (TDDFT) using the adiabatic local density approximation (ALDA). Our results agree well with a direct TDDFT calculation on the whole Na 4 cluster using ALDA. We envision that TD-PFET will ultimately be useful for studying ultrafast quantum dynamics in condensed matter, where key regions are solved by highly accurate time-dependent quantum mechanics methods, and unimportant regions are solved by faster, less accurate methods

  4. Fast and effective embedded systems design applying the ARM mbed

    CERN Document Server

    Toulson, Rob

    2012-01-01

    A hands-on introduction to the field of embedded systems; A focus on fast prototyping of embedded systems; All key embedded system concepts covered through simple and effective experimentation; An understanding of ARM technology, one of the world's leaders; A practical introduction to embedded C; Applies possibly the most accessible set of tools available in the embedded world.  This book is an introduction to embedded systems design, using the ARM mbed and C programming language as development tools. The mbed provides a compact, self-contained and low-cost hardware core, and the

  5. Employing Augmented-Reality-Embedded Instruction to Disperse the Imparities of Individual Differences in Earth Science Learning

    Science.gov (United States)

    Chen, Cheng-ping; Wang, Chang-Hwa

    2015-12-01

    Studies have proven that merging hands-on and online learning can result in an enhanced experience in learning science. In contrast to traditional online learning, multiple in-classroom activities may be involved in an augmented-reality (AR)-embedded e-learning process and thus could reduce the effects of individual differences. Using a three-stage AR-embedded instructional process, we conducted an experiment to investigate the influences of individual differences on learning earth science phenomena of "day, night, and seasons" for junior highs. The mixed-methods sequential explanatory design was employed. In the quantitative phase, factors of learning styles and ICT competences were examined alongside with the overall learning achievement. Independent t tests and ANCOVAs were employed to achieve inferential statistics. The results showed that overall learning achievement was significant for the AR-embedded instruction. Nevertheless, neither of the two learner factors exhibited significant effect on learning achievement. In the qualitative phase, we analyzed student interview records, and a wide variation on student's preferred instructional stages were revealed. These findings could provide an alternative rationale for developing ICT-supported instruction, as our three-stage AR-embedded comprehensive e-learning scheme could enhance instruction adaptiveness to disperse the imparities of individual differences between learners.

  6. Hybrid Message-Embedded Cipher Using Logistic Map

    OpenAIRE

    Mishra, Mina; Mankar, V. H.

    2012-01-01

    The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a secret key. As we know that the minimum key space to resist brute-force attack is 2100, and it is ...

  7. Tricriticality in the q-neighbor Ising model on a partially duplex clique.

    Science.gov (United States)

    Chmiel, Anna; Sienkiewicz, Julian; Sznajd-Weron, Katarzyna

    2017-12-01

    We analyze a modified kinetic Ising model, a so-called q-neighbor Ising model, with Metropolis dynamics [Phys. Rev. E 92, 052105 (2015)PLEEE81539-375510.1103/PhysRevE.92.052105] on a duplex clique and a partially duplex clique. In the q-neighbor Ising model each spin interacts only with q spins randomly chosen from its whole neighborhood. In the case of a duplex clique the change of a spin is allowed only if both levels simultaneously induce this change. Due to the mean-field-like nature of the model we are able to derive the analytic form of transition probabilities and solve the corresponding master equation. The existence of the second level changes dramatically the character of the phase transition. In the case of the monoplex clique, the q-neighbor Ising model exhibits a continuous phase transition for q=3, discontinuous phase transition for q≥4, and for q=1 and q=2 the phase transition is not observed. On the other hand, in the case of the duplex clique continuous phase transitions are observed for all values of q, even for q=1 and q=2. Subsequently we introduce a partially duplex clique, parametrized by r∈[0,1], which allows us to tune the network from monoplex (r=0) to duplex (r=1). Such a generalized topology, in which a fraction r of all nodes appear on both levels, allows us to obtain the critical value of r=r^{*}(q) at which a tricriticality (switch from continuous to discontinuous phase transition) appears.

  8. Observing Literacy Practices in Neighbor Institutions

    DEFF Research Database (Denmark)

    Reusch, Charlotte

    ’procedures on language and literacy. Based on this material, we developed an observation scheme and a guide for preschool teachers to follow, inspired by an action learning concept.During fall 2015, a pilot project is carried out. Preschool teachers from one institution visit a neighbor institution one by one during...... work hours, in order to observe and register how language and literacy events look like there. Afterwards, they share their registrations at a team meeting, and discuss and decide which procedures to test in their own institution. Thus, they form a professional learning network. In the pilot project......The Danish National Centre for Reading and a municipality in southern Denmark cooperate to develop a program to improve preschool children’s early literacy skills. The project aims to support preschool teachers’ ability to create a rich literacy environment for children age 3‒6. Recent research...

  9. Integrated Design and Implementation of Embedded Control Systems with Scilab.

    Science.gov (United States)

    Ma, Longhua; Xia, Feng; Peng, Zhe

    2008-09-05

    Embedded systems are playing an increasingly important role in control engineering. Despite their popularity, embedded systems are generally subject to resource constraints and it is therefore difficult to build complex control systems on embedded platforms. Traditionally, the design and implementation of control systems are often separated, which causes the development of embedded control systems to be highly timeconsuming and costly. To address these problems, this paper presents a low-cost, reusable, reconfigurable platform that enables integrated design and implementation of embedded control systems. To minimize the cost, free and open source software packages such as Linux and Scilab are used. Scilab is ported to the embedded ARM-Linux system. The drivers for interfacing Scilab with several communication protocols including serial, Ethernet, and Modbus are developed. Experiments are conducted to test the developed embedded platform. The use of Scilab enables implementation of complex control algorithms on embedded platforms. With the developed platform, it is possible to perform all phases of the development cycle of embedded control systems in a unified environment, thus facilitating the reduction of development time and cost.

  10. Integrated Design and Implementation of Embedded Control Systems with Scilab

    Directory of Open Access Journals (Sweden)

    Zhe Peng

    2008-09-01

    Full Text Available Embedded systems are playing an increasingly important role in control engineering. Despite their popularity, embedded systems are generally subject to resource constraints and it is therefore difficult to build complex control systems on embedded platforms. Traditionally, the design and implementation of control systems are often separated, which causes the development of embedded control systems to be highly timeconsuming and costly. To address these problems, this paper presents a low-cost, reusable, reconfigurable platform that enables integrated design and implementation of embedded control systems. To minimize the cost, free and open source software packages such as Linux and Scilab are used. Scilab is ported to the embedded ARM-Linux system. The drivers for interfacing Scilab with several communication protocols including serial, Ethernet, and Modbus are developed. Experiments are conducted to test the developed embedded platform. The use of Scilab enables implementation of complex control algorithms on embedded platforms. With the developed platform, it is possible to perform all phases of the development cycle of embedded control systems in a unified environment, thus facilitating the reduction of development time and cost.

  11. Introduction to machine learning: k-nearest neighbors.

    Science.gov (United States)

    Zhang, Zhongheng

    2016-06-01

    Machine learning techniques have been widely used in many scientific fields, but its use in medical literature is limited partly because of technical difficulties. k-nearest neighbors (kNN) is a simple method of machine learning. The article introduces some basic ideas underlying the kNN algorithm, and then focuses on how to perform kNN modeling with R. The dataset should be prepared before running the knn() function in R. After prediction of outcome with kNN algorithm, the diagnostic performance of the model should be checked. Average accuracy is the mostly widely used statistic to reflect the kNN algorithm. Factors such as k value, distance calculation and choice of appropriate predictors all have significant impact on the model performance.

  12. Long-term effect of September 11 on the political behavior of victims’ families and neighbors

    Science.gov (United States)

    Hersh, Eitan D.

    2013-01-01

    This article investigates the long-term effect of September 11, 2001 on the political behaviors of victims’ families and neighbors. Relative to comparable individuals, family members and residential neighbors of victims have become—and have stayed—significantly more active in politics in the last 12 years, and they have become more Republican on account of the terrorist attacks. The method used to demonstrate these findings leverages the random nature of the terrorist attack to estimate a causal effect and exploits new techniques to link multiple, individual-level, governmental databases to measure behavioral change without relying on surveys or aggregate analysis. PMID:24324145

  13. Long-term effect of September 11 on the political behavior of victims' families and neighbors.

    Science.gov (United States)

    Hersh, Eitan D

    2013-12-24

    This article investigates the long-term effect of September 11, 2001 on the political behaviors of victims' families and neighbors. Relative to comparable individuals, family members and residential neighbors of victims have become--and have stayed--significantly more active in politics in the last 12 years, and they have become more Republican on account of the terrorist attacks. The method used to demonstrate these findings leverages the random nature of the terrorist attack to estimate a causal effect and exploits new techniques to link multiple, individual-level, governmental databases to measure behavioral change without relying on surveys or aggregate analysis.

  14. Estimating forest attribute parameters for small areas using nearest neighbors techniques

    Science.gov (United States)

    Ronald E. McRoberts

    2012-01-01

    Nearest neighbors techniques have become extremely popular, particularly for use with forest inventory data. With these techniques, a population unit prediction is calculated as a linear combination of observations for a selected number of population units in a sample that are most similar, or nearest, in a space of ancillary variables to the population unit requiring...

  15. Applying an efficient K-nearest neighbor search to forest attribute imputation

    Science.gov (United States)

    Andrew O. Finley; Ronald E. McRoberts; Alan R. Ek

    2006-01-01

    This paper explores the utility of an efficient nearest neighbor (NN) search algorithm for applications in multi-source kNN forest attribute imputation. The search algorithm reduces the number of distance calculations between a given target vector and each reference vector, thereby, decreasing the time needed to discover the NN subset. Results of five trials show gains...

  16. Learning Euclidean Embeddings for Indexing and Classification

    National Research Council Canada - National Science Library

    Athitsos, Vassilis; Alon, Joni; Sclaroff, Stan; Kollios, George

    2004-01-01

    BoostMap is a recently proposed method for efficient approximate nearest neighbor retrieval in arbitrary non-Euclidean spaces with computationally expensive and possibly non-metric distance measures...

  17. Autonomous Multicamera Tracking on Embedded Smart Cameras

    Directory of Open Access Journals (Sweden)

    Bischof Horst

    2007-01-01

    Full Text Available There is currently a strong trend towards the deployment of advanced computer vision methods on embedded systems. This deployment is very challenging since embedded platforms often provide limited resources such as computing performance, memory, and power. In this paper we present a multicamera tracking method on distributed, embedded smart cameras. Smart cameras combine video sensing, processing, and communication on a single embedded device which is equipped with a multiprocessor computation and communication infrastructure. Our multicamera tracking approach focuses on a fully decentralized handover procedure between adjacent cameras. The basic idea is to initiate a single tracking instance in the multicamera system for each object of interest. The tracker follows the supervised object over the camera network, migrating to the camera which observes the object. Thus, no central coordination is required resulting in an autonomous and scalable tracking approach. We have fully implemented this novel multicamera tracking approach on our embedded smart cameras. Tracking is achieved by the well-known CamShift algorithm; the handover procedure is realized using a mobile agent system available on the smart camera network. Our approach has been successfully evaluated on tracking persons at our campus.

  18. Self-Organization in Embedded Real-Time Systems

    CERN Document Server

    Brinkschulte, Uwe; Rettberg, Achim

    2013-01-01

    This book describes the emerging field of self-organizing, multicore, distributed and real-time embedded systems.  Self-organization of both hardware and software can be a key technique to handle the growing complexity of modern computing systems. Distributed systems running hundreds of tasks on dozens of processors, each equipped with multiple cores, requires self-organization principles to ensure efficient and reliable operation. This book addresses various, so-called Self-X features such as self-configuration, self-optimization, self-adaptation, self-healing and self-protection. Presents open components for embedded real-time adaptive and self-organizing applications; Describes innovative techniques in: scheduling, memory management, quality of service, communications supporting organic real-time applications; Covers multi-/many-core embedded systems supporting real-time adaptive systems and power-aware, adaptive hardware and software systems; Includes case studies of open embedded real-time self-organizi...

  19. Poincaré Embeddings for Learning Hierarchical Representations

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    Abstracts: Representation learning has become an invaluable approach for learning from symbolic data such as text and graphs. However, while complex symbolic datasets often exhibit a latent hierarchical structure, state-of-the-art methods typically do not account for this property. In this talk, I will discuss a new approach for learning hierarchical representations of symbolic data by embedding them into hyperbolic space -- or more precisely into an n-dimensional Poincaré ball. Due to the underlying hyperbolic geometry, this allows us to learn parsimonious representations of symbolic data by simultaneously capturing hierarchy and similarity. We introduce an efficient algorithm to learn the embeddings based on Riemannian optimization and show experimentally that Poincaré embeddings outperform Euclidean embeddings significantly on data with latent hierarchies, both in terms of representation capacity and in terms of generalization ability.      &...

  20. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  1. Embedded data representations

    DEFF Research Database (Denmark)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles...

  2. Constraints on Λ(t)-cosmology with power law interacting dark sectors

    International Nuclear Information System (INIS)

    Poitras, Vincent

    2012-01-01

    Motivated by the cosmological constant and the coincidence problems, we consider a cosmological model where the cosmological constant Λ 0 is replaced by a cosmological term Λ(t) which is allowed to vary in time. More specifically, we are considering that this dark energy term interacts with dark matter through the phenomenological decay law ρ-dot Λ = −Qρ Λ n . We have constrained the model for the range n element of [0,10] using various observational data (SNeIa, GRB, CMB, BAO, OHD), emphasizing the case where n = 3/2. This case is the only one where the late-time value for the ratio of dark energy density and matter energy density ρ Λ /ρ m is constant, which could provide an interesting explanation to the coincidence problem. We obtain strong limits on the model parameters which however exclude the region where the coincidence or the cosmological constant problems are significantly ameliorated

  3. Two diverse models of embedding class one

    Science.gov (United States)

    Kuhfittig, Peter K. F.

    2018-05-01

    Embedding theorems have continued to be a topic of interest in the general theory of relativity since these help connect the classical theory to higher-dimensional manifolds. This paper deals with spacetimes of embedding class one, i.e., spacetimes that can be embedded in a five-dimensional flat spacetime. These ideas are applied to two diverse models, a complete solution for a charged wormhole admitting a one-parameter group of conformal motions and a new model to explain the flat rotation curves in spiral galaxies without the need for dark matter.

  4. Secure smart embedded devices, platforms and applications

    CERN Document Server

    Markantonakis, Konstantinos

    2013-01-01

    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and consider

  5. Development of an Erlang System Adaopted to Embedded Devices

    OpenAIRE

    Andersson, Fredrik; Bergström, Fabian

    2011-01-01

    Erlang is a powerful and robust language for writing massively parallel and distributed applications. With the introduction of multi-core ARM processors, the embedded market will be looking for ways of taking advantage of the newfound opportunities for parallelism. To support the development of embedded applications using Erlang we want to provide Erlang and Embedded developers with a run-time system suited for embedded devices. We have managed to shrink the disk size of the Erlang runtime sy...

  6. Mountain tourism development in Serbia and neighboring countries

    Directory of Open Access Journals (Sweden)

    Krunić Nikola

    2010-01-01

    Full Text Available Mountain areas with their surroundings are important parts of tourism regions with potentials for all-season tourism development and complementary activities. Development possibilities are based on size of high mountain territory, nature protection regimes, infrastructural equipment, provided conditions for leisure and recreation as well as involvement of local population in processes of development and protection. This paper analyses the key aspects of tourism development, winter tourism in high-mountain areas of Serbia and some neighboring countries (Slovakia, Romania, Bulgaria, and Greece. Common determinants of cohesion between nature protection and mountain tourism development, national development policies, applied models and concepts and importance of trans-border cooperation are indicated.

  7. An interactive cooperation model for neighboring virtual power plants

    International Nuclear Information System (INIS)

    Shabanzadeh, Morteza; Sheikh-El-Eslami, Mohammad-Kazem; Haghifam, Mahmoud-Reza

    2017-01-01

    Highlights: •The trading strategies of a VPP in cooperation with its neighboring VPPs are addressed. •A portfolio of inter-regional contracts is considered to model this cooperation scheme. •A novel mathematical formulation for possible inadvertent transactions is provided. •A two-stage stochastic programming approach is applied to characterize the uncertainty. •Two efficient risk measures, SSD and CVaR, are implemented in the VPP decision-making problem. -- Abstract: Future distribution systems will accommodate an increasing share of distributed energy resources (DERs). Facing with this new reality, virtual power plants (VPPs) play a key role to aggregate DERs with the aim of facilitating their involvement in wholesale electricity markets. In this paper, the trading strategies of a VPP in cooperation with its neighboring VPPs are addressed. Toward this aim, a portfolio of inter-regional contracts is considered to model this cooperation and maximize the energy trade opportunities of the VPP within a medium-term horizon. To hedge against profit variability caused by market price uncertainties, two efficient risk management approaches are also implemented in the VPP decision-making problem based on the concepts of conditional value at risk (CVaR) and second-order stochastic dominance constraints (SSD). The resulting models are formulated as mixed-integer linear programming (MILP) problems that can be solved using off-the-shelf software packages. The efficiency of the proposed risk-hedging models is analyzed through a detailed case study, and thereby relevant conclusions are drawn.

  8. The eighth TNM classification system for lung cancer: A consideration based on the degree of pleural invasion and involved neighboring structures.

    Science.gov (United States)

    Sakakura, Noriaki; Mizuno, Tetsuya; Kuroda, Hiroaki; Arimura, Takaaki; Yatabe, Yasushi; Yoshimura, Kenichi; Sakao, Yukinori

    2018-04-01

    The eighth tumor-node-metastasis (TNM) classification system for lung cancer has been used since January 2017 and must be applied to an individual institution's database. We analyzed pathological stage data of 2756 patients who underwent resection of non-small-cell lung cancer, particularly in terms of the degree of visceral pleural invasion and involved neighboring structures. Few patients had stage IIA disease (103, 4%); stratification between stages IB and IIA was insufficient (p = 0.129). When T2a tumors were divided into PL1 and PL2 subgroups based on the degree of pleural invasion, there was a significant prognostic difference between the subgroups (p consideration. Copyright © 2018 Elsevier B.V. All rights reserved.

  9. Embedding methods for phi4-interaction

    International Nuclear Information System (INIS)

    Hanckowiak, J.

    1985-01-01

    The idea of embedding a given theory in a class of similar theories is applied to quantum field theory in the case of phi 4 -interaction to derive different equations for the generating functional. The number of possible embeddings has been restricted by demanding that for the defined projections of the generating functional a closed system of equations be obtained

  10. Embedded Systems Design with 8051 Microcontrollers

    DEFF Research Database (Denmark)

    Karakahayov, Zdravko; Winther, Ole; Christensen, Knud Smed

    Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator.......Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator....

  11. SN 2010jl: Optical to hard X-ray observations reveal an explosion embedded in a ten solar mass cocoon

    International Nuclear Information System (INIS)

    Ofek, Eran O.; Gal-Yam, Avishay; Arcavi, Iair; Zoglauer, Andreas; Boggs, Steven E.; Barriére, Nicolas M.; Reynolds, Stephen P.; Fryer, Chris L.; Even, Wesley; Harrison, Fiona A.; Kulkarni, Shrinivas R.; Bellm, Eric; Grefenstette, Brian; Cenko, S. Bradley; Bloom, Joshua S.; Filippenko, Alexei V.; Christensen, Finn; Craig, William W.; Hailey, Charles J.; Laher, Russ

    2014-01-01

    Some supernovae (SNe) may be powered by the interaction of the SN ejecta with a large amount of circumstellar matter (CSM). However, quantitative estimates of the CSM mass around such SNe are missing when the CSM material is optically thick. Specifically, current estimators are sensitive to uncertainties regarding the CSM density profile and the ejecta velocity. Here we outline a method to measure the mass of the optically thick CSM around such SNe. We present new visible-light and X-ray observations of SN 2010jl (PTF 10aaxf), including the first detection of an SN in the hard X-ray band using NuSTAR. The total radiated luminosity of SN 2010jl is extreme—at least 9 × 10 50 erg. By modeling the visible-light data, we robustly show that the mass of the circumstellar material within ∼10 16 cm of the progenitor of SN 2010jl was in excess of 10 M ☉ . This mass was likely ejected tens of years prior to the SN explosion. Our modeling suggests that the shock velocity during shock breakout was ∼6000 km s –1 , decelerating to ∼2600 km s –1 about 2 yr after maximum light. Furthermore, our late-time NuSTAR and XMM spectra of the SN presumably provide the first direct measurement of SN shock velocity 2 yr after the SN maximum light—measured to be in the range of 2000-4500 km s –1 if the ions and electrons are in equilibrium, and ≳ 2000 km s –1 if they are not in equilibrium. This measurement is in agreement with the shock velocity predicted by our modeling of the visible-light data. Our observations also show that the average radial density distribution of the CSM roughly follows an r –2 law. A possible explanation for the ≳ 10 M ☉ of CSM and the wind-like profile is that they are the result of multiple pulsational pair instability events prior to the SN explosion, separated from each other by years.

  12. ASSESSMENT OF SEISMIC ANALYSIS METHODOLOGIES FOR DEEPLY EMBEDDED NPP STRUCTURES

    International Nuclear Information System (INIS)

    XU, J.; MILLER, C.; COSTANTINO, C.; HOFMAYER, C.; GRAVES, H. NRC.

    2005-01-01

    Several of the new generation nuclear power plant designs have structural configurations which are proposed to be deeply embedded. Since current seismic analysis methodologies have been applied to shallow embedded structures (e.g., ASCE 4 suggest that simple formulations may be used to model embedment effect when the depth of embedment is less than 30% of its foundation radius), the US Nuclear Regulatory Commission is sponsoring a program at the Brookhaven National Laboratory with the objective of investigating the extent to which procedures acceptable for shallow embedment depths are adequate for larger embedment depths. This paper presents the results of a study comparing the response spectra obtained from two of the more popular analysis methods for structural configurations varying from shallow embedment to complete embedment. A typical safety related structure embedded in a soil profile representative of a typical nuclear power plant site was utilized in the study and the depths of burial (DOB) considered range from 25-100% the height of the structure. Included in the paper are: (1) the description of a simplified analysis and a detailed approach for the SSI analyses of a structure with various DOB, (2) the comparison of the analysis results for the different DOBs between the two methods, and (3) the performance assessment of the analysis methodologies for SSI analyses of deeply embedded structures. The resulting assessment from this study has indicated that simplified methods may be capable of capturing the seismic response for much deeper embedded structures than would be normally allowed by the standard practice

  13. Solitons of an envelope in an inhomogeneous medium

    International Nuclear Information System (INIS)

    Churilov, S.M.

    1982-01-01

    Solutions of the Schroedinger nonlinear equation (SNE) used for the description of evolution of a wave packet envelope has been investigated in inhomogeneous and nonstationary media. It is shown that the SNE solution possessing two important properties exists. Firstly, the wave packet remains localized when propagating in an inhomogeneous medium. Secondly, the soliton width and amplitude are determined only with local characteristics of medium and don't depend on the prehistory. Problem of limits of obtained result applicability has been considered

  14. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Reinholdt, Peter; Kongsted, Jacob; Olsen, Jógvan Magnus Haugaard

    2017-01-01

    We analyze the performance of the polarizable density embedding (PDE) model-a new multiscale computational approach designed for prediction and rationalization of general molecular properties of large and complex systems. We showcase how the PDE model very effectively handles the use of large...

  15. Cultural macroevolution on neighbor graphs : vertical and horizontal transmission among Western North American Indian societies.

    Science.gov (United States)

    Towner, Mary C; Grote, Mark N; Venti, Jay; Borgerhoff Mulder, Monique

    2012-09-01

    What are the driving forces of cultural macroevolution, the evolution of cultural traits that characterize societies or populations? This question has engaged anthropologists for more than a century, with little consensus regarding the answer. We develop and fit autologistic models, built upon both spatial and linguistic neighbor graphs, for 44 cultural traits of 172 societies in the Western North American Indian (WNAI) database. For each trait, we compare models including or excluding one or both neighbor graphs, and for the majority of traits we find strong evidence in favor of a model which uses both spatial and linguistic neighbors to predict a trait's distribution. Our results run counter to the assertion that cultural trait distributions can be explained largely by the transmission of traits from parent to daughter populations and are thus best analyzed with phylogenies. In contrast, we show that vertical and horizontal transmission pathways can be incorporated in a single model, that both transmission modes may indeed operate on the same trait, and that for most traits in the WNAI database, accounting for only one mode of transmission would result in a loss of information.

  16. THE OXYGEN FEATURES IN TYPE Ia SUPERNOVAE AND IMPLICATIONS FOR THE NATURE OF THERMONUCLEAR EXPLOSIONS

    International Nuclear Information System (INIS)

    Zhao, Xulin; Wang, Xiaofeng; Sai, Hanna; Huang, Fang; Rui, Liming; Maeda, Keiichi; Wang, Lifan; Zhang, Jujia; Zhang, Tianmeng

    2016-01-01

    The absorption feature O i λ 7773 is an important spectral indicator for type Ia supernovae (SNe Ia) that can be used to trace the unburned material in outer layers of the exploding white dwarf (WD). In this work, we use a large sample of SNe Ia to examine this absorption at early phases (i.e., 13 day ≲ t ≲ 7 day) and make comparisons with the absorption features of Si ii λ 6355 and the Ca ii near-infrared triplet. We show that for a subgroup of spectroscopically normal SNe with normal photospheric velocities (i.e., v si ≲ 12,500 km s 1 at optical maximum), the line strength of the high velocity feature (HVF) of O i is inversely correlated with that of Si ii (or Ca ii), and this feature also shows a negative correlation with the luminosity of SNe Ia. This finding, together with other features we find for the O i HVF, reveal that for this subgroup of SNe Ia, explosive oxygen burning occurs in the outermost layer of the SN. Differences in the oxygen burning could lead to the observed diversity, which is in remarkable agreement with the popular delayed-detonation model of Chandrasekhar mass WDs.

  17. THE OXYGEN FEATURES IN TYPE Ia SUPERNOVAE AND IMPLICATIONS FOR THE NATURE OF THERMONUCLEAR EXPLOSIONS

    Energy Technology Data Exchange (ETDEWEB)

    Zhao, Xulin; Wang, Xiaofeng; Sai, Hanna; Huang, Fang; Rui, Liming [Physics Department and Tsinghua Center for Astrophysics, Tsinghua University, Beijing, 100084 (China); Maeda, Keiichi [Department of Astronomy, Kyoto University, Kitashirakawa-Oiwake-cho, Sakyo-ku, Kyoto 606-8502 (Japan); Wang, Lifan [Mitchell Institute for Fundamental Physics and Astronomy, Texas A and M University, College Station, TX 77843 (United States); Zhang, Jujia [Yunnan Observatories, Chinese Academy of Sciences, Kunming, 650216 (China); Zhang, Tianmeng, E-mail: wang_xf@mail.tsinghua.edu.cn, E-mail: zhaoxl11@mails.tsinghua.edu.cn, E-mail: keiichi.maeda@kusastro.kyoto-u.ac.jp [National Astronomical Observatory of China, Chinese Academy of Sciences, Beijing, 100012 (China)

    2016-08-01

    The absorption feature O i λ 7773 is an important spectral indicator for type Ia supernovae (SNe Ia) that can be used to trace the unburned material in outer layers of the exploding white dwarf (WD). In this work, we use a large sample of SNe Ia to examine this absorption at early phases (i.e., 13 day ≲ t ≲ 7 day) and make comparisons with the absorption features of Si ii λ 6355 and the Ca ii near-infrared triplet. We show that for a subgroup of spectroscopically normal SNe with normal photospheric velocities (i.e., v {sub si} ≲ 12,500 km s{sup 1} at optical maximum), the line strength of the high velocity feature (HVF) of O i is inversely correlated with that of Si ii (or Ca ii), and this feature also shows a negative correlation with the luminosity of SNe Ia. This finding, together with other features we find for the O i HVF, reveal that for this subgroup of SNe Ia, explosive oxygen burning occurs in the outermost layer of the SN. Differences in the oxygen burning could lead to the observed diversity, which is in remarkable agreement with the popular delayed-detonation model of Chandrasekhar mass WDs.

  18. VizieR Online Data Catalog: Circumstellar-interacting supernovae (Taddia+, 2015)

    Science.gov (United States)

    Taddia, F.; Sollerman, J.; Fremling, C.; Pastorello, A.; Leloudas, G.; Fransson, C.; Nyholm, A.; Stritzinger, M. D.; Ergon, M.; Roy, R.; Migotto, K.

    2015-11-01

    In Table 1 we report the list of 60 transients included in our sample. Thirty-five of them are SNe IIn, six are SNe Ibn, one is a SN Ia-CSM, 18 are SN IMs (if we also count SN 2009ip in the SN IMs, then we have 19 of these transients). With the NOT, long-slit spectra were obtained for the host galaxies of 13 SNe IIn, five SNe Ibn, one SN Ia-CSM, and 16 SN IMs (the derived metallicity for SN 2007sv was published in Tartaglia et al. 2015MNRAS.447..117T). The host galaxies observed at the NOT are marked with the letter "o" in the third column of Table 1. With the NOT, we also obtained broad-band R and narrow-band Hα images for the SNe IIn (except for SN 1995G) and Ibn. We complemented our observed sample with host galaxies whose metallicities (at the center of the galaxy or at the SN position) were already available in the literature (marked with the letter "l" in the third column of Table 1) or whose spectra were available in public archives (marked with the letter "a" in the third column of Table 1). (7 data files).

  19. Implementation of an embedded computer

    OpenAIRE

    Pikl, Bojan

    2011-01-01

    The goal of this thesis is to describe a production of an embedded computer. The thesis describes development and production of an embedded computer for the medical diode laser DL30 that is being developed in Robomed d.o.o.. The first part of the thesis describes the choice of hardware devices. I mostly describe the technologies that one can buy on the market. Moreover for every part of the computer installed and developed there is an argument why we selected that exact part. The second part ...

  20. Experimental study on embedment effect of foundation, 2

    International Nuclear Information System (INIS)

    Ohtomo, Keizo; Toma, Junichi; Hashimoto, Koichi; Hanada, Kazutake; Ueshima, Teruyuki; Yajima, Hiroshi

    1986-01-01

    In order to make clear the dynamic behavior of a embeded foundation on the quarternary ground experimentally, a series of forced vibration tests and seismic observation on both the small foundation (4 x 4 x 3 m) and the embeded form larger scale foundation of the shaking table (16 x 16 x 7.7 m) were conducted at the same site. The purposes this study are evaluating the dynamic behavior and the characteristics of dynamic stiffness and damping of the larger foundation based on forced vibration tests, and applying them to the dynamic response analysis of variable embedded foundations. In this report, the authors first examine frequency dependent property and its theoretical tendency of dynamic stiffness and damping surrounding table foundation. And then, consider an applicability and point of discussion related with the some theories which influence the embedment effect, in contrast with the experimental datum of the model foundation are past studies on a embedment effect (JPDR, Large-Scale Foundation in Tadotsu). (author)

  1. Programming Embedded Systems With C and GNU Development Tools

    CERN Document Server

    Barr, Michael

    2009-01-01

    Whether you're writing your first embedded program, designing the latest generation of hand-held whatchamacalits, or managing the people who do, this book is for you. Programming Embedded Systems will help you develop the knowledge and skills you need to achieve proficiency with embedded software.

  2. Efficient and accurate nearest neighbor and closest pair search in high-dimensional space

    KAUST Repository

    Tao, Yufei; Yi, Ke; Sheng, Cheng; Kalnis, Panos

    2010-01-01

    Nearest Neighbor (NN) search in high-dimensional space is an important problem in many applications. From the database perspective, a good solution needs to have two properties: (i) it can be easily incorporated in a relational database, and (ii

  3. Reduction of Conflicts in Mining Development Using "Good Neighbor Agreements"

    Science.gov (United States)

    Masaitis, A.

    2013-05-01

    New environmental and social challenges for the mining industry in both developed and developing countries show the obvious need to implement "responsible" mining practices that include improved community involvement. Good Neighbor Agreements (GNA's) are a relatively new mechanism for improving communication and trust between a mining company and the community. The focus of a GNA will be to provide a written and enforceable agreement, negotiated between the concerned public and the respective mining company to respond to concerns from the public, and also provide a mechanism for conflict resolution, when there is mutual benefit to maintain a working relationship. Development of GNA's, a recently evolving process that promotes environmentally sound relationships between mines and the surrounding communities. Modify and apply the resulting GNA formulas to the developing countries and countries with transitional economies. This is particularly important for countries that have poorly functioning regulatory systems that cannot guarantee a healthy and safe environment for the communities. The fundamental questions addressed by this research. 1. This is a three-year research project started in August 2012 at the University of Nevada, Reno (UNR) to develop a Good Neighbor Agreements standards as well as to investigate the details of mine development. 2. Identify spheres of possible cooperation between mining companies, government organizations, and the Non-Governmental Organizations (NGO's). Use this cooperation to develop international standards for the GNA, to promote exchange of environmental information, and exchange of successful environmental, health, and safety practices between mining operations from different countries. Discussion: The Good Neighbor Agreement currently evolving will address the following: 1. Provide an economically viable mechanism for developing a partnership between mining operations and the local communities that will increase mining industry

  4. Feasibility study on embedded transport core calculations

    International Nuclear Information System (INIS)

    Ivanov, B.; Zikatanov, L.; Ivanov, K.

    2007-01-01

    The main objective of this study is to develop an advanced core calculation methodology based on embedded diffusion and transport calculations. The scheme proposed in this work is based on embedded diffusion or SP 3 pin-by-pin local fuel assembly calculation within the framework of the Nodal Expansion Method (NEM) diffusion core calculation. The SP 3 method has gained popularity in the last 10 years as an advanced method for neutronics calculation. NEM is a multi-group nodal diffusion code developed, maintained and continuously improved at the Pennsylvania State University. The developed calculation scheme is a non-linear iteration process, which involves cross-section homogenization, on-line discontinuity factors generation, and boundary conditions evaluation by the global solution passed to the local calculation. In order to accomplish the local calculation, a new code has been developed based on the Finite Elements Method (FEM), which is capable of performing both diffusion and SP 3 calculations. The new code will be used in the framework of the NEM code in order to perform embedded pin-by-pin diffusion and SP 3 calculations on fuel assembly basis. The development of the diffusion and SP 3 FEM code is presented first following by its application to several problems. Description of the proposed embedded scheme is provided next as well as the obtained preliminary results of the C3 MOX benchmark. The results from the embedded calculations are compared with direct pin-by-pin whole core calculations in terms of accuracy and efficiency followed by conclusions made about the feasibility of the proposed embedded approach. (authors)

  5. Unsteady Flame Embedding

    KAUST Repository

    El-Asrag, Hossam A.

    2011-01-01

    Direct simulation of all the length and time scales relevant to practical combustion processes is computationally prohibitive. When combustion processes are driven by reaction and transport phenomena occurring at the unresolved scales of a numerical simulation, one must introduce a dynamic subgrid model that accounts for the multiscale nature of the problem using information available on a resolvable grid. Here, we discuss a model that captures unsteady flow-flame interactions- including extinction, re-ignition, and history effects-via embedded simulations at the subgrid level. The model efficiently accounts for subgrid flame structure and incorporates detailed chemistry and transport, allowing more accurate prediction of the stretch effect and the heat release. In this chapter we first review the work done in the past thirty years to develop the flame embedding concept. Next we present a formulation for the same concept that is compatible with Large Eddy Simulation in the flamelet regimes. The unsteady flame embedding approach (UFE) treats the flame as an ensemble of locally one-dimensional flames, similar to the flamelet approach. However, a set of elemental one-dimensional flames is used to describe the turbulent flame structure directly at the subgrid level. The calculations employ a one-dimensional unsteady flame model that incorporates unsteady strain rate, curvature, and mixture boundary conditions imposed by the resolved scales. The model is used for closure of the subgrid terms in the context of large eddy simulation. Direct numerical simulation (DNS) data from a flame-vortex interaction problem is used for comparison. © Springer Science+Business Media B.V. 2011.

  6. TTCN-3 for distributed testing embedded systems

    NARCIS (Netherlands)

    Blom, S.C.C.; Deiß, T.; Ioustinova, N.; Kontio, A.; Pol, van de J.C.; Rennoch, A.; Sidorova, N.; Virbitskaite, I.; Voronkov, A.

    2007-01-01

    Abstract. TTCN-3 is a standardized language for specifying and executing test suites that is particularly popular for testing embedded systems. Prior to testing embedded software in a target environment, the software is usually tested in the host environment. Executing in the host environment often

  7. Thermal performance of a PCB embedded pulsating heat pipe for power electronics applications

    International Nuclear Information System (INIS)

    Kearney, Daniel J.; Suleman, Omar; Griffin, Justin; Mavrakis, Georgios

    2016-01-01

    Highlights: • Planar, compact PCB embedded pulsating heat pipe for heat spreading applications. • Embedded heat pipe operates at sub-ambient pressure with environmentally. • Compatible fluids. • Range of optimum operating conditions, orientations and fill ratios identified. - Abstract: Low voltage power electronics applications (<1.2 kV) are pushing the design envelope towards increased functionality, better reliability, low profile and reduced cost. One packaging method to enable these constraints is the integration of active power electronic devices into the printed circuit board improving electrical and thermal performance. This development requires a reliable passive thermal management solution to mitigate hot spots due to the increased heat flux density. To this end, a 44 channel open looped pulsating heat pipe (OL-PHP) is experimentally investigated for two independent dielectric working fluids – Novec"T"M 649 and Novec"T"M 774 – due to their lower pressure operation and low global warming potential compared to traditional two-phase coolants. The OL-PHP is investigated in vertical (90°) orientation with fill ratios ranging from 0.30 to 0.70. The results highlight the steady state operating conditions for each working fluid with instantaneous plots of pressure, temperature, and thermal resistance; the minimum potential bulk thermal resistance for each fill ratio and the effective thermal conductivity achievable for the OL-PHP.

  8. Novel Concrete Temperature Monitoring Method Based on an Embedded Passive RFID Sensor Tag.

    Science.gov (United States)

    Liu, Yongsheng; Deng, Fangming; He, Yigang; Li, Bing; Liang, Zhen; Zhou, Shuangxi

    2017-06-22

    This paper firstly introduces the importance of temperature control in concrete measurement, then a passive radio frequency identification (RFID) sensor tag embedded for concrete temperature monitoring is presented. In order to reduce the influences of concrete electromagnetic parameters during the drying process, a T-type antenna is proposed to measure the concrete temperature at the required depth. The proposed RFID sensor tag is based on the EPC generation-2 ultra-high frequency (UHF) communication protocol and operates in passive mode. The temperature sensor can convert the sensor signals to corresponding digital signals without an external reference clock due to the adoption of phase-locked loop (PLL)-based architecture. Laboratory experimentation and on-site testing demonstrate that our sensor tag embedded in concrete can provide reliable communication performance in passive mode. The maximum communicating distance between reader and tag is 7 m at the operating frequency of 915 MHz and the tested results show high consistency with the results tested by a thermocouple.

  9. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing

    CERN Document Server

    Chao, Han-Chieh; Deng, Der-Jiunn; Park, James; HumanCom and EMC 2013

    2014-01-01

    The theme of HumanCom and EMC are focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

  10. An algorithm of a real time image tracking system using a camera with pan/tilt motors on an embedded system

    Science.gov (United States)

    Kim, Hie-Sik; Nam, Chul; Ha, Kwan-Yong; Ayurzana, Odgeral; Kwon, Jong-Won

    2005-12-01

    The embedded systems have been applied to many fields, including households and industrial sites. The user interface technology with simple display on the screen was implemented more and more. The user demands are increasing and the system has more various applicable fields due to a high penetration rate of the Internet. Therefore, the demand for embedded system is tend to rise. An embedded system for image tracking was implemented. This system is used a fixed IP for the reliable server operation on TCP/IP networks. Using an USB camera on the embedded Linux system developed a real time broadcasting of video image on the Internet. The digital camera is connected at the USB host port of the embedded board. All input images from the video camera are continuously stored as a compressed JPEG file in a directory at the Linux web-server. And each frame image data from web camera is compared for measurement of displacement Vector. That used Block matching algorithm and edge detection algorithm for past speed. And the displacement vector is used at pan/tilt motor control through RS232 serial cable. The embedded board utilized the S3C2410 MPU, which used the ARM 920T core form Samsung. The operating system was ported to embedded Linux kernel and mounted of root file system. And the stored images are sent to the client PC through the web browser. It used the network function of Linux and it developed a program with protocol of the TCP/IP.

  11. Fermionic symmetries: Extension of the two to one relationship between the spectra of even-even and neighboring odd mass nuclei

    International Nuclear Information System (INIS)

    Zamick, L.; Devi, Y.D.

    1999-01-01

    In the single j shell there is a two to one relationship between the spectra of certain even-even and neighboring odd mass nuclei; e.g., the calculated energy levels of J=0 + states in 44 Ti are at twice the energies of corresponding levels in 43 Ti( 43 Sc) with J=j=7/2. Here an approximate extension of the relationship is made by adopting a truncated seniority scheme; i.e., for 46 Ti and 45 Sc we get the relationship if we do not allow the seniority v=4 states to mix with the v=0 and v=2 states. Better than that, we get very close to the two to one relationship if seniority v=4 states are admixed perturbatively. In addition, it is shown that for the J=0 T=3 state in 46 Ti and for the J=j T=5/2 state in 45 Sc (i.e., the states of higher isospin) there are no admixtures in which the neutrons have seniority 4. copyright 1999 The American Physical Society

  12. Homogeneous Spaces and Equivariant Embeddings

    CERN Document Server

    Timashev, DA

    2011-01-01

    Homogeneous spaces of linear algebraic groups lie at the crossroads of algebraic geometry, theory of algebraic groups, classical projective and enumerative geometry, harmonic analysis, and representation theory. By standard reasons of algebraic geometry, in order to solve various problems on a homogeneous space it is natural and helpful to compactify it keeping track of the group action, i.e. to consider equivariant completions or, more generally, open embeddings of a given homogeneous space. Such equivariant embeddings are the subject of this book. We focus on classification of equivariant em

  13. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  14. Morphware - Fremtidens Embedded System Platform

    DEFF Research Database (Denmark)

    Madsen, Jan

    2006-01-01

    FPGA'er bliver i stigende grad brugt som komponenter i embedded systemer. Faldende priser, større kapacitet og en større felksibilitet har gjort FPGA'en til en attraktiv og konkurrencedygtig teknologi der tillader en stadig stigende grad af system integration, hvor traditionel hardware og software...... kombineres og rekonfigureres. Muligheden for at rekonfigurere systemet, og specielt rekonfigurerer det medens det kører, giver nogle helt nye muligheder for at designe og programmere embedded systemer. Dette foredrag vil give et indblik i disse nye og fremtidige muligheder....

  15. Small Private Key PKS on an Embedded Microprocessor

    OpenAIRE

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor...

  16. A Resource-Aware Component Model for Embedded Systems

    OpenAIRE

    Vulgarakis, Aneta

    2009-01-01

    Embedded systems are microprocessor-based systems that cover a large range of computer systems from ultra small computer-based devices to large systems monitoring and controlling complex processes. The particular constraints that must be met by embedded systems, such as timeliness, resource-use efficiency, short time-to-market and low cost, coupled with the increasing complexity of embedded system software, demand technologies and processes that will tackle these issues. An attractive approac...

  17. Gastronomy Tourism in Several Neighbor Countries of Indonesia: a Brief Review

    Directory of Open Access Journals (Sweden)

    Kurniasih Sukenti

    2014-04-01

    Full Text Available Gastronomy tourism, also called culinary tourism or food tourism, is a kind of tourism that provide attractions based on the culinary aspect owned by a country, region, or area. It is not only offers food and beverages as the main objects in its attractions, but also everything related to food activities ranging from food ingredients, preparation, processing, serving, as well as the cultural and local values. A well-managed culinary tourism will be a supportive program in developing and enhancing the tourism sector in a country. The objective of this paper is to describe the profile of gastronomy tourism in several neighbor countries of Indonesia, i.e. Hongkong, Singapore, Thailand, and Malaysia. This brief review is also discussed the potential of Indonesia gastronomy in supporting government’s tourism program. Basically, Indonesia has more enormous potential asset in managing its cultural heritages in term of culinary than its neighbor countries. A well-managed gastronomy tourism plays not only an important role in enhancing the economic sector, but also contribute in preserving the natural and cultural resources. Keywords: gastronomy tourism, culinary tourism, food tourism.

  18. Disentangling neighbors and extended range density oscillations in monatomic amorphous semiconductors.

    Science.gov (United States)

    Roorda, S; Martin, C; Droui, M; Chicoine, M; Kazimirov, A; Kycia, S

    2012-06-22

    High energy x-ray diffraction measurements of pure amorphous Ge were made and its radial distribution function (RDF) was determined at high resolution, revealing new information on the atomic structure of amorphous semiconductors. Fine structure in the second peak in the RDF provides evidence that a fraction of third neighbors are closer than some second neighbors; taking this into account leads to a narrow distribution of tetrahedral bond angles, (8.5 ± 0.1)°. A small peak which appears near 5 Å upon thermal annealing shows that some ordering in the dihedral bond-angle distribution takes place during structural relaxation. Extended range order is detected (in both a-Ge and a-Si) which persists to beyond 20 Å, and both the periodicity and its decay length increase upon thermal annealing. Previously, the effect of structural relaxation was only detected at intermediate range, involving reduced tetrahedral bond-angle distortions. These results enhance our understanding of the atomic order in continuous random networks and place significantly more stringent requirements on computer models intending to describe these networks, or their alternatives which attempt to describe the structure in terms of an arrangement of paracrystals.

  19. Multi-purpose passive debugging for embedded wireless

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Debugging embedded wireless systems can be cumbersome and hard due to low visibility. To ease the task of debugging we propose a multi-purpose passive debugging framework, called TinyDebug, for developing embedded wireless systems. TinyDebug is designed to be used throughout the entire system...

  20. Properties of magnetic impurities embedded into an anisotropic Heisenberg chain with spin gap

    International Nuclear Information System (INIS)

    Schlottmann, P.

    2000-01-01

    We consider a U(1)-invariant model consisting of the integrable anisotropic easy-axis Heisenberg chain of arbitrary spin S embedding an impurity of spin S'. The host chain has a spin gap for all values of S. The ground state properties and the elementary excitations of the host are studied as a function of the anisotropy and the magnetic field. The impurity is located on a link of the chain and interacts only with both neighboring sites. The coupling of the impurity to the lattice can be tuned by the impurity rapidity p 0 (usually playing the role of the Kondo coupling). The impurity model is then integrable as a function of two continuous parameters (the anisotropy and the impurity rapidity) and two discrete variables (the spins S and S'). The Bethe ansatz equations are derived and used to obtain the magnetization of the impurity. The impurity magnetization is non-universal as a function of p 0 . For small fields the impurity magnetization is determined by the spin gap and the van Hove singularity of the rapidity band. For an overcompensated impurity (S'< S) at intermediate fields there is a crossover to non-Fermi-liquid behavior remnant from the suppressed quantum critical point

  1. A grammar of Ik (Icé-tód) : Northeast Uganda's last thriving Kuliak language

    NARCIS (Netherlands)

    Schrock, Terrill B.

    2014-01-01

    The Ik language (Icé-tód), spoken in northeast Uganda, forms the Kuliak (Rub) subgroup along with So/Tepeth and Nyang’í. These latter two lects have already succombed to assimilative pressures from neighboring Nilotic pastoralists like the Karimojong, Turkana, and Pokot. Despite

  2. Patron perception and utilization of an embedded librarian program.

    Science.gov (United States)

    Blake, Lindsay; Ballance, Darra; Davies, Kathy; Gaines, Julie K; Mears, Kim; Shipman, Peter; Connolly-Brown, Maryska; Burchfield, Vicki

    2016-07-01

    The study measured the perceived value of an academic library's embedded librarian service model. The study took place at the health sciences campuses of a research institution. A web-based survey was distributed that asked respondents a series of questions about their utilization of and satisfaction with embedded librarians and services. Over 58% of respondents reported being aware of their embedded librarians, and 95% of these were satisfied with provided services. The overall satisfaction with services was encouraging, but awareness of the embedded program was low, suggesting an overall need for marketing of services.

  3. PCB Embedded Inductor for High-Frequency ZVS SEPIC Converter

    DEFF Research Database (Denmark)

    Dou, Yi; Ouyang, Ziwei; Thummala, Prasanth

    2018-01-01

    The volume and temperature rise of passive components, especially inductors, limit the momentum toward high power density in high-frequency power converters. To address the limitations, PCB integration of passive components should be considered with the benefit of low profile, excellent thermal...... characteristic and cost reduction. This paper investigates an embedded structure of inductors to further increase the power density of a low power DC-DC converter. A pair of coupling inductors have been embedded into the PCB. The detailed embedded process has been described and the characteristics of embedded...

  4. Equivalent charge source model based iterative maximum neighbor weight for sparse EEG source localization.

    Science.gov (United States)

    Xu, Peng; Tian, Yin; Lei, Xu; Hu, Xiao; Yao, Dezhong

    2008-12-01

    How to localize the neural electric activities within brain effectively and precisely from the scalp electroencephalogram (EEG) recordings is a critical issue for current study in clinical neurology and cognitive neuroscience. In this paper, based on the charge source model and the iterative re-weighted strategy, proposed is a new maximum neighbor weight based iterative sparse source imaging method, termed as CMOSS (Charge source model based Maximum neighbOr weight Sparse Solution). Different from the weight used in focal underdetermined system solver (FOCUSS) where the weight for each point in the discrete solution space is independently updated in iterations, the new designed weight for each point in each iteration is determined by the source solution of the last iteration at both the point and its neighbors. Using such a new weight, the next iteration may have a bigger chance to rectify the local source location bias existed in the previous iteration solution. The simulation studies with comparison to FOCUSS and LORETA for various source configurations were conducted on a realistic 3-shell head model, and the results confirmed the validation of CMOSS for sparse EEG source localization. Finally, CMOSS was applied to localize sources elicited in a visual stimuli experiment, and the result was consistent with those source areas involved in visual processing reported in previous studies.

  5. STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication

    Directory of Open Access Journals (Sweden)

    ZAGAR, D.

    2013-05-01

    Full Text Available Today's embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (EOS. One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP. The main advantage of using TFTP in embedded systems is the easy implementation. However, the problem at hand is the overall lack of security mechanisms in TFTP. This paper proposes an extension to the existing TFTP in a form of added security mechanisms: STFTP. The authentication is proposed using Digest Access Authentication process whereas the data encryption can be performed by various cryptographic algorithms. The proposal is experimentally tested using two embedded systems based on micro-controller architecture. Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. The system could be improved by using embedded systems of higher computational power or by the use of hardware encryption modules.

  6. A Fast Exact k-Nearest Neighbors Algorithm for High Dimensional Search Using k-Means Clustering and Triangle Inequality.

    Science.gov (United States)

    Wang, Xueyi

    2012-02-08

    The k-nearest neighbors (k-NN) algorithm is a widely used machine learning method that finds nearest neighbors of a test object in a feature space. We present a new exact k-NN algorithm called kMkNN (k-Means for k-Nearest Neighbors) that uses the k-means clustering and the triangle inequality to accelerate the searching for nearest neighbors in a high dimensional space. The kMkNN algorithm has two stages. In the buildup stage, instead of using complex tree structures such as metric trees, kd-trees, or ball-tree, kMkNN uses a simple k-means clustering method to preprocess the training dataset. In the searching stage, given a query object, kMkNN finds nearest training objects starting from the nearest cluster to the query object and uses the triangle inequality to reduce the distance calculations. Experiments show that the performance of kMkNN is surprisingly good compared to the traditional k-NN algorithm and tree-based k-NN algorithms such as kd-trees and ball-trees. On a collection of 20 datasets with up to 10(6) records and 10(4) dimensions, kMkNN shows a 2-to 80-fold reduction of distance calculations and a 2- to 60-fold speedup over the traditional k-NN algorithm for 16 datasets. Furthermore, kMkNN performs significant better than a kd-tree based k-NN algorithm for all datasets and performs better than a ball-tree based k-NN algorithm for most datasets. The results show that kMkNN is effective for searching nearest neighbors in high dimensional spaces.

  7. Exchange bias in Co nanoparticles embedded in an Mn matrix

    International Nuclear Information System (INIS)

    Domingo, Neus; Testa, Alberto M.; Fiorani, Dino; Binns, Chris; Baker, Stephen; Tejada, Javier

    2007-01-01

    Magnetic properties of Co nanoparticles of 1.8 nm diameter embedded in Mn and Ag matrices have been studied as a function of the volume fraction (VFF). While the Co nanoparticles in the Ag matrix show superparamagnetic behavior with T B =9.5 K (1.5% VFF) and T B =18.5 K (8.9% VFF), the Co nanoparticles in the antiferromagnetic Mn matrix show a transition peak at ∼65 K in the ZFC/FC susceptibility measurements, and an increase of the coercive fields at low temperature with respect to the Ag matrix. Exchange bias due to the interface exchange coupling between Co particles and the antiferromagnetic Mn matrix has also been studied. The exchange bias field (H eb ), observed for all Co/Mn samples below 40 K, decreases with decreasing volume fraction and with increasing temperature and depends on the field of cooling (H fc ). Exchange bias is accompanied by an increase of coercivity

  8. Experiences as an embedded librarian in online courses.

    Science.gov (United States)

    Konieczny, Alison

    2010-01-01

    Embedded librarianship gives librarians a prime opportunity to have a direct, positive impact in a clinical setting, classroom setting, or within a working group by providing integrated services that cater to the group's needs. Extending embedded librarian services beyond the various physical settings and into online classrooms is an exceptional way for librarians to engage online learners. This group of students is growing rapidly in numbers and could benefit greatly from having library services and resources incorporated into their classes. The author's services as an embedded librarian in fully online courses at a medium-sized university will be discussed, as will strategies, lessons learned, and opportunities for engaging in this realm. To develop a foundation of knowledge on embedded librarianship, an overview of this topic is provided.

  9. Comparison of Video Steganography Methods for Watermark Embedding

    Directory of Open Access Journals (Sweden)

    Griberman David

    2016-05-01

    Full Text Available The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

  10. Keeping up With The Neighbors: Nonproliferation and Implementation of UNSCR 1540

    Science.gov (United States)

    2016-02-15

    be respectful of the rule of law and a competitive participatory democracy , yet fail to implement UNSCR 1540, just like its neighbors. Discussion...risk-taking between 1816 and 1992. They found a strong association between conservative governmental decision-making and not only democracies , but...specifically those democracies with highly competitive political systems.46 In addition, Bruce Bueno de Mesquita, et.al. found a significant

  11. Credit scoring analysis using weighted k nearest neighbor

    Science.gov (United States)

    Mukid, M. A.; Widiharih, T.; Rusgiyono, A.; Prahutama, A.

    2018-05-01

    Credit scoring is a quatitative method to evaluate the credit risk of loan applications. Both statistical methods and artificial intelligence are often used by credit analysts to help them decide whether the applicants are worthy of credit. These methods aim to predict future behavior in terms of credit risk based on past experience of customers with similar characteristics. This paper reviews the weighted k nearest neighbor (WKNN) method for credit assessment by considering the use of some kernels. We use credit data from a private bank in Indonesia. The result shows that the Gaussian kernel and rectangular kernel have a better performance based on the value of percentage corrected classified whose value is 82.4% respectively.

  12. Earthquake response of nuclear reactor buildings deeply embedded in soil

    International Nuclear Information System (INIS)

    Masao, T.; Takasaki, Y.; Hirasawa, M.; Okajima, M.; Yamamoto, S.; Kawata, E.; Koori, Y.; Ochiai, S.; Shimizu, N.

    1980-01-01

    This paper is concerned with experimental and analytical studies to investigate dynamic behavior of deeply embedded structures such as nuclear reactor buildings. The principal points studied are as follows: (1) Examination of stiffness and radiation damping effects according to embedded depth, (2) verification for distributions of earth pressure according to embedded depth, (3) differences of response characteristics during oscillation according to embedded depth, and (4) proposal of an analytical method for seismic design. Experimental studies were performed by two ways: forced vibration test, and earthquake observation against a rigid body model embedded in soil. Three analytical procedures were performed to compare experimental results and to examine the relation between each procedure. Finally, the dynamic behavior for nuclear reactor buildings with different embedded depths were evaluated by an analytical method. (orig.)

  13. Embedding in thermosetting resins

    International Nuclear Information System (INIS)

    Buzonniere, A. de

    1985-01-01

    Medium activity waste coming either from nuclear power plants in operation such as evaporator concentrates, spent resins, filter cartridges or the dismantling of installations are embedded in order to obtain a product suitable for long term disposal. Embedding in thermosetting resins (polyester or epoxy) is one among currently used techniques; it is being developed by the CEA (Commissariat a l'Energie Atomique) and Technicatome (subsidiary of CEA and EDF). The process is easy to operate and yields excellent results particularly as far as volume reduction and radioelement containment (cesium particularly) are concerned. The process has already been in operation in four stationary plants for several years. Extension of the process to mobile units has been completed by Technicatome in collaboration with the CEA [fr

  14. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  15. Fusion yield rate recovery by escaping hot-spot fast ions in the neighboring fuel layer

    Science.gov (United States)

    Tang, Xian-Zhu; McDevitt, C. J.; Guo, Zehua; Berk, H. L.

    2014-02-01

    Free-streaming loss by fast ions can deplete the tail population in the hot spot of an inertial confinement fusion (ICF) target. Escaping fast ions in the neighboring fuel layer of a cryogenic target can produce a surplus of fast ions locally. In contrast to the Knudsen layer effect that reduces hot-spot fusion reactivity due to tail ion depletion, the inverse Knudsen layer effect increases fusion reactivity in the neighboring fuel layer. In the case of a burning ICF target in the presence of significant hydrodynamic mix which aggravates the Knudsen layer effect, the yield recovery largely compensates for the yield reduction. For mix-dominated sub-ignition targets, the yield reduction is the dominant process.

  16. Inflation beyond T-models and primordial B-modes

    International Nuclear Information System (INIS)

    Cai, Yi-Fu; Gong, Jinn-Ouk; Pi, Shi

    2014-01-01

    We describe extended theories which shares the gauge transformation symmetry of the T-models, and takes the T-models as well as Starobinsky model as special cases. We derive a general relation between the two slow-roll parameters, and find that a large class of models can be embedded. Such models include more general Starobinsky-like inflation as well as the chaotic inflation with a large tensor-to-scalar ratio consistent with the BICEP2 result

  17. Noncommutativity and Duality through the Symplectic Embedding Formalism

    Directory of Open Access Journals (Sweden)

    Everton M.C. Abreu

    2010-07-01

    Full Text Available This work is devoted to review the gauge embedding of either commutative and noncommutative (NC theories using the symplectic formalism framework. To sum up the main features of the method, during the process of embedding, the infinitesimal gauge generators of the gauge embedded theory are easily and directly chosen. Among other advantages, this enables a greater control over the final Lagrangian and brings some light on the so-called ''arbitrariness problem''. This alternative embedding formalism also presents a way to obtain a set of dynamically dual equivalent embedded Lagrangian densities which is obtained after a finite number of steps in the iterative symplectic process, oppositely to the result proposed using the BFFT formalism. On the other hand, we will see precisely that the symplectic embedding formalism can be seen as an alternative and an efficient procedure to the standard introduction of the Moyal product in order to produce in a natural way a NC theory. In order to construct a pedagogical explanation of the method to the nonspecialist we exemplify the formalism showing that the massive NC U(1 theory is embedded in a gauge theory using this alternative systematic path based on the symplectic framework. Further, as other applications of the method, we describe exactly how to obtain a Lagrangian description for the NC version of some systems reproducing well known theories. Naming some of them, we use the procedure in the Proca model, the irrotational fluid model and the noncommutative self-dual model in order to obtain dual equivalent actions for these theories. To illustrate the process of noncommutativity introduction we use the chiral oscillator and the nondegenerate mechanics.

  18. Regulatory CD4 T cells inhibit HIV-1 expression of other CD4 T cell subsets via interactions with cell surface regulatory proteins.

    Science.gov (United States)

    Zhang, Mingce; Robinson, Tanya O; Duverger, Alexandra; Kutsch, Olaf; Heath, Sonya L; Cron, Randy Q

    2018-03-01

    During chronic HIV-1 infection, regulatory CD4 T cells (Tregs) frequently represent the largest subpopulation of CD4 T cell subsets, implying relative resistant to HIV-1. When HIV-1 infection of CD4 T cells was explored in vitro and ex vivo from patient samples, Tregs possessed lower levels of HIV-1 DNA and RNA in comparison with conventional effector and memory CD4 T cells. Moreover, Tregs suppressed HIV-1 expression in other CD4 T cells in an in vitro co-culture system. This suppression was mediated in part via multiple inhibitory surface proteins expressed on Tregs. Antibody blockade of CTLA-4, PD-1, and GARP on Tregs resulted in increased HIV-1 DNA integration and mRNA expression in neighboring CD4 T cells. Moreover, antibody blockade of Tregs inhibitory proteins resulted in increased HIV-1 LTR transcription in co-cultured CD4 T cells. Thus, Tregs inhibit HIV-1 infection of other CD4 T cell subsets via interactions with inhibitory cell surface proteins. Copyright © 2018 Elsevier Inc. All rights reserved.

  19. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.

    2013-10-30

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  20. Spatially Partitioned Embedded Runge--Kutta Methods

    KAUST Repository

    Ketcheson, David I.; MacDonald, Colin B.; Ruuth, Steven J.

    2013-01-01

    We study spatially partitioned embedded Runge--Kutta (SPERK) schemes for partial differential equations (PDEs), in which each of the component schemes is applied over a different part of the spatial domain. Such methods may be convenient for problems in which the smoothness of the solution or the magnitudes of the PDE coefficients vary strongly in space. We focus on embedded partitioned methods as they offer greater efficiency and avoid the order reduction that may occur in nonembedded schemes. We demonstrate that the lack of conservation in partitioned schemes can lead to nonphysical effects and propose conservative additive schemes based on partitioning the fluxes rather than the ordinary differential equations. A variety of SPERK schemes are presented, including an embedded pair suitable for the time evolution of fifth-order weighted nonoscillatory spatial discretizations. Numerical experiments are provided to support the theory.

  1. Embedded and real-time operating systems

    CERN Document Server

    Wang, K C

    2017-01-01

    This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). Throughout the book, complete working sample systems demonstrate the design principles and...

  2. Proposed on Device Capability based Authentication using AES-GCM for Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Babar, Sachin D.; Mahalle, Parikshit N.; Prasad, Neeli R.

    2011-01-01

    Economics of scale in Internet of Things (IoT) presents new security challenges for ubiquitous devices in terms of authentication, addressing and embedded security. Currently available cryptographic techniques require further analysis to determine applicability to IoT. We introduce...

  3. Aftershock identification problem via the nearest-neighbor analysis for marked point processes

    Science.gov (United States)

    Gabrielov, A.; Zaliapin, I.; Wong, H.; Keilis-Borok, V.

    2007-12-01

    The centennial observations on the world seismicity have revealed a wide variety of clustering phenomena that unfold in the space-time-energy domain and provide most reliable information about the earthquake dynamics. However, there is neither a unifying theory nor a convenient statistical apparatus that would naturally account for the different types of seismic clustering. In this talk we present a theoretical framework for nearest-neighbor analysis of marked processes and obtain new results on hierarchical approach to studying seismic clustering introduced by Baiesi and Paczuski (2004). Recall that under this approach one defines an asymmetric distance D in space-time-energy domain such that the nearest-neighbor spanning graph with respect to D becomes a time- oriented tree. We demonstrate how this approach can be used to detect earthquake clustering. We apply our analysis to the observed seismicity of California and synthetic catalogs from ETAS model and show that the earthquake clustering part is statistically different from the homogeneous part. This finding may serve as a basis for an objective aftershock identification procedure.

  4. Carbon-hydrogen defects with a neighboring oxygen atom in n-type Si

    Science.gov (United States)

    Gwozdz, K.; Stübner, R.; Kolkovsky, Vl.; Weber, J.

    2017-07-01

    We report on the electrical activation of neutral carbon-oxygen complexes in Si by wet-chemical etching at room temperature. Two deep levels, E65 and E75, are observed by deep level transient spectroscopy in n-type Czochralski Si. The activation enthalpies of E65 and E75 are obtained as EC-0.11 eV (E65) and EC-0.13 eV (E75). The electric field dependence of their emission rates relates both levels to single acceptor states. From the analysis of the depth profiles, we conclude that the levels belong to two different defects, which contain only one hydrogen atom. A configuration is proposed, where the CH1BC defect, with hydrogen in the bond-centered position between neighboring C and Si atoms, is disturbed by interstitial oxygen in the second nearest neighbor position to substitutional carbon. The significant reduction of the CH1BC concentration in samples with high oxygen concentrations limits the use of this defect for the determination of low concentrations of substitutional carbon in Si samples.

  5. Patron perception and utilization of an embedded librarian program

    Directory of Open Access Journals (Sweden)

    Lindsay Blake, MLIS, AHIP

    2016-09-01

    Full Text Available Objective: The study measured the perceived value of an academic library’s embedded librarian service model. Setting: The study took place at the health sciences campuses of a research institution. Methods: A web-based survey was distributed that asked respondents a series of questions about their utilization of and satisfaction with embedded librarians and services. Results: Over 58% of respondents reported being aware of their embedded librarians, and 95% of these were satisfied with provided services. Conclusions: The overall satisfaction with services was encouraging, but awareness of the embedded program was low, suggesting an overall need for marketing of services.

  6. Six transformer based asymmetrical embedded Z-source inverters

    DEFF Research Database (Denmark)

    Wei, Mo; Poh Chiang, Loh; Chi, Jin

    2013-01-01

    Embedded/Asymmetrical embedded Z-source inverters were proposed to maintain smooth input current/voltage across the dc source and within the impedance network, remain the shoot-through feature used to boost up the dc-link voltage without adding bulky filter at input side. This paper introduces a ...... a class of transformer based asymmetrical embedded Z-source inverters which keep the smooth input current and voltage while achieving enhanced voltage boost capability. The presented inverters are verified by laboratory prototypes experimentally....

  7. N=2 heterotic string compactifications on orbifolds of K3×T{sup 2}

    Energy Technology Data Exchange (ETDEWEB)

    Chattopadhyaya, Aradhita; David, Justin R. [Centre for High Energy Physics, Indian Institute of Science,C.V. Raman Avenue, Bangalore 560012 (India)

    2017-01-10

    We study N=2 compactifications of E{sub 8}×E{sub 8} heterotic string theory on orbifolds of K3×T{sup 2} by g{sup ′} which acts as an ℤ{sub N} automorphism of K3 together with a 1/N shift on a circle of T{sup 2}. The orbifold action g{sup ′} corresponds to the 26 conjugacy classes of the Mathieu group M{sub 24}. We show that for the standard embedding the new supersymmetric index for these compactifications can always be decomposed into the elliptic genus of K3 twisted by g{sup ′}. The difference in one-loop corrections to the gauge couplings are captured by automorphic forms obtained by the theta lifts of the elliptic genus of K3 twisted by g{sup ′}. We work out in detail the case for which g{sup ′} belongs to the equivalence class 2B. We then investigate all the non-standard embeddings for K3 realized as a T{sup 4}/ℤ{sub ν} orbifold with ν=2,4 and g{sup ′} the 2A involution. We show that for non-standard embeddings the new supersymmetric index as well as the difference in one-loop corrections to the gauge couplings are completely characterized by the instanton numbers of the embeddings together with the difference in number of hypermultiplets and vector multiplets in the spectrum.

  8. Making the Case for Embedded Metadata in Digital Images

    DEFF Research Database (Denmark)

    Smith, Kari R.; Saunders, Sarah; Kejser, U.B.

    2014-01-01

    This paper discusses the standards, methods, use cases, and opportunities for using embedded metadata in digital images. In this paper we explain the past and current work engaged with developing specifications, standards for embedding metadata of different types, and the practicalities of data...... exchange in heritage institutions and the culture sector. Our examples and findings support the case for embedded metadata in digital images and the opportunities for such use more broadly in non-heritage sectors as well. We encourage the adoption of embedded metadata by digital image content creators...... and curators as well as those developing software and hardware that support the creation or re-use of digital images. We conclude that the usability of born digital images as well as physical objects that are digitized can be extended and the files preserved more readily with embedded metadata....

  9. Making the Case for Embedded Metadata in Digital Images

    DEFF Research Database (Denmark)

    Smith, Kari R.; Saunders, Sarah; Kejser, U.B.

    2014-01-01

    exchange in heritage institutions and the culture sector. Our examples and findings support the case for embedded metadata in digital images and the opportunities for such use more broadly in non-heritage sectors as well. We encourage the adoption of embedded metadata by digital image content creators......This paper discusses the standards, methods, use cases, and opportunities for using embedded metadata in digital images. In this paper we explain the past and current work engaged with developing specifications, standards for embedding metadata of different types, and the practicalities of data...... and curators as well as those developing software and hardware that support the creation or re-use of digital images. We conclude that the usability of born digital images as well as physical objects that are digitized can be extended and the files preserved more readily with embedded metadata....

  10. Spectral embedding-based registration (SERg) for multimodal fusion of prostate histology and MRI

    Science.gov (United States)

    Hwuang, Eileen; Rusu, Mirabela; Karthigeyan, Sudha; Agner, Shannon C.; Sparks, Rachel; Shih, Natalie; Tomaszewski, John E.; Rosen, Mark; Feldman, Michael; Madabhushi, Anant

    2014-03-01

    Multi-modal image registration is needed to align medical images collected from different protocols or imaging sources, thereby allowing the mapping of complementary information between images. One challenge of multimodal image registration is that typical similarity measures rely on statistical correlations between image intensities to determine anatomical alignment. The use of alternate image representations could allow for mapping of intensities into a space or representation such that the multimodal images appear more similar, thus facilitating their co-registration. In this work, we present a spectral embedding based registration (SERg) method that uses non-linearly embedded representations obtained from independent components of statistical texture maps of the original images to facilitate multimodal image registration. Our methodology comprises the following main steps: 1) image-derived textural representation of the original images, 2) dimensionality reduction using independent component analysis (ICA), 3) spectral embedding to generate the alternate representations, and 4) image registration. The rationale behind our approach is that SERg yields embedded representations that can allow for very different looking images to appear more similar, thereby facilitating improved co-registration. Statistical texture features are derived from the image intensities and then reduced to a smaller set by using independent component analysis to remove redundant information. Spectral embedding generates a new representation by eigendecomposition from which only the most important eigenvectors are selected. This helps to accentuate areas of salience based on modality-invariant structural information and therefore better identifies corresponding regions in both the template and target images. The spirit behind SERg is that image registration driven by these areas of salience and correspondence should improve alignment accuracy. In this work, SERg is implemented using Demons

  11. Operating system concepts for embedded multicores

    OpenAIRE

    Horst, Oliver; Schmidt, Adriaan

    2014-01-01

    Currently we can see an increasing adoption of multi-core platforms in the area of embedded systems. While these new hardware platforms offer the potential to satisfy the ever increasing demand for computational power, they pose considerable challenges with regard to software development. This affects the application software itself, but also the system design and architecture. Here, we address the consequences for operating system architecture in embedded systems. After dis-cussing current a...

  12. Spatial correlations between browsing on balsam fir by white-tailed deer and the nutritional value of neighboring winter forage.

    Science.gov (United States)

    Champagne, Emilie; Moore, Ben D; Côté, Steeve D; Tremblay, Jean-Pierre

    2018-03-01

    Associational effects, that is, the influence of neighboring plants on herbivory suffered by a plant, are an outcome of forage selection. Although forage selection is a hierarchical process, few studies have investigated associational effects at multiple spatial scales. Because the nutritional quality of plants can be spatially structured, it might differently influence associational effects across multiple scales. Our objective was to determine the radius of influence of neighbor density and nutritional quality on balsam fir ( Abies balsamea ) herbivory by white-tailed deer ( Odocoileus virginianus ) in winter. We quantified browsing rates on fir and the density and quality of neighboring trees in a series of 10-year-old cutovers on Anticosti Island (Canada). We used cross-correlations to investigate relationships between browsing rates and the density and nutritional quality of neighboring trees at distances up to 1,000 m. Balsam fir and white spruce ( Picea glauca ) fiber content and dry matter in vitro true digestibility were correlated with fir browsing rate at the finest extra-patch scale (across distance of up to 50 m) and between cutover areas (300-400 m). These correlations suggest associational effects, that is, low nutritional quality of neighbors reduces the likelihood of fir herbivory (associational defense). Our results may indicate associational effects mediated by intraspecific variation in plant quality and suggest that these effects could occur at scales from tens to hundreds of meters. Understanding associational effects could inform strategies for restoration or conservation; for example, planting of fir among existing natural regeneration could be concentrated in areas of low nutritional quality.

  13. Teaching Embedded System Concepts for Technological Literacy

    Science.gov (United States)

    Winzker, M.; Schwandt, A.

    2011-01-01

    A basic understanding of technology is recognized as important knowledge even for students not connected with engineering and computer science. This paper shows that embedded system concepts can be taught in a technological literacy course. An embedded system teaching block that has been used in an electronics module for non-engineers is…

  14. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply......-typed terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  15. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply......-typed terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  16. Fabrication of 6FDA-durene membrane incorporated with zeolite T and aminosilane grafted zeolite T for CO2/CH4 separation

    Science.gov (United States)

    Jusoh, Norwahyu; Fong Yeong, Yin; Keong Lau, Kok; Shariff, Azmi Mohd

    2017-08-01

    In the present work, zeolite T and aminosilane grafted zeolite T are embedded into 6FDA-durene polyimide phase for the fabrication of mixed matrix membranes (MMMs). FESEM images demonstrated that the improvement of interfacial adhesion between zeolite and polymer phases in MMM loaded with aminosilane grafted zeolite T was not significant as compared to zeolite T/6FDA-durene MMM. From the gas permeation test, CO2/CH4 selectivity up to 26.4 was achieved using MMM containing aminosilane grafted zeolite T, while MMM loaded with ungrafted zeolite T showed CO2/CH4 selectivity of 19.1. In addition, MMM incorporated with aminosilane grafted zeolite T particles successfully lies on Robeson upper bound 2008, which makes it an attractive candidate for CO2/CH4 separation.

  17. Embedded Fragments Registry (EFR)

    Data.gov (United States)

    Department of Veterans Affairs — In 2009, the Department of Defense estimated that approximately 40,000 service members who served in OEF/OIF may have embedded fragment wounds as the result of small...

  18. RESLanjut: The learning media for improve students understanding in embedded systems

    Science.gov (United States)

    Indrianto, Susanti, Meilia Nur Indah; Karina, Djunaidi

    2017-08-01

    The use of network in embedded system can be done with many kinds of network, with the use of mobile phones, bluetooths, modems, ethernet cards, wireless technology and so on. Using network in embedded system could help people to do remote controlling. On previous research, researchers found that many students have the ability to comprehend the basic concept of embedded system. They could also make embedded system tools but without network integration. And for that, a development is needed for the embedded system module. The embedded system practicum module design needs a prototype method in order to achieve the desired goal. The prototype method is often used in the real world. Or even, a prototype method is a part of products that consist of logic expression or external physical interface. The embedded system practicum module is meant to increase student comprehension of embedded system course, and also to encourage students to innovate on technology based tools. It is also meant to help teachers to teach the embedded system concept on the course. The student comprehension is hoped to increase with the use of practicum course.

  19. The influence of As/III pressure ratio on nitrogen nearest-neighbor environments in as-grown GaInNAs quantum wells

    International Nuclear Information System (INIS)

    Kudrawiec, R.; Poloczek, P.; Misiewicz, J.; Korpijaervi, V.-M.; Laukkanen, P.; Pakarinen, J.; Dumitrescu, M.; Guina, M.; Pessa, M.

    2009-01-01

    The energy fine structure, corresponding to different nitrogen nearest-neighbor environments, was observed in contactless electroreflectance (CER) spectra of as-grown GaInNAs quantum wells (QWs) obtained at various As/III pressure ratios. In the spectral range of the fundamental transition, two CER resonances were detected for samples grown at low As pressures whereas only one CER resonance was observed for samples obtained at higher As pressures. This resonance corresponds to the most favorable nitrogen nearest-neighbor environment in terms of the total crystal energy. It means that the nitrogen nearest-neighbor environment in GaInNAs QWs can be controlled in molecular beam epitaxy process by As/III pressure ratio.

  20. THE SUPERNOVA DELAY TIME DISTRIBUTION IN GALAXY CLUSTERS AND IMPLICATIONS FOR TYPE-Ia PROGENITORS AND METAL ENRICHMENT

    International Nuclear Information System (INIS)

    Maoz, Dan; Sharon, Keren; Avishay Gal-Yam

    2010-01-01

    Knowledge of the supernova (SN) delay time distribution (DTD)-the SN rate versus time that would follow a hypothetical brief burst of star formation-can shed light on SN progenitors and physics, as well as on the timescales of chemical enrichment in different environments. We compile recent measurements of the Type-Ia SN (SN Ia) rate in galaxy clusters at redshifts from z = 0 out to z = 1.45, just 2 Gyr after cluster star formation at z ∼ 3. We review the plausible range for the observed total iron-to-stellar mass ratio in clusters, based on the latest data and analyses, and use it to constrain the time-integrated number of SN Ia events in clusters. With these data, we recover the DTD of SNe Ia in cluster environments. The DTD is sharply peaked at the shortest time-delay interval we probe, 0Gyr -1.2±0.3 from t = 400 Myr to a Hubble time can satisfy both constraints. Shallower power laws such as t -1/2 cannot, assuming a single DTD, and a single star formation burst (either brief or extended) at high z. This implies that 50%-85% of SNe Ia explode within 1 Gyr of star formation. DTDs from double-degenerate (DD) models, which generically have ∼t -1 shapes over a wide range of timescales, match the data, but only if their predictions are scaled up by factors of 5-10. Single-degenerate (SD) DTDs always give poor fits to the data, due to a lack of delayed SNe and overall low numbers of SNe. The observations can also be reproduced with a combination of two SN Ia populations-a prompt SD population of SNe Ia that explodes within a few Gyr of star formation, and produces about 60% of the iron mass in clusters, and a DD population that contributes the events seen at z < 1.5. An alternative scenario of a single, prompt, SN Ia population, but a composite star formation history in clusters, consisting of a burst at high z, followed by a constant star formation rate, can reproduce the SN rates, but is at odds with direct measurements of star formation in clusters at 0 < z

  1. Diagnosis of Diabetes Diseases Using an Artificial Immune Recognition System2 (AIRS2) with Fuzzy K-nearest Neighbor

    OpenAIRE

    CHIKH, Mohamed Amine; SAIDI, Meryem; SETTOUTI, Nesma

    2012-01-01

    The use of expert systems and artificial intelligence techniques in disease diagnosis has been increasing gradually. Artificial Immune Recognition System (AIRS) is one of the methods used in medical classification problems. AIRS2 is a more efficient version of the AIRS algorithm. In this paper, we used a modified AIRS2 called MAIRS2 where we replace the K- nearest neighbors algorithm with the fuzzy K-nearest neighbors to improve the diagnostic accuracy of diabetes diseases. The diabetes disea...

  2. On the difference in oscillator strengths of inner shell excitations in noble gases and their alkali neighbors

    International Nuclear Information System (INIS)

    Amusia, M.Y.; Baltenkov, A.S.; Zhuravleva, G.I.

    1995-01-01

    It is demonstrated that the oscillator strength of resonant inner-shell excitation in a noble gas atom is considerably smaller than that in its alkali neighbor because in the latter case the effective charge acting upon excited electron is much bigger. With increase of the excitation's principal quantum number the difference between line intensities in noble gases and their alkali neighbors rapidly disappears. The calculations are performed in the Hartree-Fock approximation and with inclusion of rearrangement effects due to inner vacancy creation and its Auger decay. A paper has been submitted for publication

  3. Embedding the Finite Sampling Process at a Rate

    OpenAIRE

    Shorack, Galen R.

    1991-01-01

    A huge body of if and only if theorems can be obtained based on certain strong embedding theorems for the partial sum process $\\mathbb{S}_n$ and the uniform empirical and quantile processes $\\mathbb{U}_n$ and $\\mathbb{V}_n$. This embedding was accomplished in 1986 by M. Csorgo, S. Csorgo, L. Horvath and D. Mason. Their embedding is beautifully formulated so that many necessary and sufficient type results can be established using it. It is worthwhile to have an accessible proof. Indeed, these ...

  4. Nearest neighbors EPR superhyperfine interaction in divalent iridium complexes in alkali halide host lattice

    International Nuclear Information System (INIS)

    Pinhal, N.M.; Vugman, N.V.

    1983-01-01

    Further splitting of chlorine superhyperfine lines on the EPR spectrum of the [Ir (CN) 4 Cl 2 ] 4 - molecular species in NaCl latice indicates a super-superhyperfine interaction with the nearest neighbors sodium atoms. (Author) [pt

  5. Is embedding entailed in consumer valuation of food safety characteristics?

    DEFF Research Database (Denmark)

    Mørkbak, Morten Raun; Christensen, Tove; Gyrd-Hansen, Dorte

    2011-01-01

    Consumers' preferences for food safety characteristics are investigated with a particular focus on the existence of an embedding effect. Embedding exists if consumer valuation of food safety is insensitive to scope. We conduct between-attribute external tests for embedding in two choice experiments...

  6. Embedded fiber optic ultrasonic sensors and generators

    Science.gov (United States)

    Dorighi, John F.; Krishnaswamy, Sridhar; Achenbach, Jan D.

    1995-04-01

    Ultrasonic sensors and generators based on fiber-optic systems are described. It is shown that intrinsic fiber optic Fabry-Perot ultrasound sensors that are embedded in a structure can be stabilized by actively tuning the laser frequency. The need for this method of stabilization is demonstrated by detecting piezoelectric transducer-generated ultrasonic pulses in the presence of low frequency dynamic strains that are intentionally induced to cause sensor drift. The actively stabilized embedded fiber optic Fabry-Perot sensor is also shown to have sufficient sensitivity to detect ultrasound that is generated in the interior of a structure by means of a high-power optical fiber that pipes energy from a pulsed laser to an embedded generator of ultrasound.

  7. Eulerian graph embeddings and trails confined to lattice tubes

    International Nuclear Information System (INIS)

    Soteros, C E

    2006-01-01

    Embeddings of graphs in sublattices of the square and simple cubic lattice known as tubes (or prisms) are considered. For such sublattices, two combinatorial bounds are obtained which each relate the number of embeddings of all closed eulerian graphs with k branch points (vertices of degree greater than two) to the number of self-avoiding polygons. From these bounds it is proved that the entropic critical exponent for the number of embeddings of closed eulerian graphs with k branch points is equal to k, and the entropic critical exponent for the number of closed trails with k branch points is equal to k + 1. One of the required combinatorial bounds is obtained via Madras' 1999 lattice cluster pattern theorem, which yields a bound on the number of ways to convert a self-avoiding polygon into a closed eulerian graph embedding with k branch points. The other combinatorial bound is established by constructing a method for sequentially removing branch points from a closed eulerian graph embedding; this yields a bound on the number of ways to convert a closed eulerian graph embedding into a self-avoiding polygon

  8. Embedding beyond electrostatics-The role of wave function confinement.

    Science.gov (United States)

    Nåbo, Lina J; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna; Solanko, Lukasz M; Wüstner, Daniel; Kongsted, Jacob

    2016-09-14

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π(∗) transition, which was not possible using an embedding method that only includes electrostatics. This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods.

  9. Design Technology for Heterogeneous Embedded Systems

    CERN Document Server

    O'Connor, Ian; Piguet, Christian

    2012-01-01

    Designing technology to address the problem of heterogeneous embedded systems, while remaining compatible with standard “More Moore” flows, i.e. capable of handling simultaneously both silicon complexity and system complexity, represents one of the most important challenges facing the semiconductor industry today. While the micro-electronics industry has built its own specific design methods to focus mainly on the management of complexity through the establishment of abstraction levels, the emergence of device heterogeneity requires new approaches enabling the satisfactory design of physically heterogeneous embedded systems for the widespread deployment of such systems. This book, compiled largely from a set of contributions from participants of past editions of the Winter School on Heterogeneous Embedded Systems Design Technology (FETCH), proposes a broad and holistic overview of design techniques used to tackle the various facets of heterogeneity in terms of technology and opportunities at the physical ...

  10. Dynamic memory management for embedded systems

    CERN Document Server

    Atienza Alonso, David; Poucet, Christophe; Peón-Quirós, Miguel; Bartzas, Alexandros; Catthoor, Francky; Soudris, Dimitrios

    2015-01-01

    This book provides a systematic and unified methodology, including basic principles and reusable processes, for dynamic memory management (DMM) in embedded systems.  The authors describe in detail how to design and optimize the use of dynamic memory in modern, multimedia and network applications, targeting the latest generation of portable embedded systems, such as smartphones. Coverage includes a variety of design and optimization topics in electronic design automation of DMM, from high-level software optimization to microarchitecture-level hardware support. The authors describe the design of multi-layer dynamic data structures for the final memory hierarchy layers of the target portable embedded systems and how to create a low-fragmentation, cost-efficient, dynamic memory management subsystem out of configurable components for the particular memory allocation and de-allocation patterns for each type of application.  The design methodology described in this book is based on propagating constraints among de...

  11. Distributed embedded smart cameras architectures, design and applications

    CERN Document Server

    Velipasalar, Senem

    2014-01-01

    This publication addresses distributed embedded smart cameras –cameras that perform onboard analysis and collaborate with other cameras. This book provides the material required to better understand the architectural design challenges of embedded smart camera systems, the hardware/software ecosystem, the design approach for, and applications of distributed smart cameras together with the state-of-the-art algorithms. The authors concentrate on the architecture, hardware/software design, realization of smart camera networks from applications to architectures, in particular in the embedded and mobile domains. •                    Examines energy issues related to wireless communication such as decreasing energy consumption to increase battery-life •                    Discusses processing large volumes of video data on an embedded environment in real-time •                    Covers design of realistic applications of distributed and embedded smart...

  12. Nearest neighbor affects G:C to A:T transitions induced by alkylating agents.

    Science.gov (United States)

    Glickman, B W; Horsfall, M J; Gordon, A J; Burns, P A

    1987-01-01

    The influence of local DNA sequence on the distribution of G:C to A:T transitions induced in the lacI gene of E. coli by a series of alkylating agents has been analyzed. In the case of nitrosoguanidine, two nitrosoureas and a nitrosamine, a strong preference for mutation at sites proceeded 5' by a purine base was noted. This preference was observed with both methyl and ethyl donors where the predicted common ultimate alkylating species is the alkyl diazonium ion. In contrast, this preference was not seen following treatment with ethylmethanesulfonate. The observed preference for 5'PuG-3' site over 5'-PyG-3' sites corresponds well with alterations observed in the Ha-ras oncogene recovered after treatment with NMU. This indicates that the mutations recovered in the oncogenes are likely the direct consequence of the alkylation treatment and that the local sequence effects seen in E. coli also appear to occur in mammalian cells. PMID:3329097

  13. Nearest neighbor affects G:C to A:T transitions induced by alkylating agents

    Energy Technology Data Exchange (ETDEWEB)

    Glickman, B.W.; Horsfall, M.J.; Gordon, A.J.E.; Burns, P.A.

    1987-12-01

    The influence of local DNA sequence on the distribution of G:C to A:T transitions induced in the lacI gene of E. coli by a series of alkylating agents has been analyzed. In the case of nitrosoguanidine, two nitrosoureas and a nitrosamine, a strong preference for mutation at sites proceeded 5' by a purine base was noted. This preferences was observed with both methyl and ethyl donors where the predicted common ultimate alkylating species in the alkyl diazonium ion. In contrast, this preferences was not seen following treatment with ethylmethanesulfonate. The observed preference for 5'PuG-3' site over 5'-PyG-3' sites corresponds well with alterations observed in the Ha-ras oncogene recovered after treatment with NMU. This indicates that the mutations recovered in the oncogenes are likely the direct consequence of the alkylation treatment and that the local sequence effects seen in E. coli also appear to occur in mammalian cells.

  14. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  15. Embedded generation connection incentives for distribution network operators

    Energy Technology Data Exchange (ETDEWEB)

    Williams, P.; Andrews, S.

    2002-07-01

    This is the final report with respect to work commissioned by the Department of Trade and Industry (DTI) as part of the New and Renewable Energy Programme into incentives for distribution network operators (DNOs) for the connection of embedded generation. This report, which incorporates the contents of the interim report submitted in February 2002, considers the implications of changes in the structure and regulation in the UK electricity industry on the successful technical and commercial integrated of embedded generation into distribution networks. The report examines: the obligations of public electricity suppliers (PESs); current DNO practices regarding the connection of embedded generation; the changes introduced by the Utilities Act 2000, including the impact of new obligations placed on DNOs on the connection of embedded generation and the requirements of the new Electricity Distribution Standard Licence conditions; and problems and prospects for DNO incentives.

  16. Scheduling of network access for feedback-based embedded systems

    Science.gov (United States)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  17. Exactly solvable spin-1 Ising–Heisenberg diamond chain with the second-neighbor interaction between nodal spins

    International Nuclear Information System (INIS)

    Hovhannisyan, V V; Ananikian, N S; Strečka, J

    2016-01-01

    The spin-1 Ising–Heisenberg diamond chain with the second-neighbor interaction between nodal spins is rigorously solved using the transfer-matrix method. In particular, exact results for the ground state, magnetization process and specific heat are presented and discussed. It is shown that further-neighbor interaction between nodal spins gives rise to three novel ground states with a translationally broken symmetry, but at the same time, does not increases the total number of intermediate plateaus in a zero-temperature magnetization curve compared with the simplified model without this interaction term. The zero-field specific heat displays interesting thermal dependencies with a single- or double-peak structure. (paper)

  18. Monitoring of Freeze-Thaw Cycles in Concrete Using Embedded Sensors and Ultrasonic Imaging

    Science.gov (United States)

    Ranz, Javier; Aparicio, Sofía; Romero, Héctor; Casati, María Jesús; Molero, Miguel; González, Margarita

    2014-01-01

    This paper deals with the study of damage produced during freeze-thaw (F-T) cycles using two non-destructive measurement approaches—the first approach devoted to continuous monitoring using embedded sensors during the cycles, and the second one, performing ultrasonic imaging before and after the cycles. Both methodologies have been tested in two different types of concrete specimens, with and without air-entraining agents. Using the first measurement approach, the size and distribution of pores were estimated using a thermoporometrical model and continuous measurements of temperature and ultrasonic velocity along cycles. These estimates have been compared with the results obtained using mercury porosimetry testing. In the second approach, the damage due to F-T cycles has been evaluated by automated ultrasonic transmission and pulse-echo inspections made before and after the cycles. With these inspections the variations in the dimensions, velocity and attenuation caused by the accelerated F-T cycles were determined. PMID:24481231

  19. Programming Windows® Embedded CE 60 Developer Reference

    CERN Document Server

    Boling, Douglas

    2010-01-01

    Get the popular, practical reference to developing small footprint applications-now updated for the Windows Embedded CE 6.0 kernel. Written by an authority on embedded application development, this book focuses in on core operating concepts and the Win32 API. It delivers extensive code samples and sample projects-helping you build proficiency creating innovative Windows applications for a new generation of devices. Discover how to: Create complex applications designed for the unique requirements of embedded devicesManage virtual memory, heaps, and the stack to minimize your memory footprintC

  20. Embedded Visual System and its Applications on Robots

    CERN Document Server

    Xu, De

    2010-01-01

    Embedded vision systems such as smart cameras have been rapidly developed recently. Vision systems have become smaller and lighter, but their performance has improved. The algorithms in embedded vision systems have their specifications limited by frequency of CPU, memory size, and architecture. The goal of this e-book is to provide a an advanced reference work for engineers, researchers and scholars in the field of robotics, machine vision, and automation and to facilitate the exchange of their ideas, experiences and views on embedded vision system models. The effectiveness for all methods is