WorldWideScience

Sample records for strong cyclic adversarial

  1. Strongly increasing solutions of cyclic systems of second order differential equations with power-type nonlinearities

    Directory of Open Access Journals (Sweden)

    Jaroslav Jaroš

    2015-01-01

    Full Text Available We consider \\(n\\-dimensional cyclic systems of second order differential equations \\[(p_i(t|x_{i}'|^{\\alpha_i -1}x_{i}'' = q_{i}(t|x_{i+1}|^{\\beta_i-1}x_{i+1},\\] \\[\\quad i = 1,\\ldots,n, \\quad (x_{n+1} = x_1 \\tag{\\(\\ast\\}\\] under the assumption that the positive constants \\(\\alpha_i\\ and \\(\\beta_i\\ satisfy \\(\\alpha_1{\\ldots}\\alpha_n \\gt \\beta_1{\\ldots}\\beta_n\\ and \\(p_i(t\\ and \\(q_i(t\\ are regularly varying functions, and analyze positive strongly increasing solutions of system (\\(\\ast\\ in the framework of regular variation. We show that the situation for the existence of regularly varying solutions of positive indices for (\\(\\ast\\ can be characterized completely, and moreover that the asymptotic behavior of such solutions is governed by the unique formula describing their order of growth precisely. We give examples demonstrating that the main results for (\\(\\ast\\ can be applied to some classes of partial differential equations with radial symmetry to acquire accurate information about the existence and the asymptotic behavior of their radial positive strongly increasing solutions.

  2. Generative Adversarial Trainer: Defense to Adversarial Perturbations with GAN

    OpenAIRE

    Lee, Hyeungill; Han, Sungyeob; Lee, Jungwoo

    2017-01-01

    We propose a novel technique to make neural network robust to adversarial examples using a generative adversarial network. We alternately train both classifier and generator networks. The generator network generates an adversarial perturbation that can easily fool the classifier network by using a gradient of each image. Simultaneously, the classifier network is trained to classify correctly both original and adversarial images generated by the generator. These procedures help the classifier ...

  3. Mechanical characterization and force-displacement hysteretic curves from in-plane cyclic tests on strong masonry infills.

    Science.gov (United States)

    Morandi, Paolo; Hak, Sanja; Magenes, Guido

    2018-02-01

    This article contains information related to a recent study "Performance-based interpretation of in-plane cyclic tests on RC frames with strong masonry infills" (Morandi et al., 2017 [1]). Motivated by the necessity to improve the knowledge of the in-plane seismic response of rigid strong masonry infills, a wide experimental campaign based on in-plane cyclic tests on full-scale RC infilled frame specimens, supplemented with a complete characterization of the materials, has been conducted at the laboratory of the Department of Civil Engineering and Architecture of the University of Pavia. The masonry is constituted by vertically perforated 35 cm thick clay units with tongue and groove and dry head-joints and general-purpose mortar bed-joints. The paper reports the results of the mechanical characterization and of the force-displacement hysteretic curves from the in-plane cyclic tests.

  4. Mechanical characterization and force-displacement hysteretic curves from in-plane cyclic tests on strong masonry infills

    Directory of Open Access Journals (Sweden)

    Paolo Morandi

    2018-02-01

    Full Text Available This article contains information related to a recent study “Performance-based interpretation of in-plane cyclic tests on RC frames with strong masonry infills” (Morandi et al., 2017 [1]. Motivated by the necessity to improve the knowledge of the in-plane seismic response of rigid strong masonry infills, a wide experimental campaign based on in-plane cyclic tests on full-scale RC infilled frame specimens, supplemented with a complete characterization of the materials, has been conducted at the laboratory of the Department of Civil Engineering and Architecture of the University of Pavia. The masonry is constituted by vertically perforated 35 cm thick clay units with tongue and groove and dry head-joints and general-purpose mortar bed-joints. The paper reports the results of the mechanical characterization and of the force-displacement hysteretic curves from the in-plane cyclic tests.

  5. Adversarial risk analysis

    CERN Document Server

    Banks, David L; Rios Insua, David

    2015-01-01

    Flexible Models to Analyze Opponent Behavior A relatively new area of research, adversarial risk analysis (ARA) informs decision making when there are intelligent opponents and uncertain outcomes. Adversarial Risk Analysis develops methods for allocating defensive or offensive resources against intelligent adversaries. Many examples throughout illustrate the application of the ARA approach to a variety of games and strategic situations. The book shows decision makers how to build Bayesian models for the strategic calculation of their opponents, enabling decision makers to maximize their expected utility or minimize their expected loss. This new approach to risk analysis asserts that analysts should use Bayesian thinking to describe their beliefs about an opponent's goals, resources, optimism, and type of strategic calculation, such as minimax and level-k thinking. Within that framework, analysts then solve the problem from the perspective of the opponent while placing subjective probability distributions on a...

  6. <strong>CyNC: A method for real time analysis of systems with cyclic data flowsstrong>

    DEFF Research Database (Denmark)

    Jessen, Jan Jacob; Schiøler, Henrik; Nielsen, Jens Frederik Dalsgaard

    2006-01-01

    The paper addresses a novel method for performance analysis of distributed realtime systems with complex, and especially cyclic data flow graphs. The presented method is based on Network Calculus principles, where flow and service constraint functions are used to bound data flows and processing r...... on a relevant example. The method is implemented in a prototype tool also denoted CyNC providing a graphical user interface for model specification based on the MATLAB/SimuLink framework. Udgivelsesdato: DECEMBER...... constraints implicitely given by a fix point equation in a space of constraint functions. In this paper a method denoted CyNC for obtaining a well defined solution to that problem is presented along with a theoretical justification of the method as well as comparative results for CyNC and alternative methods...

  7. Strong combined gene-environment effects in anti-cyclic citrullinated peptide-positive rheumatoid arthritis

    DEFF Research Database (Denmark)

    Pedersen, Line Merete Blak; Jacobsen, Søren; Garred, Peter

    2007-01-01

    To study the role of shared epitope (SE) susceptibility genes, alone and in combination with tobacco smoking and other environmental risk factors, for risk of subtypes of rheumatoid arthritis (RA) defined by the presence or absence of serum antibodies against cyclic citrullinated peptides (CCPs)....

  8. Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference

    OpenAIRE

    Bao, Ruying; Liang, Sihang; Wang, Qingcan

    2018-01-01

    Deep neural networks have been demonstrated to be vulnerable to adversarial attacks, where small perturbations are intentionally added to the original inputs to fool the classifier. In this paper, we propose a defense method, Featurized Bidirectional Generative Adversarial Networks (FBGAN), to capture the semantic features of the input and filter the non-semantic perturbation. FBGAN is pre-trained on the clean dataset in an unsupervised manner, adversarially learning a bidirectional mapping b...

  9. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  10. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  11. Adversarial reasoning: challenges and approaches

    Science.gov (United States)

    Kott, Alexander; Ownby, Michael

    2005-05-01

    This paper defines adversarial reasoning as computational approaches to inferring and anticipating an enemy's perceptions, intents and actions. It argues that adversarial reasoning transcends the boundaries of game theory and must also leverage such disciplines as cognitive modeling, control theory, AI planning and others. To illustrate the challenges of applying adversarial reasoning to real-world problems, the paper explores the lessons learned in the CADET -- a battle planning system that focuses on brigade-level ground operations and involves adversarial reasoning. From this example of current capabilities, the paper proceeds to describe RAID -- a DARPA program that aims to build capabilities in adversarial reasoning, and how such capabilities would address practical requirements in Defense and other application areas.

  12. Generic adversary characteristics: summary report

    International Nuclear Information System (INIS)

    Stewart, J.B. Jr.; Davidson, J.J.; Jones, H.B.; Fulwiler, C.H.; Mullen, S.A.

    1978-07-01

    The adversaries studied were found to be complex, often unpredictable, and dynamic. The adversary typically goes through a complex decision-making process between the time a potential target is identified and the moment the decision to act is made. This study analyzes the adversary characteristics, and the following conclusions are made: one of the least likely methods of attack is an overt armed assault. Terrorists and psychotics depend upon a high degree of personal dedication. No single generic adversary group or individual exhibits strength in every characteristic. Physical danger appears to have some deterrent effect on all adversaries except the psychotics. Organized and professional criminals often try to recruit insiders. Disoriented persons, white-collar criminals, and disgruntled employees tend to operate as insiders. Professional criminals, many terrorist groups, some extremist protest groups, and certain disoriented persons plan carefully before initiating a criminal mission. Organized crime and miscellaneous criminal adversaries rely on deception and ruse to bypass security. After the decision to commit a crime, the resources deployed by terrorists or organized criminals will be a function of their perception of the operational requirements of the crime. The nature of ''threat'' is dynamic; adversary behavior and capability appear to be related to prevailing political, economic, and social conditions

  13. Adversary characterization for security system evaluation

    International Nuclear Information System (INIS)

    Suber, L.A. Jr.

    1976-04-01

    Evaluation of security systems effectiveness requires a definition of adversary capabilities, but an objective basis for such a definition has been lacking. A system of adversary attributes is proposed in which any desired adversary may be synthesized by selection of the appropriate level of capability from each attribute or category. In use, the synthesized adversaries will be pitted against a security system in an evaluation model, thus allowing comparison of other adversary or security system configurations

  14. Learning Adversary Modeling from Games

    National Research Council Canada - National Science Library

    Avellino, Paul

    2007-01-01

    .... In the computer age, highly accurate models and simulations of the enemy can be created. However, including the effects of motivations, capabilities, and weaknesses of adversaries in current wars is still extremely difficult...

  15. Gender Identity and Adversarial Sexual Beliefs as Predictors of Attitudes toward Sexual Harassment.

    Science.gov (United States)

    Murrell, Audrey J.; Dietz-Uhler, Beth L.

    1993-01-01

    Examines impact of gender identity and adversarial sexual beliefs as predictors of attitudes toward sexual harassment for 52 female and 55 male college students. Adversarial beliefs and experience with sexual harassment predict less tolerant attitudes toward harassment for males, whereas strong gender group identity and experience with harassment…

  16. Deep Learning and Music Adversaries

    DEFF Research Database (Denmark)

    Kereliuk, Corey Mose; Sturm, Bob L.; Larsen, Jan

    2015-01-01

    the minimal perturbation of the input image such that the system misclassifies it with high confidence. We adapt this approach to construct and deploy an adversary of deep learning systems applied to music content analysis. In our case, however, the system inputs are magnitude spectral frames, which require...

  17. Learning consensus in adversarial environments

    Science.gov (United States)

    Vamvoudakis, Kyriakos G.; García Carrillo, Luis R.; Hespanha, João. P.

    2013-05-01

    This work presents a game theory-based consensus problem for leaderless multi-agent systems in the presence of adversarial inputs that are introducing disturbance to the dynamics. Given the presence of enemy components and the possibility of malicious cyber attacks compromising the security of networked teams, a position agreement must be reached by the networked mobile team based on environmental changes. The problem is addressed under a distributed decision making framework that is robust to possible cyber attacks, which has an advantage over centralized decision making in the sense that a decision maker is not required to access information from all the other decision makers. The proposed framework derives three tuning laws for every agent; one associated with the cost, one associated with the controller, and one with the adversarial input.

  18. Flipped-Adversarial AutoEncoders

    OpenAIRE

    Zhang, Jiyi; Dang, Hung; Lee, Hwee Kuan; Chang, Ee-Chien

    2018-01-01

    We propose a flipped-Adversarial AutoEncoder (FAAE) that simultaneously trains a generative model G that maps an arbitrary latent code distribution to a data distribution and an encoder E that embodies an "inverse mapping" that encodes a data sample into a latent code vector. Unlike previous hybrid approaches that leverage adversarial training criterion in constructing autoencoders, FAAE minimizes re-encoding errors in the latent space and exploits adversarial criterion in the data space. Exp...

  19. Generative Adversarial Networks: An Overview

    Science.gov (United States)

    Creswell, Antonia; White, Tom; Dumoulin, Vincent; Arulkumaran, Kai; Sengupta, Biswa; Bharath, Anil A.

    2018-01-01

    Generative adversarial networks (GANs) provide a way to learn deep representations without extensively annotated training data. They achieve this through deriving backpropagation signals through a competitive process involving a pair of networks. The representations that can be learned by GANs may be used in a variety of applications, including image synthesis, semantic image editing, style transfer, image super-resolution and classification. The aim of this review paper is to provide an overview of GANs for the signal processing community, drawing on familiar analogies and concepts where possible. In addition to identifying different methods for training and constructing GANs, we also point to remaining challenges in their theory and application.

  20. Modeling intelligent adversaries for terrorism risk assessment: some necessary conditions for adversary models.

    Science.gov (United States)

    Guikema, Seth

    2012-07-01

    Intelligent adversary modeling has become increasingly important for risk analysis, and a number of different approaches have been proposed for incorporating intelligent adversaries in risk analysis models. However, these approaches are based on a range of often-implicit assumptions about the desirable properties of intelligent adversary models. This "Perspective" paper aims to further risk analysis for situations involving intelligent adversaries by fostering a discussion of the desirable properties for these models. A set of four basic necessary conditions for intelligent adversary models is proposed and discussed. These are: (1) behavioral accuracy to the degree possible, (2) computational tractability to support decision making, (3) explicit consideration of uncertainty, and (4) ability to gain confidence in the model. It is hoped that these suggested necessary conditions foster discussion about the goals and assumptions underlying intelligent adversary modeling in risk analysis. © 2011 Society for Risk Analysis.

  1. An analytic approach to cyber adversarial dynamics

    Science.gov (United States)

    Sweeney, Patrick; Cybenko, George

    2012-06-01

    To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.

  2. Scientific method, adversarial system, and technology assessment

    Science.gov (United States)

    Mayo, L. H.

    1975-01-01

    A basic framework is provided for the consideration of the purposes and techniques of scientific method and adversarial systems. Similarities and differences in these two techniques of inquiry are considered with reference to their relevance in the performance of assessments.

  3. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  4. Using Machine Learning in Adversarial Environments.

    Energy Technology Data Exchange (ETDEWEB)

    Davis, Warren Leon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-02-01

    Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approaches only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.

  5. David against Goliath: Coping with Adversarial Customers

    DEFF Research Database (Denmark)

    Alajoutsijärvi, Kimmo; Tikkanen, Henrikki; Skaates, Maria Anne

    2001-01-01

    future-oriented relationships with any of them. From the perspective of the SME, this kind of customer behaviour could even be described as harmful, since it often impedes the SME manager's long-term development of his or her business. This makes the balancing of adversarial customer relationships...... an aspect crucial to the long-term survival and success of the particular SME. In this article, we propose a three-fold approach through which SME managers could balance their relationships with this type of customer. Firstly, we review theoretical discussions about business relationships and adversariness......SME managers in many industries face the situation that they have to deal with a few important, large customer organisations that behave in an adversarial manner. These customers pit alternative suppliers against each other in order to achieve the lowest possible price, showing no intent to build...

  6. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  7. Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?

    Directory of Open Access Journals (Sweden)

    Tess M S Neal

    Full Text Available This survey of 206 forensic psychologists tested the "filtering" effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the "allegiance effect" in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process.

  8. Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?

    Science.gov (United States)

    2016-01-01

    This survey of 206 forensic psychologists tested the “filtering” effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the “allegiance effect” in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process. PMID:27124416

  9. Modeling documents with Generative Adversarial Networks

    OpenAIRE

    Glover, John

    2016-01-01

    This paper describes a method for using Generative Adversarial Networks to learn distributed representations of natural language documents. We propose a model that is based on the recently proposed Energy-Based GAN, but instead uses a Denoising Autoencoder as the discriminator network. Document representations are extracted from the hidden layer of the discriminator and evaluated both quantitatively and qualitatively.

  10. Modeling urbanization patterns with generative adversarial networks

    OpenAIRE

    Albert, Adrian; Strano, Emanuele; Kaur, Jasleen; Gonzalez, Marta

    2018-01-01

    In this study we propose a new method to simulate hyper-realistic urban patterns using Generative Adversarial Networks trained with a global urban land-use inventory. We generated a synthetic urban "universe" that qualitatively reproduces the complex spatial organization observed in global urban patterns, while being able to quantitatively recover certain key high-level urban spatial metrics.

  11. Resilient Distributed Estimation Through Adversary Detection

    Science.gov (United States)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2018-05-01

    This paper studies resilient multi-agent distributed estimation of an unknown vector parameter when a subset of the agents is adversarial. We present and analyze a Flag Raising Distributed Estimator ($\\mathcal{FRDE}$) that allows the agents under attack to perform accurate parameter estimation and detect the adversarial agents. The $\\mathcal{FRDE}$ algorithm is a consensus+innovations estimator in which agents combine estimates of neighboring agents (consensus) with local sensing information (innovations). We establish that, under $\\mathcal{FRDE}$, either the uncompromised agents' estimates are almost surely consistent or the uncompromised agents detect compromised agents if and only if the network of uncompromised agents is connected and globally observable. Numerical examples illustrate the performance of $\\mathcal{FRDE}$.

  12. Using plural modeling for predicting decisions made by adaptive adversaries

    International Nuclear Information System (INIS)

    Buede, Dennis M.; Mahoney, Suzanne; Ezell, Barry; Lathrop, John

    2012-01-01

    Incorporating an appropriate representation of the likelihood of terrorist decision outcomes into risk assessments associated with weapons of mass destruction attacks has been a significant problem for countries around the world. Developing these likelihoods gets at the heart of the most difficult predictive problems: human decision making, adaptive adversaries, and adversaries about which very little is known. A plural modeling approach is proposed that incorporates estimates of all critical uncertainties: who is the adversary and what skills and resources are available to him, what information is known to the adversary and what perceptions of the important facts are held by this group or individual, what does the adversary know about the countermeasure actions taken by the government in question, what are the adversary's objectives and the priorities of those objectives, what would trigger the adversary to start an attack and what kind of success does the adversary desire, how realistic is the adversary in estimating the success of an attack, how does the adversary make a decision and what type of model best predicts this decision-making process. A computational framework is defined to aggregate the predictions from a suite of models, based on this broad array of uncertainties. A validation approach is described that deals with a significant scarcity of data.

  13. Generative Adversarial Networks for Improving Face Classification

    OpenAIRE

    Natten, Jonas

    2017-01-01

    Master's thesis Information- and communication technology IKT590 - University of Agder 2017 Facial recognition can be applied in a wide variety of cases, including entertainment purposes and biometric security. In this thesis we take a look at improving the results of an existing facial recognition approach by utilizing generative adversarial networks to improve the existing dataset. The training data was taken from the LFW dataset[4] and was preprocessed using OpenCV[2] for...

  14. Deep learning, audio adversaries, and music content analysis

    DEFF Research Database (Denmark)

    Kereliuk, Corey Mose; Sturm, Bob L.; Larsen, Jan

    2015-01-01

    We present the concept of adversarial audio in the context of deep neural networks (DNNs) for music content analysis. An adversary is an algorithm that makes minor perturbations to an input that cause major repercussions to the system response. In particular, we design an adversary for a DNN...... that takes as input short-time spectral magnitudes of recorded music and outputs a high-level music descriptor. We demonstrate how this adversary can make the DNN behave in any way with only extremely minor changes to the music recording signal. We show that the adversary cannot be neutralised by a simple...... filtering of the input. Finally, we discuss adversaries in the broader context of the evaluation of music content analysis systems....

  15. Cascading Generative Adversarial Networks for Targeted

    KAUST Repository

    Hamdi, Abdullah

    2018-01-01

    Abundance of labelled data played a crucial role in the recent developments in computer vision, but that faces problems like scalability and transferability to the wild. One alternative approach is to utilize the data without labels, i.e. unsupervised learning, in learning valuable information and put it in use to tackle vision problems. Generative Adversarial Networks (GANs) have gained momentum for their ability to model image distributions in unsupervised manner. They learn to emulate the training set and that enables sampling from that domain and using the knowledge learned for useful applications. Several methods proposed enhancing GANs, including regularizing the loss with some feature matching. We seek to push GANs beyond the data in the training and try to explore unseen territory in the image manifold. We first propose a new regularizer for GAN based on K-Nearest Neighbor (K-NN) selective feature matching to a target set Y in high-level feature space, during the adversarial training of GAN on the base set X, and we call this novel model K-GAN. We show that minimizing the added term follows from cross-entropy minimization between the distributions of GAN and set Y. Then, we introduce a cascaded framework for GANs that try to address the task of imagining a new distribution that combines the base set X and target set Y by cascading sampling GANs with translation GANs, and we dub the cascade of such GANs as the Imaginative Adversarial Network (IAN). Several cascades are trained on a collected dataset Zoo-Faces and generated innovative samples are shown, including from K-GAN cascade. We conduct an objective and subjective evaluation for different IAN setups in the addressed task of generating innovative samples and we show the effect of regularizing GAN on different scores. We conclude with some useful applications for these IANs, like multi-domain manifold traversing.

  16. Cascading Generative Adversarial Networks for Targeted

    KAUST Repository

    Hamdi, Abdullah

    2018-04-09

    Abundance of labelled data played a crucial role in the recent developments in computer vision, but that faces problems like scalability and transferability to the wild. One alternative approach is to utilize the data without labels, i.e. unsupervised learning, in learning valuable information and put it in use to tackle vision problems. Generative Adversarial Networks (GANs) have gained momentum for their ability to model image distributions in unsupervised manner. They learn to emulate the training set and that enables sampling from that domain and using the knowledge learned for useful applications. Several methods proposed enhancing GANs, including regularizing the loss with some feature matching. We seek to push GANs beyond the data in the training and try to explore unseen territory in the image manifold. We first propose a new regularizer for GAN based on K-Nearest Neighbor (K-NN) selective feature matching to a target set Y in high-level feature space, during the adversarial training of GAN on the base set X, and we call this novel model K-GAN. We show that minimizing the added term follows from cross-entropy minimization between the distributions of GAN and set Y. Then, we introduce a cascaded framework for GANs that try to address the task of imagining a new distribution that combines the base set X and target set Y by cascading sampling GANs with translation GANs, and we dub the cascade of such GANs as the Imaginative Adversarial Network (IAN). Several cascades are trained on a collected dataset Zoo-Faces and generated innovative samples are shown, including from K-GAN cascade. We conduct an objective and subjective evaluation for different IAN setups in the addressed task of generating innovative samples and we show the effect of regularizing GAN on different scores. We conclude with some useful applications for these IANs, like multi-domain manifold traversing.

  17. Arguing with Adversaries: Aikido, Rhetoric, and the Art of Peace

    Science.gov (United States)

    Kroll, Barry M.

    2008-01-01

    The Japanese martial art of aikido affords a framework for understanding argument as harmonization rather than confrontation. Two movements, circling away ("tenkan") and entering in ("irimi"), suggest tactics for arguing with adversaries. The ethical imperative of aikido involves protecting one's adversary from harm, using the least force…

  18. Monte-Carlo approach to the generation of adversary paths

    International Nuclear Information System (INIS)

    1977-01-01

    This paper considers the definition of a threat as the sequence of events that might lead to adversary success. A nuclear facility is characterized as a weighted, labeled, directed graph, with critical adversary paths. A discrete-event, Monte-Carlo simulation model is used to estimate the probability of the critical paths. The model was tested for hypothetical facilities, with promising results

  19. Computational Modeling of Cultural Dimensions in Adversary Organizations

    Science.gov (United States)

    2010-01-01

    theatre of operations. 50 51 Chapter 5 Adversary Modeling Applications 5.1 Modeling Uncertainty in Adversary Behavior: Attacks in...Underestimate the Strength of Coalition Power 1 1 (= True) 1 1 1 -- Coalition Deploys Forces to Indonesia 1 1 2 1 2 -- Thai can Conduct Unilateral NEO 1 1

  20. Saliency detection by conditional generative adversarial network

    Science.gov (United States)

    Cai, Xiaoxu; Yu, Hui

    2018-04-01

    Detecting salient objects in images has been a fundamental problem in computer vision. In recent years, deep learning has shown its impressive performance in dealing with many kinds of vision tasks. In this paper, we propose a new method to detect salient objects by using Conditional Generative Adversarial Network (GAN). This type of network not only learns the mapping from RGB images to salient regions, but also learns a loss function for training the mapping. To the best of our knowledge, this is the first time that Conditional GAN has been used in salient object detection. We evaluate our saliency detection method on 2 large publicly available datasets with pixel accurate annotations. The experimental results have shown the significant and consistent improvements over the state-of-the-art method on a challenging dataset, and the testing speed is much faster.

  1. Adversarial training and dilated convolutions for brain MRI segmentation

    NARCIS (Netherlands)

    Moeskops, P.; Veta, M.; Lafarge, M.W.; Eppenhof, K.A.J.; Pluim, J.P.W.

    2017-01-01

    Convolutional neural networks (CNNs) have been applied to various automatic image segmentation tasks in medical image analysis, including brain MRI segmentation. Generative adversarial networks have recently gained popularity because of their power in generating images that are difficult to

  2. Feminized Power and Adversarial Advocacy: Levelling Arguments or Analyzing Them?

    Science.gov (United States)

    Condit, Celeste Michelle

    1989-01-01

    Examines the journalistic analysis of the 1988 Presidential Debates from a feminist perspective in order to identify the revisions needed in the debate process. Provides historical background of feminized power and adversarial advocacy. (MM)

  3. Modelling adversary actions against a nuclear material accounting system

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-01-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise a SSNM theft and the collusion requirements needed to accomplish this feat. Some technical highlights of the logic diagram are also discussed

  4. MTGAN: Speaker Verification through Multitasking Triplet Generative Adversarial Networks

    OpenAIRE

    Ding, Wenhao; He, Liang

    2018-01-01

    In this paper, we propose an enhanced triplet method that improves the encoding process of embeddings by jointly utilizing generative adversarial mechanism and multitasking optimization. We extend our triplet encoder with Generative Adversarial Networks (GANs) and softmax loss function. GAN is introduced for increasing the generality and diversity of samples, while softmax is for reinforcing features about speakers. For simplification, we term our method Multitasking Triplet Generative Advers...

  5. Adversarial life testing: A Bayesian negotiation model

    International Nuclear Information System (INIS)

    Rufo, M.J.; Martín, J.; Pérez, C.J.

    2014-01-01

    Life testing is a procedure intended for facilitating the process of making decisions in the context of industrial reliability. On the other hand, negotiation is a process of making joint decisions that has one of its main foundations in decision theory. A Bayesian sequential model of negotiation in the context of adversarial life testing is proposed. This model considers a general setting for which a manufacturer offers a product batch to a consumer. It is assumed that the reliability of the product is measured in terms of its lifetime. Furthermore, both the manufacturer and the consumer have to use their own information with respect to the quality of the product. Under these assumptions, two situations can be analyzed. For both of them, the main aim is to accept or reject the product batch based on the product reliability. This topic is related to a reliability demonstration problem. The procedure is applied to a class of distributions that belong to the exponential family. Thus, a unified framework addressing the main topics in the considered Bayesian model is presented. An illustrative example shows that the proposed technique can be easily applied in practice

  6. Generative adversarial networks for brain lesion detection

    Science.gov (United States)

    Alex, Varghese; Safwan, K. P. Mohammed; Chennamsetty, Sai Saketh; Krishnamurthi, Ganapathy

    2017-02-01

    Manual segmentation of brain lesions from Magnetic Resonance Images (MRI) is cumbersome and introduces errors due to inter-rater variability. This paper introduces a semi-supervised technique for detection of brain lesion from MRI using Generative Adversarial Networks (GANs). GANs comprises of a Generator network and a Discriminator network which are trained simultaneously with the objective of one bettering the other. The networks were trained using non lesion patches (n=13,000) from 4 different MR sequences. The network was trained on BraTS dataset and patches were extracted from regions excluding tumor region. The Generator network generates data by modeling the underlying probability distribution of the training data, (PData). The Discriminator learns the posterior probability P (Label Data) by classifying training data and generated data as "Real" or "Fake" respectively. The Generator upon learning the joint distribution, produces images/patches such that the performance of the Discriminator on them are random, i.e. P (Label Data = GeneratedData) = 0.5. During testing, the Discriminator assigns posterior probability values close to 0.5 for patches from non lesion regions, while patches centered on lesion arise from a different distribution (PLesion) and hence are assigned lower posterior probability value by the Discriminator. On the test set (n=14), the proposed technique achieves whole tumor dice score of 0.69, sensitivity of 91% and specificity of 59%. Additionally the generator network was capable of generating non lesion patches from various MR sequences.

  7. Quantum Capacity under Adversarial Quantum Noise: Arbitrarily Varying Quantum Channels

    Science.gov (United States)

    Ahlswede, Rudolf; Bjelaković, Igor; Boche, Holger; Nötzel, Janis

    2013-01-01

    We investigate entanglement transmission over an unknown channel in the presence of a third party (called the adversary), which is enabled to choose the channel from a given set of memoryless but non-stationary channels without informing the legitimate sender and receiver about the particular choice that he made. This channel model is called an arbitrarily varying quantum channel (AVQC). We derive a quantum version of Ahlswede's dichotomy for classical arbitrarily varying channels. This includes a regularized formula for the common randomness-assisted capacity for entanglement transmission of an AVQC. Quite surprisingly and in contrast to the classical analog of the problem involving the maximal and average error probability, we find that the capacity for entanglement transmission of an AVQC always equals its strong subspace transmission capacity. These results are accompanied by different notions of symmetrizability (zero-capacity conditions) as well as by conditions for an AVQC to have a capacity described by a single-letter formula. In the final part of the paper the capacity of the erasure-AVQC is computed and some light shed on the connection between AVQCs and zero-error capacities. Additionally, we show by entirely elementary and operational arguments motivated by the theory of AVQCs that the quantum, classical, and entanglement-assisted zero-error capacities of quantum channels are generically zero and are discontinuous at every positivity point.

  8. Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution

    Directory of Open Access Journals (Sweden)

    Simko Lucy

    2018-01-01

    Full Text Available Source code attribution classifiers have recently become powerful. We consider the possibility that an adversary could craft code with the intention of causing a misclassification, i.e., creating a forgery of another author’s programming style in order to hide the forger’s own identity or blame the other author. We find that it is possible for a non-expert adversary to defeat such a system. In order to inform the design of adversarially resistant source code attribution classifiers, we conduct two studies with C/C++ programmers to explore the potential tactics and capabilities both of such adversaries and, conversely, of human analysts doing source code authorship attribution. Through the quantitative and qualitative analysis of these studies, we (1 evaluate a state-of-the-art machine classifier against forgeries, (2 evaluate programmers as human analysts/forgery detectors, and (3 compile a set of modifications made to create forgeries. Based on our analyses, we then suggest features that future source code attribution systems might incorporate in order to be adversarially resistant.

  9. Decorrelated Jet Substructure Tagging using Adversarial Neural Networks

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    We describe a strategy for constructing a neural network jet substructure tagger which powerfully discriminates boosted decay signals while remaining largely uncorrelated with the jet mass. This reduces the impact of systematic uncertainties in background modeling while enhancing signal purity, resulting in improved discovery significance relative to existing taggers. The network is trained using an adversarial strategy, resulting in a tagger that learns to balance classification accuracy with decorrelation. As a benchmark scenario, we consider the case where large-radius jets originating from a boosted Z' decay are discriminated from a background of nonresonant quark and gluon jets. We show that in the presence of systematic uncertainties on the background rate, our adversarially-trained, decorrelated tagger considerably outperforms a conventionally trained neural network, despite having a slightly worse signal-background separation power. We generalize the adversarial training technique to include a paramet...

  10. An adversarial queueing model for online server routing

    NARCIS (Netherlands)

    Bonifaci, V.

    2007-01-01

    In an online server routing problem, a vehicle or server moves in a network in order to process incoming requests at the nodes. Online server routing problems have been thoroughly studied using competitive analysis. We propose a new model for online server routing, based on adversarial queueing

  11. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2010-01-01

    simulation in the presence of malicious, polynomial-time adversaries (assuming that ElGamal encryption is semantically secure) and exhibits computation and communication costs of O(n + m) in a constant round complexity. In addition to the above, we propose a collection of protocols for variations...

  12. Vulnerability of classifiers to evolutionary generated adversarial examples

    Czech Academy of Sciences Publication Activity Database

    Vidnerová, Petra; Neruda, Roman

    submitted 14.1. 2017 (2018) ISSN 0941-0643 R&D Projects: GA ČR GA15-18108S Institutional support: RVO:67985807 Keywords : supervised learning * neural networks * kernel methods * genetic algorithm s * adversarial examples Subject RIV: IN - Informatics, Computer Science Impact factor: 2.505, year: 2016

  13. Methodology for characterizing potential adversaries of Nuclear Material Safeguards Systems

    International Nuclear Information System (INIS)

    Kirkwood, C.W.; Pollock, S.M.

    1978-11-01

    The results are described of a study by Woodward--Clyde Consultants to assist the University of California Lawrence Livermore Laboratory in the development of methods to analyze and evaluate Nuclear Material Safeguards (NMS) Systems. The study concentrated on developing a methodology to assist experts in describing, in quantitative form, their judgments about the characteristics of potential adversaries of NMS Systems

  14. Comparing Generative Adversarial Network Techniques for Image Creation and Modification

    NARCIS (Netherlands)

    Pieters, Mathijs; Wiering, Marco

    2018-01-01

    Generative adversarial networks (GANs) have demonstrated to be successful at generating realistic real-world images. In this paper we compare various GAN techniques, both supervised and unsupervised. The effects on training stability of different objective functions are compared. We add an encoder

  15. Generative adversarial networks for anomaly detection in images

    OpenAIRE

    Batiste Ros, Guillem

    2018-01-01

    Anomaly detection is used to identify abnormal observations that don t follow a normal pattern. Inthis work, we use the power of Generative Adversarial Networks in sampling from image distributionsto perform anomaly detection with images and to identify local anomalous segments within thisimages. Also, we explore potential application of this method to support pathological analysis ofbiological tissues

  16. Methodology for characterizing potential adversaries of Nuclear Material Safeguards Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kirkwood, C.W.; Pollock, S.M.

    1978-11-01

    The results are described of a study by Woodward--Clyde Consultants to assist the University of California Lawrence Livermore Laboratory in the development of methods to analyze and evaluate Nuclear Material Safeguards (NMS) Systems. The study concentrated on developing a methodology to assist experts in describing, in quantitative form, their judgments about the characteristics of potential adversaries of NMS Systems.

  17. Adversarial risks in social experiments with new technologies

    NARCIS (Netherlands)

    Pieters, Wolter; Dechesne, Francien; van der Poel, Ibo; Asveld, Lotte; Mehos, Donna C.

    2017-01-01

    Studies that approach the deployment of new technologies as social experiments have mostly focused on unintentional effects, notably safety. We argue for the inclusion of adversarial risks or security aspects that are the result of intentional, strategic behavior of actors, who aim at using the

  18. Adversarial Reinforcement Learning in a Cyber Security Simulation}

    NARCIS (Netherlands)

    Elderman, Richard; Pater, Leon; Thie, Albert; Drugan, Madalina; Wiering, Marco

    2017-01-01

    This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplete information and stochastic elements. The resulting game is an adversarial sequential decision making problem played with two agents, the attacker and defender. The two agents pit one reinforcement

  19. Cyclic multiverses

    Science.gov (United States)

    Marosek, Konrad; Dąbrowski, Mariusz P.; Balcerzak, Adam

    2016-09-01

    Using the idea of regularization of singularities due to the variability of the fundamental constants in cosmology we study the cyclic universe models. We find two models of oscillating and non-singular mass density and pressure (`non-singular' bounce) regularized by varying gravitational constant G despite the scale factor evolution is oscillating and having sharp turning points (`singular' bounce). Both violating (big-bang) and non-violating (phantom) null energy condition models appear. Then, we extend this idea on to the multiverse containing cyclic individual universes with either growing or decreasing entropy though leaving the net entropy constant. In order to get an insight into the key idea, we consider the doubleverse with the same geometrical evolution of the two `parallel' universes with their physical evolution [physical coupling constants c(t) and G(t)] being different. An interesting point is that there is a possibility to exchange the universes at the point of maximum expansion - the fact which was already noticed in quantum cosmology. Similar scenario is also possible within the framework of Brans-Dicke theory where varying G(t) is replaced by the dynamical Brans-Dicke field φ(t) though these theories are slightly different.

  20. Application of Generative Adversarial Networks (GANs) to jet images

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    https://arxiv.org/abs/1701.05927 We provide a bridge between generative modeling in the Machine Learning community and simulated physical processes in High Energy Particle Physics by applying a novel Generative Adversarial Network (GAN) architecture to the production of jet images -- 2D representations of energy depositions from particles interacting with a calorimeter. We propose a simple architecture, the Location-Aware Generative Adversarial Network, that learns to produce realistic radiation patterns from simulated high energy particle collisions. The pixel intensities of GAN-generated images faithfully span over many orders of magnitude and exhibit the desired low-dimensional physical properties (i.e., jet mass, n-subjettiness, etc.). We shed light on limitations, and provide a novel empirical validation of image quality and validity of GAN-produced simulations of the natural world. This work provides a base for further explorations of GANs for use in faster simulation in High Energy Particle Physics.

  1. Coupled generative adversarial stacked Auto-encoder: CoGASA.

    Science.gov (United States)

    Kiasari, Mohammad Ahangar; Moirangthem, Dennis Singh; Lee, Minho

    2018-04-01

    Coupled Generative Adversarial Network (CoGAN) was recently introduced in order to model a joint distribution of a multi modal dataset. The CoGAN model lacks the capability to handle noisy data as well as it is computationally expensive and inefficient for practical applications such as cross-domain image transformation. In this paper, we propose a new method, named the Coupled Generative Adversarial Stacked Auto-encoder (CoGASA), to directly transfer data from one domain to another domain with robustness to noise in the input data as well to as reduce the computation time. We evaluate the proposed model using MNIST and the Large-scale CelebFaces Attributes (CelebA) datasets, and the results demonstrate a highly competitive performance. Our proposed models can easily transfer images into the target domain with minimal effort. Copyright © 2018 Elsevier Ltd. All rights reserved.

  2. Speech-Driven Facial Reenactment Using Conditional Generative Adversarial Networks

    OpenAIRE

    Jalalifar, Seyed Ali; Hasani, Hosein; Aghajan, Hamid

    2018-01-01

    We present a novel approach to generating photo-realistic images of a face with accurate lip sync, given an audio input. By using a recurrent neural network, we achieved mouth landmarks based on audio features. We exploited the power of conditional generative adversarial networks to produce highly-realistic face conditioned on a set of landmarks. These two networks together are capable of producing a sequence of natural faces in sync with an input audio track.

  3. Online Evolution for Multi-Action Adversarial Games

    OpenAIRE

    Justesen, Niels; Mahlmann, Tobias; Togelius, Julian

    2016-01-01

    We present Online Evolution, a novel method for playing turn-based multi-action adversarial games. Such games, which include most strategy games, have extremely high branching factors due to each turn having multiple actions. In Online Evolution, an evolutionary algorithm is used to evolve the combination of atomic actions that make up a single move, with a state evaluation function used for fitness. We implement Online Evolution for the turn-based multi-action game Hero Academy and compare i...

  4. Adversarial Reinforcement Learning in a Cyber Security Simulation}

    OpenAIRE

    Elderman, Richard; Pater, Leon; Thie, Albert; Drugan, Madalina; Wiering, Marco

    2017-01-01

    This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplete information and stochastic elements. The resulting game is an adversarial sequential decision making problem played with two agents, the attacker and defender. The two agents pit one reinforcement learning technique, like neural networks, Monte Carlo learning and Q-learning, against each other and examine their effectiveness against learning opponents. The results showed that Monte Carlo lear...

  5. A5: Automated Analysis of Adversarial Android Applications

    Science.gov (United States)

    2014-06-03

    A5: Automated Analysis of Adversarial Android Applications Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin...detecting, on the device itself, that an application is malicious is much more complex without elevated privileges . In other words, given the...interface via website. Blasing et al. [7] describe another dynamic analysis system for Android . Their system focuses on classifying input applications as

  6. Cooperative Control of Distributed Autonomous Vehicles in Adversarial Environments

    Science.gov (United States)

    2006-08-14

    COOPERATIVE CONTROL OF DISTRIBUTED AUTONOMOUS VEHICLES IN ADVERSARIAL ENVIRONMENTS Grant #F49620–01–1–0361 Final Report Jeff Shamma Department of...CONTRACT NUMBER F49620-01-1-0361 5b. GRANT NUMBER 4. TITLE AND SUBTITLE COOPERATIVE CONTROL OF DISTRIBUTED AUTONOMOUS VEHICLES IN...single dominant language or a distribution of languages. A relation to multivehicle systems is understanding how highly autonomous vehicles on extended

  7. Quantum capacity under adversarial quantum noise: arbitrarily varying quantum channels

    OpenAIRE

    Ahlswede, Rudolf; Bjelakovic, Igor; Boche, Holger; Noetzel, Janis

    2010-01-01

    We investigate entanglement transmission over an unknown channel in the presence of a third party (called the adversary), which is enabled to choose the channel from a given set of memoryless but non-stationary channels without informing the legitimate sender and receiver about the particular choice that he made. This channel model is called arbitrarily varying quantum channel (AVQC). We derive a quantum version of Ahlswede's dichotomy for classical arbitrarily varying channels. This includes...

  8. Cognitive-Emotional Conflict: Adversary Will and Social Resilience

    Science.gov (United States)

    2017-12-21

    effectively with skilled adversaries in the realm of social media . This admit- tedly is a complex problem for any open, democratic society that does not... social media of the targeted populations. Rather than inciting a population to take a particular action, as the leak of the Zimmerman telegram did in...produced by the 24/7 news cycle, amplified and accelerated by social media . National Level Most Americans do not recognize the threats posed by

  9. End-to-End Adversarial Retinal Image Synthesis.

    Science.gov (United States)

    Costa, Pedro; Galdran, Adrian; Meyer, Maria Ines; Niemeijer, Meindert; Abramoff, Michael; Mendonca, Ana Maria; Campilho, Aurelio

    2018-03-01

    In medical image analysis applications, the availability of the large amounts of annotated data is becoming increasingly critical. However, annotated medical data is often scarce and costly to obtain. In this paper, we address the problem of synthesizing retinal color images by applying recent techniques based on adversarial learning. In this setting, a generative model is trained to maximize a loss function provided by a second model attempting to classify its output into real or synthetic. In particular, we propose to implement an adversarial autoencoder for the task of retinal vessel network synthesis. We use the generated vessel trees as an intermediate stage for the generation of color retinal images, which is accomplished with a generative adversarial network. Both models require the optimization of almost everywhere differentiable loss functions, which allows us to train them jointly. The resulting model offers an end-to-end retinal image synthesis system capable of generating as many retinal images as the user requires, with their corresponding vessel networks, by sampling from a simple probability distribution that we impose to the associated latent space. We show that the learned latent space contains a well-defined semantic structure, implying that we can perform calculations in the space of retinal images, e.g., smoothly interpolating new data points between two retinal images. Visual and quantitative results demonstrate that the synthesized images are substantially different from those in the training set, while being also anatomically consistent and displaying a reasonable visual quality.

  10. Vulnerability assessment: Determining probabilities of neutralization of adversaries

    International Nuclear Information System (INIS)

    Graves, B.R.

    1987-01-01

    The Security Manager charged with the responsibility of designing Safeguards and Security Systems at Department of Energy facilities must take many factors into consideration. There must be a clear understanding, supported by documented guidance, of the level of threat to be addressed; the nature of the facility to be protected, and the funds available to design, implement, and maintain the Safeguards and Security System. Armed with these prerequisites, the Security Manager may then determine the characteristics of the Safeguards measures and security forces necessary to protect the facility. Security forces selection and training programs may then be established based on realistic facility needs. The next step is to attempt to determine the probability of security forces winning in a confrontation with adversaries. To determine the probability of success the Security Manager must consider the characteristics of the facility and surrounding area; the characteristics of the security forces and safeguards system at the facility; the response time and capabilities of the augmentation forces and the characteristics and capabilities of the adversary threat level to be addressed. Obviously, the Safeguards and Security Systems must initially address ''worst case'' scenarios consistent with stated guidelines. Validation of the assessment of the Safeguards and Security Systems must then be determined by simulation testing of the capabilities of the response forces against the capabilities of the adversary

  11. GANViz: A Visual Analytics Approach to Understand the Adversarial Game.

    Science.gov (United States)

    Wang, Junpeng; Gou, Liang; Yang, Hao; Shen, Han-Wei

    2018-06-01

    Generative models bear promising implications to learn data representations in an unsupervised fashion with deep learning. Generative Adversarial Nets (GAN) is one of the most popular frameworks in this arena. Despite the promising results from different types of GANs, in-depth understanding on the adversarial training process of the models remains a challenge to domain experts. The complexity and the potential long-time training process of the models make it hard to evaluate, interpret, and optimize them. In this work, guided by practical needs from domain experts, we design and develop a visual analytics system, GANViz, aiming to help experts understand the adversarial process of GANs in-depth. Specifically, GANViz evaluates the model performance of two subnetworks of GANs, provides evidence and interpretations of the models' performance, and empowers comparative analysis with the evidence. Through our case studies with two real-world datasets, we demonstrate that GANViz can provide useful insight into helping domain experts understand, interpret, evaluate, and potentially improve GAN models.

  12. Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-01-01

    Many classification algorithms have been successfully deployed in security-sensitive applications including spam filters and intrusion detection systems. Under such adversarial environments, adversaries can generate exploratory attacks against the defender such as evasion and reverse engineering. In this paper, we discuss why reverse engineering attacks can be carried out quite efficiently against fixed classifiers, and investigate the use of randomization as a suitable strategy for mitigating their risk. In particular, we derive a semidefinite programming (SDP) formulation for learning a distribution of classifiers subject to the constraint that any single classifier picked at random from such distribution provides reliable predictions with a high probability. We analyze the tradeoff between variance of the distribution and its predictive accuracy, and establish that one can almost always incorporate randomization with large variance without incurring a loss in accuracy. In other words, the conventional approach of using a fixed classifier in adversarial environments is generally Pareto suboptimal. Finally, we validate such conclusions on both synthetic and real-world classification problems. Copyright 2014 ACM.

  13. Towards Stable Adversarial Feature Learning for LiDAR based Loop Closure Detection

    OpenAIRE

    Xu, Lingyun; Yin, Peng; Luo, Haibo; Liu, Yunhui; Han, Jianda

    2017-01-01

    Stable feature extraction is the key for the Loop closure detection (LCD) task in the simultaneously localization and mapping (SLAM) framework. In our paper, the feature extraction is operated by using a generative adversarial networks (GANs) based unsupervised learning. GANs are powerful generative models, however, GANs based adversarial learning suffers from training instability. We find that the data-code joint distribution in the adversarial learning is a more complex manifold than in the...

  14. StackGAN++: Realistic Image Synthesis with Stacked Generative Adversarial Networks

    OpenAIRE

    Zhang, Han; Xu, Tao; Li, Hongsheng; Zhang, Shaoting; Wang, Xiaogang; Huang, Xiaolei; Metaxas, Dimitris

    2017-01-01

    Although Generative Adversarial Networks (GANs) have shown remarkable success in various tasks, they still face challenges in generating high quality images. In this paper, we propose Stacked Generative Adversarial Networks (StackGAN) aiming at generating high-resolution photo-realistic images. First, we propose a two-stage generative adversarial network architecture, StackGAN-v1, for text-to-image synthesis. The Stage-I GAN sketches the primitive shape and colors of the object based on given...

  15. Adversarial Advantage Actor-Critic Model for Task-Completion Dialogue Policy Learning

    OpenAIRE

    Peng, Baolin; Li, Xiujun; Gao, Jianfeng; Liu, Jingjing; Chen, Yun-Nung; Wong, Kam-Fai

    2017-01-01

    This paper presents a new method --- adversarial advantage actor-critic (Adversarial A2C), which significantly improves the efficiency of dialogue policy learning in task-completion dialogue systems. Inspired by generative adversarial networks (GAN), we train a discriminator to differentiate responses/actions generated by dialogue agents from responses/actions by experts. Then, we incorporate the discriminator as another critic into the advantage actor-critic (A2C) framework, to encourage the...

  16. Evaluating late detection capability against diverse insider adversaries

    International Nuclear Information System (INIS)

    Sicherman, A.

    1987-01-01

    This paper describes a model for evaluating the late (after-the-fact) detection capability of material control and accountability (MCandA) systems against insider theft or diversion of special nuclear material. Potential insider cover-up strategies to defeat activities providing detection (e.g., inventories) are addressed by the model in a tractable manner. For each potential adversary and detection activity, two probabilities are assessed and used to fit the model. The model then computes the probability of detection for activities occurring periodically over time. The model provides insight into MCandA effectiveness and helps identify areas for safeguards improvement. 4 refs., 4 tabs

  17. Probabilistic Characterization of Adversary Behavior in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  18. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    Energy Technology Data Exchange (ETDEWEB)

    Heineke, J.M.

    1978-12-20

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)

  19. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    International Nuclear Information System (INIS)

    Heineke, J.M.

    1978-01-01

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed

  20. Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

    Directory of Open Access Journals (Sweden)

    Yujia Liu

    2017-01-01

    Full Text Available Online image sharing in social platforms can lead to undesired privacy disclosure. For example, some enterprises may detect these large volumes of uploaded images to do users’ in-depth preference analysis for commercial purposes. And their technology might be today’s most powerful learning model, deep neural network (DNN. To just elude these automatic DNN detectors without affecting visual quality of human eyes, we design and implement a novel Stealth algorithm, which makes the automatic detector blind to the existence of objects in an image, by crafting a kind of adversarial examples. It is just like all objects disappear after wearing an “invisible cloak” from the view of the detector. Then we evaluate the effectiveness of Stealth algorithm through our newly defined measurement, named privacy insurance. The results indicate that our scheme has considerable success rate to guarantee privacy compared with other methods, such as mosaic, blur, and noise. Better still, Stealth algorithm has the smallest impact on image visual quality. Meanwhile, we set a user adjustable parameter called cloak thickness for regulating the perturbation intensity. Furthermore, we find that the processed images have transferability property; that is, the adversarial images generated for one particular DNN will influence the others as well.

  1. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2014-01-01

    for important variations of the secure pattern matching problem that are significantly more efficient than the current state of art solutions: First, we deal with secure pattern matching with wildcards. In this variant the pattern may contain wildcards that match both 0 and 1. Our protocol requires O......We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t∈{0,1}∗ of length n, while Bob has a pattern p∈{0,1}∗ of length m. The goal is for Bob to (only) learn where his pattern occurs in Alice’s text, while Alice learns nothing. Private pattern matching...... is an important problem that has many applications in the area of DNA search, computational biology and more. Our construction guarantees full simulation in the presence of malicious, polynomial-time adversaries (assuming the hardness of DDH assumption) and exhibits computation and communication costs of O...

  2. 'Meatball searching' - The adversarial approach to online information retrieval

    Science.gov (United States)

    Jack, R. F.

    1985-01-01

    It is proposed that the different styles of online searching can be described as either formal (highly precise) or informal with the needs of the client dictating which is most applicable at a particular moment. The background and personality of the searcher also come into play. Particular attention is focused on meatball searching which is a form of online searching characterized by deliberate vagueness. It requires generally comprehensive searches, often on unusual topics and with tight deadlines. It is most likely to occur in search centers serving many different disciplines and levels of client information sophistication. Various information needs are outlined as well as the laws of meatball searching and the adversarial approach. Traits and characteristics important to sucessful searching include: (1) concept analysis, (2) flexibility of thinking, (3) ability to think in synonyms and (4) anticipation of variant word forms and spellings.

  3. Identifying quantum phase transitions with adversarial neural networks

    Science.gov (United States)

    Huembeli, Patrick; Dauphin, Alexandre; Wittek, Peter

    2018-04-01

    The identification of phases of matter is a challenging task, especially in quantum mechanics, where the complexity of the ground state appears to grow exponentially with the size of the system. Traditionally, physicists have to identify the relevant order parameters for the classification of the different phases. We here follow a radically different approach: we address this problem with a state-of-the-art deep learning technique, adversarial domain adaptation. We derive the phase diagram of the whole parameter space starting from a fixed and known subspace using unsupervised learning. This method has the advantage that the input of the algorithm can be directly the ground state without any ad hoc feature engineering. Furthermore, the dimension of the parameter space is unrestricted. More specifically, the input data set contains both labeled and unlabeled data instances. The first kind is a system that admits an accurate analytical or numerical solution, and one can recover its phase diagram. The second type is the physical system with an unknown phase diagram. Adversarial domain adaptation uses both types of data to create invariant feature extracting layers in a deep learning architecture. Once these layers are trained, we can attach an unsupervised learner to the network to find phase transitions. We show the success of this technique by applying it on several paradigmatic models: the Ising model with different temperatures, the Bose-Hubbard model, and the Su-Schrieffer-Heeger model with disorder. The method finds unknown transitions successfully and predicts transition points in close agreement with standard methods. This study opens the door to the classification of physical systems where the phase boundaries are complex such as the many-body localization problem or the Bose glass phase.

  4. TRANSITION FROM ADVERSARIAL TO COOPERATIVE STRATEGIC INTERACTION; FINAL

    International Nuclear Information System (INIS)

    G.H. CANAVAN

    2001-01-01

    This note extends the game theoretic analysis of strategic conflicts begun in earlier Seminars on Planetary Emergencies to interactions with and without defenses between two or more adversaries with more realistic target structures. It reviews the essentials of game theory as applied to the analysis of strategic decisions, the application of first and second strike costs as payoffs, and solution optimization, which resolves several inconsistencies seen with earlier metrics. The stability of the current bilateral offensive configuration is shown to be high and insensitive to deep reductions in offensive forces, the deployment of limited defenses, and the exchange of significant offensive forces for defenses. The transition from adversarial to cooperative interaction is represented by the progressive reduction of the parameters representing each side's preference for damaging or deterring the other, which monotonically improves stability. Estimates of strike incentives in bilateral and trilateral configurations are reduced by the inclusion of high value targets in both sides' force allocations, which dominates the details of offensive and defensive forces. The shift to high value targets stabilizes trilateral offensive configurations, a result that differs with that from analyses based on military costs only. When defenses are included, they lead to a balance between a large defended side and small undefended side that resembles the balance between two large sides. Including the large side's preference for defense of high value targets in the analyses reduces its strike incentives and thus the small side's incentive to preempt. However, it also removes the large sides' ability to deter, so the stability of multi-polar configurations continues to be controlled by the least stable dyad, which places constraints on the size of defenses that can be deployed stably that could be more stringent than those from the bilateral balance

  5. When does familiarity promote versus undermine interpersonal attraction? A proposed integrative model from erstwhile adversaries

    NARCIS (Netherlands)

    Frost, J.H.; Finkel, E.J.; Norton, M.I.; Ariely, D.; Caprariello, P.A.; Eastwick, P.W.

    2015-01-01

    This article began as an adversarial collaboration between two groups of researchers with competing views on a longstanding question: Does familiarity promote or undermine interpersonal attraction? As we explored our respective positions, it became clear that the limitations of our

  6. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  7. Translating agency reform through durable rhetorical styles: comparing official agency talk across consensus and adversarial contexts

    NARCIS (Netherlands)

    Smullen, A.

    2010-01-01

    This article directs attention to the role of ideational variables in shaping public management reform initiatives. It considers the contribution of both endogenous rhetorical styles and exogenous international fashions in explaining official agency talk in consensus and adversarial contexts.

  8. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.

    Science.gov (United States)

    Rajivan, Prashanth; Gonzalez, Cleotilde

    2018-01-01

    Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in

  9. C-RNN-GAN: Continuous recurrent neural networks with adversarial training

    OpenAIRE

    Mogren, Olof

    2016-01-01

    Generative adversarial networks have been proposed as a way of efficiently training deep generative neural networks. We propose a generative adversarial model that works on continuous sequential data, and apply it by training it on a collection of classical music. We conclude that it generates music that sounds better and better as the model is trained, report statistics on generated music, and let the reader judge the quality by downloading the generated songs.

  10. Creating Turbulent Flow Realizations with Generative Adversarial Networks

    Science.gov (United States)

    King, Ryan; Graf, Peter; Chertkov, Michael

    2017-11-01

    Generating valid inflow conditions is a crucial, yet computationally expensive, step in unsteady turbulent flow simulations. We demonstrate a new technique for rapid generation of turbulent inflow realizations that leverages recent advances in machine learning for image generation using a deep convolutional generative adversarial network (DCGAN). The DCGAN is an unsupervised machine learning technique consisting of two competing neural networks that are trained against each other using backpropagation. One network, the generator, tries to produce samples from the true distribution of states, while the discriminator tries to distinguish between true and synthetic samples. We present results from a fully-trained DCGAN that is able to rapidly draw random samples from the full distribution of possible inflow states without needing to solve the Navier-Stokes equations, eliminating the costly process of spinning up inflow turbulence. This suggests a new paradigm in physics informed machine learning where the turbulence physics can be encoded in either the discriminator or generator. Finally, we also propose additional applications such as feature identification and subgrid scale modeling.

  11. Protecting Clock Synchronization: Adversary Detection through Network Monitoring

    Directory of Open Access Journals (Sweden)

    Elena Lisova

    2016-01-01

    Full Text Available Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to break synchronization based on the IEEE 1588 standard, by conducting a man-in-the-middle (MIM attack followed by a delay attack. A MIM attack can be accomplished through, for example, Address Resolution Protocol (ARP poisoning. Using the AVISPA tool, we evaluate the potential to perform a delay attack using ARP poisoning and analyze its consequences showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding, and using knowledge of environmental conditions, can make the network more robust/resilient against these kinds of attacks. Lastly, a Configuration Agent is proposed to monitor and detect anomalies introduced by an adversary performing attacks targeting clock synchronization.

  12. Ichthyoplankton Classification Tool using Generative Adversarial Networks and Transfer Learning

    KAUST Repository

    Aljaafari, Nura

    2018-04-15

    The study and the analysis of marine ecosystems is a significant part of the marine science research. These systems are valuable resources for fisheries, improving water quality and can even be used in drugs production. The investigation of ichthyoplankton inhabiting these ecosystems is also an important research field. Ichthyoplankton are fish in their early stages of life. In this stage, the fish have relatively similar shape and are small in size. The currently used way of identifying them is not optimal. Marine scientists typically study such organisms by sending a team that collects samples from the sea which is then taken to the lab for further investigation. These samples need to be studied by an expert and usually end needing a DNA sequencing. This method is time-consuming and requires a high level of experience. The recent advances in AI have helped to solve and automate several difficult tasks which motivated us to develop a classification tool for ichthyoplankton. We show that using machine learning techniques, such as generative adversarial networks combined with transfer learning solves such a problem with high accuracy. We show that using traditional machine learning algorithms fails to solve it. We also give a general framework for creating a classification tool when the dataset used for training is a limited dataset. We aim to build a user-friendly tool that can be used by any user for the classification task and we aim to give a guide to the researchers so that they can follow in creating a classification tool.

  13. Generative Adversarial Networks for Noise Reduction in Low-Dose CT.

    Science.gov (United States)

    Wolterink, Jelmer M; Leiner, Tim; Viergever, Max A; Isgum, Ivana

    2017-12-01

    Noise is inherent to low-dose CT acquisition. We propose to train a convolutional neural network (CNN) jointly with an adversarial CNN to estimate routine-dose CT images from low-dose CT images and hence reduce noise. A generator CNN was trained to transform low-dose CT images into routine-dose CT images using voxelwise loss minimization. An adversarial discriminator CNN was simultaneously trained to distinguish the output of the generator from routine-dose CT images. The performance of this discriminator was used as an adversarial loss for the generator. Experiments were performed using CT images of an anthropomorphic phantom containing calcium inserts, as well as patient non-contrast-enhanced cardiac CT images. The phantom and patients were scanned at 20% and 100% routine clinical dose. Three training strategies were compared: the first used only voxelwise loss, the second combined voxelwise loss and adversarial loss, and the third used only adversarial loss. The results showed that training with only voxelwise loss resulted in the highest peak signal-to-noise ratio with respect to reference routine-dose images. However, CNNs trained with adversarial loss captured image statistics of routine-dose images better. Noise reduction improved quantification of low-density calcified inserts in phantom CT images and allowed coronary calcium scoring in low-dose patient CT images with high noise levels. Testing took less than 10 s per CT volume. CNN-based low-dose CT noise reduction in the image domain is feasible. Training with an adversarial network improves the CNNs ability to generate images with an appearance similar to that of reference routine-dose CT images.

  14. Adversarial reasoning and resource allocation: the LG approach

    Science.gov (United States)

    Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg; Boyd, Ron

    2005-05-01

    Many existing automated tools purporting to model the intelligent enemy utilize a fixed battle plan for the enemy while using flexible decisions of human players for the friendly side. According to the Naval Studies Board, "It is an open secret and a point of distress ... that too much of the substantive content of such M&S has its origin in anecdote, ..., or a narrow construction tied to stereotypical current practices of 'doctrinally correct behavior.'" Clearly, such runs lack objectivity by being heavily skewed in favor of the friendly forces. Presently, the military branches employ a variety of game-based simulators and synthetic environments, with manual (i.e., user-based) decision-making, for training and other purposes. However, without an ability to automatically generate the best strategies, tactics, and COA, the games serve mostly to display the current situation rather than form a basis for automated decision-making and effective training. We solve the problem of adversarial reasoning as a gaming problem employing Linguistic Geometry (LG), a new type of game theory demonstrating significant increase in size in gaming problems solvable in real and near-real time. It appears to be a viable approach for solving such practical problems as mission planning and battle management. Essentially, LG may be structured into two layers: game construction and game solving. Game construction includes construction of a game called an LG hypergame based on a hierarchy of Abstract Board Games (ABG). Game solving includes resource allocation for constructing an advantageous initial game state and strategy generation to reach a desirable final game state in the course of the game.

  15. VIGAN: Missing View Imputation with Generative Adversarial Networks.

    Science.gov (United States)

    Shang, Chao; Palmer, Aaron; Sun, Jiangwen; Chen, Ko-Shin; Lu, Jin; Bi, Jinbo

    2017-01-01

    In an era when big data are becoming the norm, there is less concern with the quantity but more with the quality and completeness of the data. In many disciplines, data are collected from heterogeneous sources, resulting in multi-view or multi-modal datasets. The missing data problem has been challenging to address in multi-view data analysis. Especially, when certain samples miss an entire view of data, it creates the missing view problem. Classic multiple imputations or matrix completion methods are hardly effective here when no information can be based on in the specific view to impute data for such samples. The commonly-used simple method of removing samples with a missing view can dramatically reduce sample size, thus diminishing the statistical power of a subsequent analysis. In this paper, we propose a novel approach for view imputation via generative adversarial networks (GANs), which we name by VIGAN. This approach first treats each view as a separate domain and identifies domain-to-domain mappings via a GAN using randomly-sampled data from each view, and then employs a multi-modal denoising autoencoder (DAE) to reconstruct the missing view from the GAN outputs based on paired data across the views. Then, by optimizing the GAN and DAE jointly, our model enables the knowledge integration for domain mappings and view correspondences to effectively recover the missing view. Empirical results on benchmark datasets validate the VIGAN approach by comparing against the state of the art. The evaluation of VIGAN in a genetic study of substance use disorders further proves the effectiveness and usability of this approach in life science.

  16. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems

    Directory of Open Access Journals (Sweden)

    Xiaofei He

    2018-02-01

    Full Text Available Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT (smart cities, smart grid, smart transportation, etc. and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy, our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against

  17. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems †

    Science.gov (United States)

    Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu

    2018-01-01

    Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries

  18. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.

    Science.gov (United States)

    He, Xiaofei; Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu

    2018-02-24

    Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries

  19. Consensus of discrete-time multi-agent systems with adversaries and time delays

    Science.gov (United States)

    Wu, Yiming; He, Xiongxiong; Liu, Shuai; Xie, Lihua

    2014-05-01

    This paper studies the resilient asymptotic consensus problem for discrete-time multi-agent systems in the presence of adversaries and transmission delays. The network is assumed to have ? loyal agents and ? adversarial agents, and each loyal agent in the network has no knowledge of the network topology other than an upper bound on the number of adversarial agents in its neighborhood. For the considered networked system, only locally delayed information is available for each loyal agent, and also the information flow is directed and a control protocol using only local information is designed to guarantee the realization of consensus with respect to communication graph, which satisfies a featured network robustness. Numerical examples are finally given to demonstrate the effectiveness of theoretical results.

  20. Cyclic nucleotides and radioresistnace

    International Nuclear Information System (INIS)

    Kulinskij, V.I.; Mikheeva, G.A.; Zel'manovich, B.M.

    1982-01-01

    The addition of glucose to meat-peptone broth does not change the radiosensitizing effect (RSE) of cAMP at the logarithmic phase (LP) and the radioprotective effect (RPE) at the stationary phase (SP), but sensitization, characteristic of cGMP, disappears in SP and turns into RPE in LP. Introduction of glucose into the broth for 20 min eliminates all the effects of both cyclic nucleotides in the cya + strain while cya - mutant exhibits RSE. RSE of both cyclic nucleotides is only manifested on minimal media. These data brought confirmation of the dependence of the influence of cyclic media. These data brought confirmation of the dependence of the influence of cyclic nucleotides on radioresistance upon the metabolic status of the cell [ru

  1. The adversarial system and the best interests of the child in divorce ...

    African Journals Online (AJOL)

    In this contribution it is argued that the adversarial system of litigation does not serve the best interests of children upon divorce. After a brief analysis of the system it is concluded that other less aggressive means of litigation should be considered underupon divorce. Collaborative Law is suggested as a means to bear in ...

  2. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    Science.gov (United States)

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  3. Synthetic aperture radar ship discrimination, generation and latent variable extraction using information maximizing generative adversarial networks

    CSIR Research Space (South Africa)

    Schwegmann, Colin P

    2017-07-01

    Full Text Available such as Synthetic Aperture Radar imagery. To aid in the creation of improved machine learning-based ship detection and discrimination methods this paper applies a type of neural network known as an Information Maximizing Generative Adversarial Network. Generative...

  4. GalaxyGAN: Generative Adversarial Networks for recovery of galaxy features

    Science.gov (United States)

    Schawinski, Kevin; Zhang, Ce; Zhang, Hantian; Fowler, Lucas; Krishnan Santhanam, Gokula

    2017-02-01

    GalaxyGAN uses Generative Adversarial Networks to reliably recover features in images of galaxies. The package uses machine learning to train on higher quality data and learns to recover detailed features such as galaxy morphology by effectively building priors. This method opens up the possibility of recovering more information from existing and future imaging data.

  5. Generalized Wideband Cyclic MUSIC

    Directory of Open Access Journals (Sweden)

    Zhang-Meng Liu

    2009-01-01

    Full Text Available The method of Spectral Correlation-Signal Subspace Fitting (SC-SSF fails to separate wideband cyclostationary signals with coherent second-order cyclic statistics (SOCS. Averaged Cyclic MUSIC (ACM method made up for the drawback to some degree via temporally averaging the cyclic cross-correlation of the array output. This paper interprets ACM from another perspective and proposes a new DOA estimation method by generalizing ACM for wideband cyclostationary signals. The proposed method successfully makes up for the aforementioned drawback of SC-SSF and obtains a more satisfying performance than ACM. It is also demonstrated that ACM is a simplified form of the proposed method when only a single spectral frequency is exploited, and the integration of the frequencies within the signal bandwidth helps the new method to outperform ACM.

  6. The arabidopsis cyclic nucleotide interactome

    KAUST Repository

    Donaldson, Lara Elizabeth; Meier, Stuart Kurt; Gehring, Christoph A

    2016-01-01

    Cyclic nucleotides have been shown to play important signaling roles in many physiological processes in plants including photosynthesis and defence. Despite this, little is known about cyclic nucleotide-dependent signaling mechanisms

  7. Cyclic Voltammograms from First Principles

    DEFF Research Database (Denmark)

    Karlberg, Gustav; Jaramillo, Thomas; Skulason, Egill

    2007-01-01

    Cyclic voltammetry is a fundamental experimental tool for characterizing electrochemical surfaces. Whereas cyclic voltammetry is widely used within the field of electrochemistry, a way to quantitatively and directly relate the cyclic voltammogram to ab initio calculations has been lacking, even f...

  8. HOST liner cyclic facilities

    Science.gov (United States)

    Schultz, D.

    1983-01-01

    The HOST Liner Cyclic Program is utilizing two types of test apparatus, rectangular box rigs and a full annular rig. To date two quartz lamp cyclic box rigs have been tested and a third is to begin testing in late October 1983. The box rigs are used to evaluate 5x8 inch rectangular linear samples. A 21 inch diameter outer liner simulator is also being built up for testing beginning in April 1984. All rigs are atmospheric rigs. The first box rig, a three 6-kVA lamp installation, was operated under adverse conditions to determine feasibility of using quartz lamps for cyclic testing. This work was done in December 1981 and looked promising. The second box rig, again using three 6-kVA lamps, was operated to obtain instrumentation durability information and initial data input to a Finite Element Model. This limited test program was conducted in August 1983. Five test plates were run. Instrumentation consisted of strain gages, thermocouples and thermal paint. The strain gages were found to fail at 1200 F as expected though plates were heated to 1700 F. The third box rig, containing four 6-kVA lamps, is in build up for testing to begin in late October 1983. In addition to 33 percent greater power input, this rig has provision for 400 F backside line cooling air and a viewing port suitable for IR camera viewing. The casing is also water cooled for extended durability.

  9. Adversarial risk analysis with incomplete information: a level-k approach.

    Science.gov (United States)

    Rothschild, Casey; McLay, Laura; Guikema, Seth

    2012-07-01

    This article proposes, develops, and illustrates the application of level-k game theory to adversarial risk analysis. Level-k reasoning, which assumes that players play strategically but have bounded rationality, is useful for operationalizing a Bayesian approach to adversarial risk analysis. It can be applied in a broad class of settings, including settings with asynchronous play and partial but incomplete revelation of early moves. Its computational and elicitation requirements are modest. We illustrate the approach with an application to a simple defend-attack model in which the defender's countermeasures are revealed with a probability less than one to the attacker before he decides on how or whether to attack. © 2011 Society for Risk Analysis.

  10. Bring a gun to a gunfight: armed adversaries and violence across nations.

    Science.gov (United States)

    Felson, Richard B; Berg, Mark T; Rogers, Meghan L

    2014-09-01

    We use homicide data and the International Crime Victimization Survey to examine the role of firearms in explaining cross-national variation in violence. We suggest that while gun violence begets gun violence, it inhibits the tendency to engage in violence without guns. We attribute the patterns to adversary effects-i.e., the tendency of offenders to take into account the threat posed by their adversaries. Multi-level analyses of victimization data support the hypothesis that living in countries with high rates of gun violence lowers an individual's risk of an unarmed assault and assaults with less lethal weapons. Analyses of aggregate data show that homicide rates and gun violence rates load on a separate underlying factor than other types of violence. The results suggest that a country's homicide rate reflects, to a large extent, the tendency of its offenders to use firearms. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. With God on our side: Religious primes reduce the envisioned physical formidability of a menacing adversary.

    Science.gov (United States)

    Holbrook, Colin; Fessler, Daniel M T; Pollack, Jeremy

    2016-01-01

    The imagined support of benevolent supernatural agents attenuates anxiety and risk perception. Here, we extend these findings to judgments of the threat posed by a potentially violent adversary. Conceptual representations of bodily size and strength summarize factors that determine the relative threat posed by foes. The proximity of allies moderates the envisioned physical formidability of adversaries, suggesting that cues of access to supernatural allies will reduce the envisioned physical formidability of a threatening target. Across two studies, subtle cues of both supernatural and earthly social support reduced the envisioned physical formidability of a violent criminal. These manipulations had no effect on the perceived likelihood of encountering non-conflictual physical danger, raising the possibility that imagined supernatural support leads participants to view themselves not as shielded from encountering perilous situations, but as protected should perils arise. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. Material control study: a directed graph and fault tree procedure for adversary event set generation

    International Nuclear Information System (INIS)

    Lambert, H.E.; Lim, J.J.; Gilman, F.M.

    1978-01-01

    In work for the United States Nuclear Regulatory Commission, Lawrence Livermore Laboratory is developing an assessment procedure to evaluate the effectiveness of a potential nuclear facility licensee's material control (MC) system. The purpose of an MC system is to prevent the theft of special nuclear material such as plutonium and highly enriched uranium. The key in the assessment procedure is the generation and analysis of the adversary event sets by a directed graph and fault-tree methodology

  13. Jointly Optimize Data Augmentation and Network Training: Adversarial Data Augmentation in Human Pose Estimation

    OpenAIRE

    Peng, Xi; Tang, Zhiqiang; Yang, Fei; Feris, Rogerio; Metaxas, Dimitris

    2018-01-01

    Random data augmentation is a critical technique to avoid overfitting in training deep neural network models. However, data augmentation and network training are usually treated as two isolated processes, limiting the effectiveness of network training. Why not jointly optimize the two? We propose adversarial data augmentation to address this limitation. The main idea is to design an augmentation network (generator) that competes against a target network (discriminator) by generating `hard' au...

  14. Code-Based Cryptography: New Security Solutions Against a Quantum Adversary

    OpenAIRE

    Sendrier , Nicolas; Tillich , Jean-Pierre

    2016-01-01

    International audience; Cryptography is one of the key tools for providing security in our quickly evolving technological society. An adversary with the ability to use a quantum computer would defeat most of the cryptographic solutions that are deployed today to secure our communications. We do not know when quantum computing will become available, but nevertheless, the cryptographic research community must get ready for it now. Code-based cryptography is among the few cryptographic technique...

  15. Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

    OpenAIRE

    Sethi, Tegjyot Singh; Kantardzic, Mehmed

    2017-01-01

    While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and sophistication of attacks, has prompted the need for a data driven solution, with machine learning forming the core of many cybersecurity systems. Machine learning was not designed with security in mind, and the essential assumption of stationarity, requiri...

  16. Anti-Makeup: Learning A Bi-Level Adversarial Network for Makeup-Invariant Face Verification

    OpenAIRE

    Li, Yi; Song, Lingxiao; Wu, Xiang; He, Ran; Tan, Tieniu

    2017-01-01

    Makeup is widely used to improve facial attractiveness and is well accepted by the public. However, different makeup styles will result in significant facial appearance changes. It remains a challenging problem to match makeup and non-makeup face images. This paper proposes a learning from generation approach for makeup-invariant face verification by introducing a bi-level adversarial network (BLAN). To alleviate the negative effects from makeup, we first generate non-makeup images from makeu...

  17. An improved parametrization and analysis of the EXP3++ algorithm for stochastic and adversarial bandits

    DEFF Research Database (Denmark)

    Seldin, Yevgeny; Lugosi, Gábor

    We present a new strategy for gap estimation in randomized algorithms for multiarmed bandits and combine it with the EXP3++ algorithm of Seldin and Slivkins (2014). In the stochastic regime the strategy reduces dependence of regret on a time horizon from $(ln t)^3$ to $(ln t)^2$ and eliminates an...... an additive factor of order $\\Delta e^{\\Delta^2}$, where $\\Delta$ is the minimal gap of a problem instance. In the adversarial regime regret guarantee remains unchanged....

  18. An improved parametrization and analysis of the EXP3++ algorithm for stochastic and adversarial bandits

    DEFF Research Database (Denmark)

    Seldin, Yevgeny; Lugosi, Gábor

    2017-01-01

    We present a new strategy for gap estimation in randomized algorithms for multiarmed bandits and combine it with the EXP3++ algorithm of Seldin and Slivkins (2014). In the stochastic regime the strategy reduces dependence of regret on a time horizon from $(ln t)^3$ to $(ln t)^2$ and eliminates...... an additive factor of order $\\Delta e^{\\Delta^2}$, where $\\Delta$ is the minimal gap of a problem instance. In the adversarial regime regret guarantee remains unchanged....

  19. Playing Multi-Action Adversarial Games: Online Evolutionary Planning versus Tree Search

    OpenAIRE

    Justesen, Niels; Mahlmann, Tobias; Risi, Sebastian; Togelius, Julian

    2017-01-01

    We address the problem of playing turn-based multi-action adversarial games, which include many strategy games with extremely high branching factors as players take multiple actions each turn. This leads to the breakdown of standard tree search methods, including Monte Carlo Tree Search (MCTS), as they become unable to reach a sufficient depth in the game tree. In this paper, we introduce Online Evolutionary Planning (OEP) to address this challenge, which searches for combinations of actions ...

  20. A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity

    OpenAIRE

    Vieira, Aitor Couce; Houmb, Siv Hilde; Insua, David Rios

    2014-01-01

    Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges. We also provide an example of the model in the context of an offshore drilling rig. The proposed model provides a more formal and comprehensive analysis of risks, still using the standard business language based on decisions, risks, and value.

  1. A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity

    Directory of Open Access Journals (Sweden)

    Aitor Couce Vieira

    2014-04-01

    Full Text Available Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges. We also provide an example of the model in the context of an offshore drilling rig. The proposed model provides a more formal and comprehensive analysis of risks, still using the standard business language based on decisions, risks, and value.

  2. Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments

    OpenAIRE

    Kott, Alexander

    2018-01-01

    Numerous, artificially intelligent, networked things will populate the battlefield of the future, operating in close collaboration with human warfighters, and fighting as teams in highly adversarial environments. This paper explores the characteristics, capabilities and intelligence required of such a network of intelligent things and humans - Internet of Battle Things (IOBT). It will experience unique challenges that are not yet well addressed by the current generation of AI and machine lear...

  3. Occluded object reconstruction for first responders with augmented reality glasses using conditional generative adversarial networks

    OpenAIRE

    Yun, Kyongsik; Lu, Thomas; Chow, Edward

    2018-01-01

    Firefighters suffer a variety of life-threatening risks, including line-of-duty deaths, injuries, and exposures to hazardous substances. Support for reducing these risks is important. We built a partially occluded object reconstruction method on augmented reality glasses for first responders. We used a deep learning based on conditional generative adversarial networks to train associations between the various images of flammable and hazardous objects and their partially occluded counterparts....

  4. SEAPATH: A microcomputer code for evaluating physical security effectiveness using adversary sequence diagrams

    International Nuclear Information System (INIS)

    Darby, J.L.

    1986-01-01

    The Adversary Sequence Diagram (ASD) concept was developed by Sandia National Laboratories (SNL) to examine physical security system effectiveness. Sandia also developed a mainframe computer code, PANL, to analyze the ASD. The authors have developed a microcomputer code, SEAPATH, which also analyzes ASD's. The Authors are supporting SNL in software development of the SAVI code; SAVI utilizes the SEAPATH algorithm to identify and quantify paths

  5. Deep Convolutional Generative Adversarial Network for Procedural 3D Landscape Generation Based on DEM

    OpenAIRE

    Wulff-Jensen, Andreas; Rant, Niclas Nerup; Møller, Tobias Nordvig; Billeskov, Jonas Aksel

    2018-01-01

    This paper proposes a novel framework for improving procedural generation of 3D landscapes using machine learning. We utilized a Deep Convolutional Generative Adversarial Network (DC-GAN) to generate heightmaps. The network was trained on a dataset consisting of Digital Elevation Maps (DEM) of the alps. During map generation, the batch size and learning rate were optimized for the most efficient and satisfying map production. The diversity of the final output was tested against Perlin noise u...

  6. Cognitive Targeting: A Coercive Air Power Theory for Conventional Escalation Control Against Nuclear Armed Adversaries

    Science.gov (United States)

    2016-06-01

    strategic,” in the cognitive targeting paradigm , are those that directly disable - in the strategic audience’s mind – the attractiveness or...This study analyses the applicability of three operational targeting paradigms to coerce a nuclear-armed adversary in a regional crisis, while...principles and elements of war and understand the coercive ability of utility targeting (a capabilities-based targeting paradigm , CBTP), axiological

  7. Show, Adapt and Tell: Adversarial Training of Cross-domain Image Captioner

    OpenAIRE

    Chen, Tseng-Hung; Liao, Yuan-Hong; Chuang, Ching-Yao; Hsu, Wan-Ting; Fu, Jianlong; Sun, Min

    2017-01-01

    Impressive image captioning results are achieved in domains with plenty of training image and sentence pairs (e.g., MSCOCO). However, transferring to a target domain with significant domain shifts but no paired training data (referred to as cross-domain image captioning) remains largely unexplored. We propose a novel adversarial training procedure to leverage unpaired data in the target domain. Two critic networks are introduced to guide the captioner, namely domain critic and multi-modal cri...

  8. Cooperation and punishment in an adversarial game: How defectors pave the way to a peaceful society

    Science.gov (United States)

    Short, M. B.; Brantingham, P. J.; D'Orsogna, M. R.

    2010-12-01

    The evolution of human cooperation has been the subject of much research, especially within the framework of evolutionary public goods games, where several mechanisms have been proposed to account for persistent cooperation. Yet, in addressing this issue, little attention has been given to games of a more adversarial nature, in which defecting players, rather than simply free riding, actively seek to harm others. Here, we develop an adversarial evolutionary game using the specific example of criminal activity, recasting the familiar public goods strategies of punishers, cooperators, and defectors in this light. We then introduce a strategy—the informant—with no clear analog in public goods games and show that individuals employing this strategy are a key to the emergence of systems where cooperation dominates. We also find that a defection-dominated regime may be transitioned to one that is cooperation-dominated by converting an optimal number of players into informants. We discuss these findings, the role of informants, and possible intervention strategies in extreme adversarial societies, such as those marred by wars and insurgencies.

  9. Cyclic deformation of zircaloy-4 at room temperature

    International Nuclear Information System (INIS)

    Armas, A. F; Herenu, S; Bolmaro, R; Alvarez-Armas, I

    2003-01-01

    Annealed materials hardens under low cyclic fatigue tests.However, FCC metals tested with medium strain amplitudes show an initial cyclic softening.That behaviour is related with the strong interstitial atom-dislocation interactions.For HCP materials the information is scarce.Commercial purity Zirconium and Zircaloy-4 alloys show also a pronounced cyclic softening, similar to Titanium alloys.Recently the rotation texture induced softening model has been proposed according to which the crystals are placed in a more favourable deformation orientation by prismatic slip due to the cyclic strain.The purpose of the current paper is the presentation of decisive results to discuss the causes for cyclic softening of Zircaloy-4. Low cycle fatigue tests were performed on recrystallized Zircaloy-4 samples.The cyclic behaviour shows an exponential softening at room temperature independently of the deformation range.Only at high temperature a cyclic hardening is shown at low number of cycles.Friction stresses, related with dislocation movement itself, and back stresses, related with dislocation pile-ups can be calculated from the stress-strain loops.The cyclic softening is due to diminishing friction stress while the starting hardening behaviour is due to increasing back stresses.The rotation texture induced softening model is ruled out assuming instead a model based on dislocation unlocking from interstitial oxygen solute atoms

  10. Cyclic approximation to stasis

    Directory of Open Access Journals (Sweden)

    Stewart D. Johnson

    2009-06-01

    Full Text Available Neighborhoods of points in $mathbb{R}^n$ where a positive linear combination of $C^1$ vector fields sum to zero contain, generically, cyclic trajectories that switch between the vector fields. Such points are called stasis points, and the approximating switching cycle can be chosen so that the timing of the switches exactly matches the positive linear weighting. In the case of two vector fields, the stasis points form one-dimensional $C^1$ manifolds containing nearby families of two-cycles. The generic case of two flows in $mathbb{R}^3$ can be diffeomorphed to a standard form with cubic curves as trajectories.

  11. Accelerated cyclic corrosion tests

    Directory of Open Access Journals (Sweden)

    Prošek T.

    2016-06-01

    Full Text Available Accelerated corrosion testing is indispensable for material selection, quality control and both initial and residual life time prediction for bare and painted metallic, polymeric, adhesive and other materials in atmospheric exposure conditions. The best known Neutral Salt Spray (NSS test provides unrealistic conditions and poor correlation to exposures in atmosphere. Modern cyclic accelerated corrosion tests include intermittent salt spray, wet and dry phases and eventually other technical phases. They are able to predict the material performance in service more correctly as documented on several examples. The use of NSS should thus be restricted for quality control.

  12. <strong>Mini-project>

    DEFF Research Database (Denmark)

    Katajainen, Jyrki

    2008-01-01

    In this project the goal is to develop the safe * family of containers for the CPH STL. The containers to be developed should be safer and more reliable than any of the existing implementations. A special focus should be put on strong exception safety since none of the existing prototypes available...

  13. [Asthma and cyclic neutropenia].

    Science.gov (United States)

    Salazar Cabrera, A N; Berrón Pérez, R; Ortega Martell, J A; Onuma Takane, E

    1996-01-01

    We report a male with history of recurrent infections (recurrent oral aphtous disease [ROAD], middle ear infections and pharyngo amigdalitis) every 3 weeks since he was 7 months old. At the age of 3 years cyclic neutropenia was diagnosed with cyclic fall in the total neutrophil count in blood smear every 21 days and prophylactic antimicrobial therapy was indicated. Episodic events every 3 weeks of acute asthma and allergic rhinitis were detected at the age of 6 years old and specific immunotherapy to Bermuda grass was given during 3 years with markedly improvement in his allergic condition but not in the ROAD. He came back until the age of 16 with episodic acute asthma and ROAD. The total neutrophil count failed to 0 every 21 days and surprisingly the total eosinophil count increased up to 2,000 at the same time, with elevation of serum IgE (412 Ul/mL). Specific immunotherapy to D.pt. and Aller.a. and therapy with timomodulin was indicated. After 3 months we observed clinical improvement in the asthmatic condition and the ROAD disappeared, but the total neutrophil count did not improve. We present this case as a rare association between 2 diseases with probably no etiological relationship but may be physiopatological that could help to understand more the pathogenesis of asthma.

  14. Ekpyrotic and cyclic cosmology

    International Nuclear Information System (INIS)

    Lehners, Jean-Luc

    2008-01-01

    Ekpyrotic and cyclic cosmologies provide theories of the very early and of the very late universe. In these models, the big bang is described as a collision of branes - and thus the big bang is not the beginning of time. Before the big bang, there is an ekpyrotic phase with equation of state w=P/(ρ) >>1 (where P is the average pressure and ρ the average energy density) during which the universe slowly contracts. This phase resolves the standard cosmological puzzles and generates a nearly scale-invariant spectrum of cosmological perturbations containing a significant non-Gaussian component. At the same time it produces small-amplitude gravitational waves with a blue spectrum. The dark energy dominating the present-day cosmological evolution is reinterpreted as a small attractive force between our brane and a parallel one. This force eventually induces a new ekpyrotic phase and a new brane collision, leading to the idea of a cyclic universe. This review discusses the detailed properties of these models, their embedding in M-theory and their viability, with an emphasis on open issues and observational signatures

  15. Strong interactions

    International Nuclear Information System (INIS)

    Froissart, Marcel

    1976-01-01

    Strong interactions are introduced by their more obvious aspect: nuclear forces. In hadron family, the nucleon octet, OMEGA - decuplet, and quark triply are successively considered. Pion wave having been put at the origin of nuclear forces, low energy phenomena are described, the force being explained as an exchange of structure corresponding to a Regge trajectory in a variable rotating state instead of the exchange of a well defined particle. At high energies the concepts of pomeron, parton and stratons are introduced, pionization and fragmentation are briefly differentiated [fr

  16. Z₂-double cyclic codes

    OpenAIRE

    Borges, J.

    2014-01-01

    A binary linear code C is a Z2-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the Z2[x]-module Z2[x]/(x^r − 1) × Z2[x]/(x^s − 1). We determine the structure of Z2-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of Z2-double cyclic codes and its duals, and the relation...

  17. Manual for Cyclic Triaxial Test

    DEFF Research Database (Denmark)

    Shajarati, Amir; Sørensen, Kris Wessel; Nielsen, Søren Kjær

    This manual describes the different steps that is included in the procedure for conducting a cyclic triaxial test at the geotechnical Laboratory at Aalborg University. Furthermore it contains a chapter concerning some of the background theory for the static triaxial tests. The cyclic/dynamic tria......This manual describes the different steps that is included in the procedure for conducting a cyclic triaxial test at the geotechnical Laboratory at Aalborg University. Furthermore it contains a chapter concerning some of the background theory for the static triaxial tests. The cyclic...

  18. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    Science.gov (United States)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  19. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  20. SegAN: Adversarial Network with Multi-scale L1 Loss for Medical Image Segmentation.

    Science.gov (United States)

    Xue, Yuan; Xu, Tao; Zhang, Han; Long, L Rodney; Huang, Xiaolei

    2018-05-03

    Inspired by classic Generative Adversarial Networks (GANs), we propose a novel end-to-end adversarial neural network, called SegAN, for the task of medical image segmentation. Since image segmentation requires dense, pixel-level labeling, the single scalar real/fake output of a classic GAN's discriminator may be ineffective in producing stable and sufficient gradient feedback to the networks. Instead, we use a fully convolutional neural network as the segmentor to generate segmentation label maps, and propose a novel adversarial critic network with a multi-scale L 1 loss function to force the critic and segmentor to learn both global and local features that capture long- and short-range spatial relationships between pixels. In our SegAN framework, the segmentor and critic networks are trained in an alternating fashion in a min-max game: The critic is trained by maximizing a multi-scale loss function, while the segmentor is trained with only gradients passed along by the critic, with the aim to minimize the multi-scale loss function. We show that such a SegAN framework is more effective and stable for the segmentation task, and it leads to better performance than the state-of-the-art U-net segmentation method. We tested our SegAN method using datasets from the MICCAI BRATS brain tumor segmentation challenge. Extensive experimental results demonstrate the effectiveness of the proposed SegAN with multi-scale loss: on BRATS 2013 SegAN gives performance comparable to the state-of-the-art for whole tumor and tumor core segmentation while achieves better precision and sensitivity for Gd-enhance tumor core segmentation; on BRATS 2015 SegAN achieves better performance than the state-of-the-art in both dice score and precision.

  1. The arabidopsis cyclic nucleotide interactome

    KAUST Repository

    Donaldson, Lara Elizabeth

    2016-05-11

    Background Cyclic nucleotides have been shown to play important signaling roles in many physiological processes in plants including photosynthesis and defence. Despite this, little is known about cyclic nucleotide-dependent signaling mechanisms in plants since the downstream target proteins remain unknown. This is largely due to the fact that bioinformatics searches fail to identify plant homologs of protein kinases and phosphodiesterases that are the main targets of cyclic nucleotides in animals. Methods An affinity purification technique was used to identify cyclic nucleotide binding proteins in Arabidopsis thaliana. The identified proteins were subjected to a computational analysis that included a sequence, transcriptional co-expression and functional annotation analysis in order to assess their potential role in plant cyclic nucleotide signaling. Results A total of twelve cyclic nucleotide binding proteins were identified experimentally including key enzymes in the Calvin cycle and photorespiration pathway. Importantly, eight of the twelve proteins were shown to contain putative cyclic nucleotide binding domains. Moreover, the identified proteins are post-translationally modified by nitric oxide, transcriptionally co-expressed and annotated to function in hydrogen peroxide signaling and the defence response. The activity of one of these proteins, GLYGOLATE OXIDASE 1, a photorespiratory enzyme that produces hydrogen peroxide in response to Pseudomonas, was shown to be repressed by a combination of cGMP and nitric oxide treatment. Conclusions We propose that the identified proteins function together as points of cross-talk between cyclic nucleotide, nitric oxide and reactive oxygen species signaling during the defence response.

  2. RETHINKING THE ROLE OF SMALL-GROUP COLLABORATORS AND ADVERSARIES IN THE LONDON KLEINIAN DEVELOPMENT (1914-1968).

    Science.gov (United States)

    Aguayo, Joseph; Regeczkey, Agnes

    2016-07-01

    The authors historically situate the London Kleinian development in terms of the small-group collaborations and adversaries that arose during the course of Melanie Klein's career. Some collaborations later became personally adversarial (e.g., those Klein had with Glover and Schmideberg); other adversarial relationships forever remained that way (with A. Freud); while still other long-term collaborations became theoretically contentious (such as with Winnicott and Heimann). After the Controversial Discussions in 1944, Klein marginalized one group of supporters (Heimann, Winnicott, and Riviere) in favor of another group (Rosenfeld, Segal, and Bion). After Klein's death in 1960, Bion maintained loyalty to Klein's ideas while quietly distancing his work from the London Klein group, immigrating to the United States in 1968. © 2016 The Psychoanalytic Quarterly, Inc.

  3. Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L.

    2006-09-01

    Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using an adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.

  4. The Adversarial Principle in Prima Facie Judgments of the Legal Thesis Firmed in the Trial of Repetitive Cases

    Directory of Open Access Journals (Sweden)

    Juliana Provedel Cardoso

    2016-10-01

    Full Text Available The present articles objective is to analyse the highly effective adversarial principle from the Constitutional Democratic State of Law and the cooperative process structure. In this sense, an analysis of the repetitive cases model is made with special relevance to the Civil Procedure Codice 2015, put in evidence the preliminary injunction, the repetitive appeals and the resolution incident repetitive demands. With the establishment of the premises, an analysis of the adversarial principle is made on prima facie judgments of the legal thesis firmed in the trial of repetitive cases, in view of the motivation of the court decision (speech of the case and law (speech of the precedents.

  5. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries.

    Science.gov (United States)

    Zhu, Zhengqiu; Chen, Bin; Qiu, Sihang; Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang

    2018-03-27

    Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker's parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker's observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.

  6. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries

    Science.gov (United States)

    Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang

    2018-01-01

    Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants. PMID:29584679

  7. Translation-aware semantic segmentation via conditional least-square generative adversarial networks

    Science.gov (United States)

    Zhang, Mi; Hu, Xiangyun; Zhao, Like; Pang, Shiyan; Gong, Jinqi; Luo, Min

    2017-10-01

    Semantic segmentation has recently made rapid progress in the field of remote sensing and computer vision. However, many leading approaches cannot simultaneously translate label maps to possible source images with a limited number of training images. The core issue is insufficient adversarial information to interpret the inverse process and proper objective loss function to overcome the vanishing gradient problem. We propose the use of conditional least squares generative adversarial networks (CLS-GAN) to delineate visual objects and solve these problems. We trained the CLS-GAN network for semantic segmentation to discriminate dense prediction information either from training images or generative networks. We show that the optimal objective function of CLS-GAN is a special class of f-divergence and yields a generator that lies on the decision boundary of discriminator that reduces possible vanished gradient. We also demonstrate the effectiveness of the proposed architecture at translating images from label maps in the learning process. Experiments on a limited number of high resolution images, including close-range and remote sensing datasets, indicate that the proposed method leads to the improved semantic segmentation accuracy and can simultaneously generate high quality images from label maps.

  8. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    Directory of Open Access Journals (Sweden)

    Murilo Coutinho

    2018-04-01

    Full Text Available Researches in Artificial Intelligence (AI have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC. Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  9. Adversarial Allegiance: The Devil is in the Evidence Details, Not Just on the Witness Stand

    Science.gov (United States)

    McAuliff, Bradley D.; Arter, Jeana L.

    2016-01-01

    This study examined the potential influence of adversarial allegiance on expert testimony in a simulated child sexual abuse case. A national sample of 100 witness suggestibility experts reviewed a police interview of an alleged 5 year-old female victim. Retaining party (prosecution, defense) and interview suggestibility (low, high) varied across experts. Experts were very willing to testify, but more so for the prosecution than the defense when interview suggestibility was low and vice versa when interview suggestibility was high. Experts' anticipated testimony focused more on pro-defense aspects of the police interview and child's memory overall (negativity bias), but favored retaining party only when interview suggestibility was low. Unlike prosecution-retained experts who shifted their focus from pro-defense aspects of the case in the high suggestibility interview to pro-prosecution aspects in the low suggestibility interview, defense experts did not. Blind raters' perceptions of expert focus mirrored those findings. Despite an initial bias toward retaining party, experts' evaluations of child victim accuracy and interview quality were lower in the high versus low interview suggestibility condition only. Our data suggest that adversarial allegiance exists, that it can (but not always) influence how experts process evidence, and that it may be more likely in cases involving evidence that is not blatantly flawed. Defense experts may evaluate this type of evidence more negatively than prosecution experts due to negativity bias and positive testing strategies associated with confirmation bias. PMID:27243362

  10. Generative adversarial network based telecom fraud detection at the receiving bank.

    Science.gov (United States)

    Zheng, Yu-Jun; Zhou, Xiao-Han; Sheng, Wei-Guo; Xue, Yu; Chen, Sheng-Yong

    2018-06-01

    Recently telecom fraud has become a serious problem especially in developing countries such as China. At present, it can be very difficult to coordinate different agencies to prevent fraud completely. In this paper we study how to detect large transfers that are sent from victims deceived by fraudsters at the receiving bank. We propose a new generative adversarial network (GAN) based model to calculate for each large transfer a probability that it is fraudulent, such that the bank can take appropriate measures to prevent potential fraudsters to take the money if the probability exceeds a threshold. The inference model uses a deep denoising autoencoder to effectively learn the complex probabilistic relationship among the input features, and employs adversarial training that establishes a minimax game between a discriminator and a generator to accurately discriminate between positive samples and negative samples in the data distribution. We show that the model outperforms a set of well-known classification methods in experiments, and its applications in two commercial banks have reduced losses of about 10 million RMB in twelve weeks and significantly improved their business reputation. Copyright © 2018 Elsevier Ltd. All rights reserved.

  11. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.

    Science.gov (United States)

    Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-04-24

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  12. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries

    Directory of Open Access Journals (Sweden)

    Zhengqiu Zhu

    2018-03-01

    Full Text Available Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters are integrated into the extended CPEP model; (iii Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.

  13. The cornucopia of meaningful leads: Applying deep adversarial autoencoders for new molecule development in oncology.

    Science.gov (United States)

    Kadurin, Artur; Aliper, Alexander; Kazennov, Andrey; Mamoshina, Polina; Vanhaelen, Quentin; Khrabrov, Kuzma; Zhavoronkov, Alex

    2017-02-14

    Recent advances in deep learning and specifically in generative adversarial networks have demonstrated surprising results in generating new images and videos upon request even using natural language as input. In this paper we present the first application of generative adversarial autoencoders (AAE) for generating novel molecular fingerprints with a defined set of parameters. We developed a 7-layer AAE architecture with the latent middle layer serving as a discriminator. As an input and output the AAE uses a vector of binary fingerprints and concentration of the molecule. In the latent layer we also introduced a neuron responsible for growth inhibition percentage, which when negative indicates the reduction in the number of tumor cells after the treatment. To train the AAE we used the NCI-60 cell line assay data for 6252 compounds profiled on MCF-7 cell line. The output of the AAE was used to screen 72 million compounds in PubChem and select candidate molecules with potential anti-cancer properties. This approach is a proof of concept of an artificially-intelligent drug discovery engine, where AAEs are used to generate new molecular fingerprints with the desired molecular properties.

  14. Adversarial allegiance: The devil is in the evidence details, not just on the witness stand.

    Science.gov (United States)

    McAuliff, Bradley D; Arter, Jeana L

    2016-10-01

    This study examined the potential influence of adversarial allegiance on expert testimony in a simulated child sexual abuse case. A national sample of 100 witness suggestibility experts reviewed a police interview of an alleged 5-year-old female victim. Retaining party (prosecution, defense) and interview suggestibility (low, high) varied across experts. Experts were very willing to testify, but more so for the prosecution than the defense when interview suggestibility was low and vice versa when interview suggestibility was high. Experts' anticipated testimony focused more on prodefense aspects of the police interview and child's memory overall (negativity bias), but favored retaining party only when interview suggestibility was low. Prosecution-retained experts shifted their focus from prodefense aspects of the case in the high suggestibility interview to proprosecution aspects in the low suggestibility interview; defense experts did not. Blind raters' perceptions of expert focus mirrored those findings. Despite an initial bias toward retaining party, experts' evaluations of child victim accuracy and police interview quality were lower in the high versus low interview suggestibility condition only. Our data suggest that adversarial allegiance exists, that it can (but not always) influence how experts process evidence, and that it may be more likely in cases involving evidence that is not blatantly flawed. Defense experts may evaluate this type of evidence more negatively than prosecution experts because of negativity bias and positive testing strategies associated with confirmation bias. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  15. Application of adversarial risk analysis model in pricing strategies with remanufacturing

    Directory of Open Access Journals (Sweden)

    Liurui Deng

    2015-01-01

    Full Text Available Purpose: Purpose: This paper mainly focus on the application of adversarial risk analysis (ARA in pricing strategy with remanufacturing. We hope to obtain more realistic results than classical model. Moreover, we also wish that our research improve the development of ARA in pricing strategy of manufacturing or remanufacturing. Approach: In order to gain more actual research, combining adversarial risk analysis, we explore the pricing strategy with remanufacturing based on Stackelberg model. Especially, we build OEM’s 1-order ARA model and further study on manufacturers and remanufacturers’ pricing strategy. Findings: We find the OEM’s 1-order ARA model for the OEM’s product cost C. Besides, we get according manufacturers and remanufacturers’ pricing strategies. Besides, the pricing strategies based on 1-order ARA model have advantage over than the classical model regardless of OEMs and remanufacturers. Research implications: The research on application of ARA imply that we can get more actual results with this kind of modern risk analysis method and ARA can be extensively in pricing strategies of supply chain. Value: Our research improves the application of ARA in remanufacturing industry. Meanwhile, inspired by this analysis, we can also create different ARA models for different parameters. Furthermore, some results and analysis methods can be applied to other pricing strategies of supply chain.

  16. Are the advocates of nuclear power and the adversaries listening to each other?

    International Nuclear Information System (INIS)

    Bernard, Jean-Francois

    1989-01-01

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting

  17. Are the advocates of nuclear power and the adversaries listening to each other?

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Jean-Francois [Electricite de France, Engineering and Construction Division, Sites-Environment-Information Branch, 22-30, avenue de Wagram, 75008, Paris (France)

    1989-07-01

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting.

  18. Undermining Adversaries

    DEFF Research Database (Denmark)

    He, Kai

    2012-01-01

    balancing refers to a state's strategies or diplomatic efforts aiming to undermine a rival's power. By contrast, positive balancing means to strengthen a state's own power in world politics. I argue that a state's balancing strategies are shaped by the level of threat perception regarding its rival....... The higher the threat perception, the more likely it is for a state to choose positive balancing. The lower the threat perception, the more likely it is for a state to choose negative balancing. I suggest that the hegemon provides security as a public good to the international system in a unipolar world...... in which the relatively low-threat propensity of the system renders positive balancing strategies incompatible with state interests after the Cold War. Instead, states have employed various negative balancing strategies to undermine each other's power, especially when dealing with us primacy. China...

  19. Martensitic Transformation in Ultrafine-Grained Stainless Steel AISI 304L Under Monotonic and Cyclic Loading

    Directory of Open Access Journals (Sweden)

    Heinz Werner Höppel

    2012-02-01

    Full Text Available The monotonic and cyclic deformation behavior of ultrafine-grained metastable austenitic steel AISI 304L, produced by severe plastic deformation, was investigated. Under monotonic loading, the martensitic phase transformation in the ultrafine-grained state is strongly favored. Under cyclic loading, the martensitic transformation behavior is similar to the coarse-grained condition, but the cyclic stress response is three times larger for the ultrafine-grained condition.

  20. Prognosis of Cyclic Vomiting Syndrome

    Directory of Open Access Journals (Sweden)

    J. Gordon Millichap

    2016-03-01

    Full Text Available Investigators from Teikyo University School of Medicine, Tokyo, Japan, evaluated the clinical features, prognosis, and prophylaxis of cyclic vomiting syndrome and the relationship between the syndrome and levels of adrenocorticotropic/antidiuretic hormones (ACTH/ADH.

  1. Functionalized linear and cyclic polyolefins

    Energy Technology Data Exchange (ETDEWEB)

    Tuba, Robert; Grubbs, Robert H.

    2018-02-13

    This invention relates to methods and compositions for preparing linear and cyclic polyolefins. More particularly, the invention relates to methods and compositions for preparing functionalized linear and cyclic polyolefins via olefin metathesis reactions. Polymer products produced via the olefin metathesis reactions of the invention may be utilized for a wide range of materials applications. The invention has utility in the fields of polymer and materials chemistry and manufacture.

  2. Cyclic Processing for Context Fusion

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2007-01-01

    Many machine-learning techniques use feedback information. However, current context fusion systems do not support this because they constrain processing to be structured as acyclic processing. This paper proposes a generalization which enables the use of cyclic processing in context fusion systems....... A solution is proposed to the inherent problem of how to avoid uncontrollable looping during cyclic processing. The solution is based on finding cycles using graph-coloring and breaking cycles using time constraints....

  3. Nitration Study of Cyclic Ladder Polyphenylsilsesquioxane

    Directory of Open Access Journals (Sweden)

    LIANG Jia-xiang

    2017-05-01

    Full Text Available Several nitration reagents including fuming nitric acid, HNO3-H2SO4, KNO3-H2SO4, HNO3-KNO3, CH3COOH-KNO3, (CH3CO2O-HNO3 were used to nitrate cyclic ladder polyphenylsilsesquioxane (CL-PPSQ in different conditions in order to enhance the compatibility of the CL-PPSQ in polymers, the NO2-PPSQ was obtained. FTIR, element analysis, GPC, TGA and 1H NMR were used to characterize the structures of the nitrated products. The results show that the nitrating abilities of the fuming nitric acid, HNO3-H2SO4 and KNO3-H2SO4 are very strong. Many nitro groups can be linked with phenyl groups in CL-PPSQ, but with low molecular mass, fracture occurs in siloxane segment. However, the Mn of the product NO2-PPSQ sharply drops by 50% compared with that of CL-PPSQ, so the nitration reagents can break the cyclic structure of CL-PPSQ. The nitrating reagents of HNO3-KNO3 and CH3COOH-KNO3 have no nitration effects on CL-PPSQ. At last, NO2-CL-PPSQ was prepared using (CH3CO2O-HNO3 because of the moderate nitration process and ability. The cyclic structure of PPSQ is remained, although the number of —NO2 group is not too much. At the same time, the nitration mechanism using different nitration reagents was analyzed. A certain amount of NO2+, which is a kind of activator owning strong nitration ability, can be found in the fuming nitric acid and H2SO4-HNO3(KNO3 systems. As to the (CH3CO2O-HNO3 system, the main activator is CH3COONO2.

  4. Playing Multi-Action Adversarial Games: Online Evolutionary Planning versus Tree Search

    DEFF Research Database (Denmark)

    Justesen, Niels; Mahlmann, Tobias; Risi, Sebastian

    2017-01-01

    We address the problem of playing turn-based multi-action adversarial games, which include many strategy games with extremely high branching factors as players take multiple actions each turn. This leads to the breakdown of standard tree search methods, including Monte Carlo Tree Search (MCTS......), as they become unable to reach a sufficient depth in the game tree. In this paper, we introduce Online Evolutionary Planning (OEP) to address this challenge, which searches for combinations of actions to perform during a single turn guided by a fitness function that evaluates the quality of a particular state....... We compare OEP to different MCTS variations that constrain the exploration to deal with the high branching factor in the turn-based multi-action game Hero Academy. While the constrained MCTS variations outperform the vanilla MCTS implementation by a large margin, OEP is able to search the space...

  5. Stock Market Prediction on High-Frequency Data Using Generative Adversarial Nets

    Directory of Open Access Journals (Sweden)

    Xingyu Zhou

    2018-01-01

    Full Text Available Stock price prediction is an important issue in the financial world, as it contributes to the development of effective strategies for stock exchange transactions. In this paper, we propose a generic framework employing Long Short-Term Memory (LSTM and convolutional neural network (CNN for adversarial training to forecast high-frequency stock market. This model takes the publicly available index provided by trading software as input to avoid complex financial theory research and difficult technical analysis, which provides the convenience for the ordinary trader of nonfinancial specialty. Our study simulates the trading mode of the actual trader and uses the method of rolling partition training set and testing set to analyze the effect of the model update cycle on the prediction performance. Extensive experiments show that our proposed approach can effectively improve stock price direction prediction accuracy and reduce forecast error.

  6. Institutionalizing dissent: a proposal for an adversarial system of pharmaceutical research.

    Science.gov (United States)

    Biddle, Justin

    2013-12-01

    There are serious problems with the way in which pharmaceutical research is currently practiced, many of which can be traced to the influence of commercial interests on research. One of the most significant is inadequate dissent, or organized skepticism. In order to ameliorate this problem, I develop a proposal that I call the "Adversarial Proceedings for the Evaluation of Pharmaceuticals," to be instituted within a regulatory agency such as the Food and Drug Administration for the evaluation of controversial new drugs and controversial drugs already in the market. This proposal is an organizational one based upon the "science court" proposal by Arthur Kantrowitz in the 1960s and 1970s. The primary benefit of this system is its ability to institutionalize dissent, thereby ensuring that one set of interests does not dominate all others.

  7. When does familiarity promote versus undermine interpersonal attraction? A proposed integrative model from erstwhile adversaries.

    Science.gov (United States)

    Finkel, Eli J; Norton, Michael I; Reis, Harry T; Ariely, Dan; Caprariello, Peter A; Eastwick, Paul W; Frost, Jeana H; Maniaci, Michael R

    2015-01-01

    This article began as an adversarial collaboration between two groups of researchers with competing views on a longstanding question: Does familiarity promote or undermine interpersonal attraction? As we explored our respective positions, it became clear that the limitations of our conceptualizations of the familiarity-attraction link, as well as the limitations of prior research, were masking a set of higher order principles capable of integrating these diverse conceptualizations. This realization led us to adopt a broader perspective, which focuses on three distinct relationship stages-awareness, surface contact, and mutuality-and suggests that the influence of familiarity on attraction depends on both the nature and the stage of the relationship between perceivers and targets. This article introduces the framework that emerged from our discussions and suggests directions for research to investigate its validity. © The Author(s) 2014.

  8. Sharpness-Aware Low-Dose CT Denoising Using Conditional Generative Adversarial Network.

    Science.gov (United States)

    Yi, Xin; Babyn, Paul

    2018-02-20

    Low-dose computed tomography (LDCT) has offered tremendous benefits in radiation-restricted applications, but the quantum noise as resulted by the insufficient number of photons could potentially harm the diagnostic performance. Current image-based denoising methods tend to produce a blur effect on the final reconstructed results especially in high noise levels. In this paper, a deep learning-based approach was proposed to mitigate this problem. An adversarially trained network and a sharpness detection network were trained to guide the training process. Experiments on both simulated and real dataset show that the results of the proposed method have very small resolution loss and achieves better performance relative to state-of-the-art methods both quantitatively and visually.

  9. Fine-Tuning Neural Patient Question Retrieval Model with Generative Adversarial Networks.

    Science.gov (United States)

    Tang, Guoyu; Ni, Yuan; Wang, Keqiang; Yong, Qin

    2018-01-01

    The online patient question and answering (Q&A) system attracts an increasing amount of users in China. Patient will post their questions and wait for doctors' response. To avoid the lag time involved with the waiting and to reduce the workload on the doctors, a better method is to automatically retrieve the semantically equivalent question from the archive. We present a Generative Adversarial Networks (GAN) based approach to automatically retrieve patient question. We apply supervised deep learning based approaches to determine the similarity between patient questions. Then a GAN framework is used to fine-tune the pre-trained deep learning models. The experiment results show that fine-tuning by GAN can improve the performance.

  10. Defending Tor from Network Adversaries: A Case Study of Network Path Prediction

    Directory of Open Access Journals (Sweden)

    Juen Joshua

    2015-06-01

    Full Text Available The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems (ASes and Internet exchanges (IXes, which can observe different overlay hops belonging to the same circuit. We evaluate whether network path prediction techniques provide an accurate picture of the threat from such adversaries, and whether they can be used to avoid this threat. We perform a measurement study by collecting 17.2 million traceroutes from Tor relays to destinations around the Internet. We compare the collected traceroute paths to predicted paths using state-of-the-art path inference techniques. We find that traceroutes present a very different picture, with the set of ASes seen in the traceroute path differing from the predicted path 80% of the time. We also consider the impact that prediction errors have on Tor security. Using a simulator to choose paths over a week, our traceroutes indicate a user has nearly a 100% chance of at least one compromise in a week with 11% of total paths containing an AS compromise and less than 1% containing an IX compromise when using default Tor selection. We find modifying the path selection to choose paths predicted to be safe lowers total paths with an AS compromise to 0.14% but still presents a 5–11% chance of at least one compromise in a week while making 5% of paths fail, with 96% of failures due to false positives in path inferences. Our results demonstrate more measurement and better path prediction is necessary to mitigate the risk of AS and IX adversaries to Tor.

  11. Reconstruction of three-dimensional porous media using generative adversarial neural networks

    Science.gov (United States)

    Mosser, Lukas; Dubrule, Olivier; Blunt, Martin J.

    2017-10-01

    To evaluate the variability of multiphase flow properties of porous media at the pore scale, it is necessary to acquire a number of representative samples of the void-solid structure. While modern x-ray computer tomography has made it possible to extract three-dimensional images of the pore space, assessment of the variability in the inherent material properties is often experimentally not feasible. We present a method to reconstruct the solid-void structure of porous media by applying a generative neural network that allows an implicit description of the probability distribution represented by three-dimensional image data sets. We show, by using an adversarial learning approach for neural networks, that this method of unsupervised learning is able to generate representative samples of porous media that honor their statistics. We successfully compare measures of pore morphology, such as the Euler characteristic, two-point statistics, and directional single-phase permeability of synthetic realizations with the calculated properties of a bead pack, Berea sandstone, and Ketton limestone. Results show that generative adversarial networks can be used to reconstruct high-resolution three-dimensional images of porous media at different scales that are representative of the morphology of the images used to train the neural network. The fully convolutional nature of the trained neural network allows the generation of large samples while maintaining computational efficiency. Compared to classical stochastic methods of image reconstruction, the implicit representation of the learned data distribution can be stored and reused to generate multiple realizations of the pore structure very rapidly.

  12. Learning Physics-based Models in Hydrology under the Framework of Generative Adversarial Networks

    Science.gov (United States)

    Karpatne, A.; Kumar, V.

    2017-12-01

    Generative adversarial networks (GANs), that have been highly successful in a number of applications involving large volumes of labeled and unlabeled data such as computer vision, offer huge potential for modeling the dynamics of physical processes that have been traditionally studied using simulations of physics-based models. While conventional physics-based models use labeled samples of input/output variables for model calibration (estimating the right parametric forms of relationships between variables) or data assimilation (identifying the most likely sequence of system states in dynamical systems), there is a greater opportunity to explore the full power of machine learning (ML) methods (e.g, GANs) for studying physical processes currently suffering from large knowledge gaps, e.g. ground-water flow. However, success in this endeavor requires a principled way of combining the strengths of ML methods with physics-based numerical models that are founded on a wealth of scientific knowledge. This is especially important in scientific domains like hydrology where the number of data samples is small (relative to Internet-scale applications such as image recognition where machine learning methods has found great success), and the physical relationships are complex (high-dimensional) and non-stationary. We will present a series of methods for guiding the learning of GANs using physics-based models, e.g., by using the outputs of physics-based models as input data to the generator-learner framework, and by using physics-based models as generators trained using validation data in the adversarial learning framework. These methods are being developed under the broad paradigm of theory-guided data science that we are developing to integrate scientific knowledge with data science methods for accelerating scientific discovery.

  13. On Improvements of Cyclic MUSIC

    Directory of Open Access Journals (Sweden)

    H. Howard Fan

    2005-01-01

    Full Text Available Many man-made signals encountered in communications exhibit cyclostationarity. By exploiting cyclostationarity, cyclic MUSIC has been shown to be able to separate signals with different cycle frequencies, thus, to be able to perform signal selective direction of-arrival (DOA estimation. However, as will be shown in this paper, the DOA estimation of cyclic MUSIC is actually biased. We show in this paper that by properly choosing the frequency for evaluating the steering vector, the bias of DOA estimation can be substantially reduced and the performance can be improved. Furthermore, we propose another algorithm exploiting cyclic conjugate correlation to further improve the performance of DOA estimation. Simulation results show the effectiveness of both of our methods.

  14. Design of a cyclic multiverse

    Energy Technology Data Exchange (ETDEWEB)

    Piao Yunsong, E-mail: yspiao@gucas.ac.c [College of Physical Sciences, Graduate School of Chinese Academy of Sciences, Beijing 100049 (China)

    2010-08-09

    Recently, it has been noticed that the amplification of the amplitude of curvature perturbation cycle by cycle can lead to a cyclic multiverse scenario, in which the number of universes increases cycle by cycle. However, this amplification will also inevitably induce either the ultimate end of corresponding cycle, or the resulting spectrum of perturbations inside corresponding universe is not scale invariant, which baffles the existence of observable universes. In this Letter, we propose a design of a cyclic multiverse, in which the observable universe can emerges naturally. The significance of a long period of dark energy before the turnaround of each cycle for this implementing is shown.

  15. Design of a cyclic multiverse

    International Nuclear Information System (INIS)

    Piao Yunsong

    2010-01-01

    Recently, it has been noticed that the amplification of the amplitude of curvature perturbation cycle by cycle can lead to a cyclic multiverse scenario, in which the number of universes increases cycle by cycle. However, this amplification will also inevitably induce either the ultimate end of corresponding cycle, or the resulting spectrum of perturbations inside corresponding universe is not scale invariant, which baffles the existence of observable universes. In this Letter, we propose a design of a cyclic multiverse, in which the observable universe can emerges naturally. The significance of a long period of dark energy before the turnaround of each cycle for this implementing is shown.

  16. Nature of a solar cyclicity

    International Nuclear Information System (INIS)

    Romanchuk, P.R.

    1981-01-01

    The paper contains a critical review of works on studying a cyclic character of solar activity. An introduction of cyclic curves with a frequency spectrum is established to be insolvent. The Wolf, Newcomb and Waldmeier approach seems to be useful. Some evidence is given in favour of the author's conception of solar activity ciclicity of a tide nature. It is accounted for a continuous double and single effect of planets, a resonant character of this effect due to which a 10-year period of Jupiter and Saturn is transformed into an 11-year cycle of activity [ru

  17. Parallel accelerated cyclic reduction preconditioner for three-dimensional elliptic PDEs with variable coefficients

    KAUST Repository

    Chavez Chavez, Gustavo Ivan; Turkiyyah, George; Zampini, Stefano; Keyes, David E.

    2017-01-01

    and the cyclic reduction method. The setup and application phases of the preconditioner achieve log-linear complexity in memory footprint and number of operations, and numerical experiments exhibit good weak and strong scalability at large processor counts in a

  18. Gold prices: Analyzing its cyclical behavior

    Directory of Open Access Journals (Sweden)

    Martha Gutiérrez

    2013-07-01

    Full Text Available Gold is a commodity that is seen as a safe haven when a financial crisis strikes, but when stock markets are prosperous, these are more attractive investment alternatives, and so the gold cycle goes on and on. The DJIA/GF (Dow Jones Industrial Average and Gold Fix ratio is chosen to establish the evolution of gold prices in relation to the NYSE. This paper has two goals: to prove that the DJIA/GF ratio is strongly cyclical by using Fourier analysis and to set a predictive neural networks model to forecast the behavior of this ratio during 2011-2020. To this end, business cycle events like the Great Depression along with the 1970s crisis, and the 1950s boom along with the world economic recovery of the 1990s are contrasted in light of the mentioned ratio. Gold prices are found to evolve cyclically with a dominant period of 37 years and are mainly affected by energy prices, financial markets and macroeconomic indicators.

  19. 3D conditional generative adversarial networks for high-quality PET image estimation at low dose.

    Science.gov (United States)

    Wang, Yan; Yu, Biting; Wang, Lei; Zu, Chen; Lalush, David S; Lin, Weili; Wu, Xi; Zhou, Jiliu; Shen, Dinggang; Zhou, Luping

    2018-07-01

    Positron emission tomography (PET) is a widely used imaging modality, providing insight into both the biochemical and physiological processes of human body. Usually, a full dose radioactive tracer is required to obtain high-quality PET images for clinical needs. This inevitably raises concerns about potential health hazards. On the other hand, dose reduction may cause the increased noise in the reconstructed PET images, which impacts the image quality to a certain extent. In this paper, in order to reduce the radiation exposure while maintaining the high quality of PET images, we propose a novel method based on 3D conditional generative adversarial networks (3D c-GANs) to estimate the high-quality full-dose PET images from low-dose ones. Generative adversarial networks (GANs) include a generator network and a discriminator network which are trained simultaneously with the goal of one beating the other. Similar to GANs, in the proposed 3D c-GANs, we condition the model on an input low-dose PET image and generate a corresponding output full-dose PET image. Specifically, to render the same underlying information between the low-dose and full-dose PET images, a 3D U-net-like deep architecture which can combine hierarchical features by using skip connection is designed as the generator network to synthesize the full-dose image. In order to guarantee the synthesized PET image to be close to the real one, we take into account of the estimation error loss in addition to the discriminator feedback to train the generator network. Furthermore, a concatenated 3D c-GANs based progressive refinement scheme is also proposed to further improve the quality of estimated images. Validation was done on a real human brain dataset including both the normal subjects and the subjects diagnosed as mild cognitive impairment (MCI). Experimental results show that our proposed 3D c-GANs method outperforms the benchmark methods and achieves much better performance than the state

  20. OFFSETTING TOMORROW’S ADVERSARY IN A CONTESTED ENVIRONMENT: DEFENDING EXPEDITIONARY ADVANCE BASES IN 2025 AND BEYOND

    Science.gov (United States)

    2017-04-06

    EABs enable the dispersal of key assets to cloud adversary targeting process while 8 providing the joint force proximity to the area of...environment, the denial of ISR capabilities is critical to maintaining an adversary’s uncertainty and cloud his situational awareness. To this task...James E. 2014. "Expeditionary Force 21." Expeditionary Force 21, Forward and Ready: Now and in the Future. Washington, DC: HQ USMC, March 4. Board

  1. Cutting out the middleman: physicians can contract directly with employers--a viable alternative to adversarial managed care agreements.

    Science.gov (United States)

    Lester, Howard

    2002-01-01

    HMOs, PPOs, and other managed care "middlemen" control the means by which most physicians do business with employers. As physicians face dwindling reimbursements, greater practice restrictions, and increased pressure to sign adversarial middleman contracts, interest in direct contracting has grown. This article introduces direct contracting as an important alternative to commercial managed care agreements; cites the key advantages and process of direct contracting; and offers practical recommendations for helping physician practices successfully negotiate direct physician/employer agreements.

  2. Deformation mechanisms in cyclic creep and fatigue

    International Nuclear Information System (INIS)

    Laird, C.

    1979-01-01

    Service conditions in which static and cyclic loading occur in conjunction are numerous. It is argued that an understanding of cyclic creep and cyclic deformation are necessary both for design and for understanding creep-fatigue fracture. Accordingly a brief, and selective, review of cyclic creep and cyclic deformation at both low and high strain amplitudes is provided. Cyclic loading in conjunction with static loading can lead to creep retardation if cyclic hardening occurs, or creep acceleration if softening occurs. Low strain amplitude cyclic deformation is understood in terms of dislocation loop patch and persistent slip band behavior, high strain deformation in terms of dislocation cell-shuttling models. While interesting advances in these fields have been made in the last few years, the deformation mechanisms are generally poorly understood

  3. Sequencing Cyclic Peptides by Multistage Mass Spectrometry

    Science.gov (United States)

    Mohimani, Hosein; Yang, Yu-Liang; Liu, Wei-Ting; Hsieh, Pei-Wen; Dorrestein, Pieter C.; Pevzner, Pavel A.

    2012-01-01

    Some of the most effective antibiotics (e.g., Vancomycin and Daptomycin) are cyclic peptides produced by non-ribosomal biosynthetic pathways. While hundreds of biomedically important cyclic peptides have been sequenced, the computational techniques for sequencing cyclic peptides are still in their infancy. Previous methods for sequencing peptide antibiotics and other cyclic peptides are based on Nuclear Magnetic Resonance spectroscopy, and require large amount (miligrams) of purified materials that, for most compounds, are not possible to obtain. Recently, development of mass spectrometry based methods has provided some hope for accurate sequencing of cyclic peptides using picograms of materials. In this paper we develop a method for sequencing of cyclic peptides by multistage mass spectrometry, and show its advantages over single stage mass spectrometry. The method is tested on known and new cyclic peptides from Bacillus brevis, Dianthus superbus and Streptomyces griseus, as well as a new family of cyclic peptides produced by marine bacteria. PMID:21751357

  4. Cyclic peptide therapeutics: past, present and future.

    Science.gov (United States)

    Zorzi, Alessandro; Deyle, Kaycie; Heinis, Christian

    2017-06-01

    Cyclic peptides combine several favorable properties such as good binding affinity, target selectivity and low toxicity that make them an attractive modality for the development of therapeutics. Over 40 cyclic peptide drugs are currently in clinical use and around one new cyclic peptide drug enters the market every year on average. The vast majority of clinically approved cyclic peptides are derived from natural products, such as antimicrobials or human peptide hormones. New powerful techniques based on rational design and in vitro evolution have enabled the de novo development of cyclic peptide ligands to targets for which nature does not offer solutions. A look at the cyclic peptides currently under clinical evaluation shows that several have been developed using such techniques. This new source for cyclic peptide ligands introduces a freshness to the field, and it is likely that de novo developed cyclic peptides will be in clinical use in the near future. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Monopod bucket foundations under cyclic lateral loading

    DEFF Research Database (Denmark)

    Foglia, Aligi; Ibsen, Lars Bo

    on bucket foundations under lateral cyclic loading. The test setup is described in detail and a comprehensive experimental campaign is presented. The foundation is subjected to cyclic overturning moment, cyclic horizontal loading and constant vertical loading, acting on the same plane for thousands...

  6. 40 CFR 721.2120 - Cyclic amide.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Cyclic amide. 721.2120 Section 721... Cyclic amide. (a) Chemical substance and significant new uses subject to reporting. (1) The chemical substance identified as a cyclic amide (PMN P-92-131) is subject to reporting under this section for the...

  7. PSFGAN: a generative adversarial network system for separating quasar point sources and host galaxy light

    Science.gov (United States)

    Stark, Dominic; Launet, Barthelemy; Schawinski, Kevin; Zhang, Ce; Koss, Michael; Turp, M. Dennis; Sartori, Lia F.; Zhang, Hantian; Chen, Yiru; Weigel, Anna K.

    2018-06-01

    The study of unobscured active galactic nuclei (AGN) and quasars depends on the reliable decomposition of the light from the AGN point source and the extended host galaxy light. The problem is typically approached using parametric fitting routines using separate models for the host galaxy and the point spread function (PSF). We present a new approach using a Generative Adversarial Network (GAN) trained on galaxy images. We test the method using Sloan Digital Sky Survey r-band images with artificial AGN point sources added that are then removed using the GAN and with parametric methods using GALFIT. When the AGN point source is more than twice as bright as the host galaxy, we find that our method, PSFGAN, can recover point source and host galaxy magnitudes with smaller systematic error and a lower average scatter (49 per cent). PSFGAN is more tolerant to poor knowledge of the PSF than parametric methods. Our tests show that PSFGAN is robust against a broadening in the PSF width of ± 50 per cent if it is trained on multiple PSFs. We demonstrate that while a matched training set does improve performance, we can still subtract point sources using a PSFGAN trained on non-astronomical images. While initial training is computationally expensive, evaluating PSFGAN on data is more than 40 times faster than GALFIT fitting two components. Finally, PSFGAN is more robust and easy to use than parametric methods as it requires no input parameters.

  8. The Effects of Sacred Value Networks Within an Evolutionary, Adversarial Game

    Science.gov (United States)

    McCalla, Scott G.; Short, Martin B.; Brantingham, P. Jeffrey

    2013-05-01

    The effects of personal relationships and shared ideologies on levels of crime and the formation of criminal coalitions are studied within the context of an adversarial, evolutionary game first introduced in Short et al. (Phys. Rev. E 82:066114, 2010). Here, we interpret these relationships as connections on a graph of N players. These connections are then used in a variety of ways to define each player's "sacred value network"—groups of individuals that are subject to special consideration or treatment by that player. We explore the effects on the dynamics of the system that these networks introduce, through various forms of protection from both victimization and punishment. Under local protection, these networks introduce a new fixed point within the game dynamics, which we find through a continuum approximation of the discrete game. Under more complicated, extended protection, we numerically observe the emergence of criminal coalitions, or "gangs". We also find that a high-crime steady state is much more frequent in the context of extended protection networks, in both the case of Erdős-Rényi and small world random graphs.

  9. Generative Adversarial Networks-Based Semi-Supervised Learning for Hyperspectral Image Classification

    Directory of Open Access Journals (Sweden)

    Zhi He

    2017-10-01

    Full Text Available Classification of hyperspectral image (HSI is an important research topic in the remote sensing community. Significant efforts (e.g., deep learning have been concentrated on this task. However, it is still an open issue to classify the high-dimensional HSI with a limited number of training samples. In this paper, we propose a semi-supervised HSI classification method inspired by the generative adversarial networks (GANs. Unlike the supervised methods, the proposed HSI classification method is semi-supervised, which can make full use of the limited labeled samples as well as the sufficient unlabeled samples. Core ideas of the proposed method are twofold. First, the three-dimensional bilateral filter (3DBF is adopted to extract the spectral-spatial features by naturally treating the HSI as a volumetric dataset. The spatial information is integrated into the extracted features by 3DBF, which is propitious to the subsequent classification step. Second, GANs are trained on the spectral-spatial features for semi-supervised learning. A GAN contains two neural networks (i.e., generator and discriminator trained in opposition to one another. The semi-supervised learning is achieved by adding samples from the generator to the features and increasing the dimension of the classifier output. Experimental results obtained on three benchmark HSI datasets have confirmed the effectiveness of the proposed method , especially with a limited number of labeled samples.

  10. Sistema penal acusatorio en Veracruz/Adversarial criminal system in Veracruz

    Directory of Open Access Journals (Sweden)

    Jorge Alberto Pérez Tolentino (México

    2014-01-01

    Full Text Available El estudio y comprensión del nuevo Código de Procedimientos Penales de Veracruz resulta ineludible, en virtud de las nítidas diferencias existentes entre las figuras jurídicas que contiene el actual ordenamiento, en comparación con el anterior. Es preciso sistematizar, describir y analizar la estructura del sistema penal acusatorio, a efecto de estar en condiciones de evaluar y, en su caso, proponer las mejoras al sistema en cuestión. El contenido esquemático y sustancial del código, la visión y recepción que del mismo tienen los operadores jurídicos y la sociedad en general, son aspectos que cubre el presente documento. The study and understanding of the new Code of Criminal Procedure of Veracruz is unavoidable, by reason of the sharp differences between the legal concepts that contains the actual order, compared with the previous. Needs to be systematized, describe and analyze the structure of the adversarial criminal system, in order to be able to evaluate and, if necessary, propose improvements to the system in question. The schematic and substantial content of the code, viewing and welcome that the same have the legal practitioners and society in general, are aspects covered by herein.

  11. PSFGAN: a generative adversarial network system for separating quasar point sources and host galaxy light

    Science.gov (United States)

    Stark, Dominic; Launet, Barthelemy; Schawinski, Kevin; Zhang, Ce; Koss, Michael; Turp, M. Dennis; Sartori, Lia F.; Zhang, Hantian; Chen, Yiru; Weigel, Anna K.

    2018-03-01

    The study of unobscured active galactic nuclei (AGN) and quasars depends on the reliable decomposition of the light from the AGN point source and the extended host galaxy light. The problem is typically approached using parametric fitting routines using separate models for the host galaxy and the point spread function (PSF). We present a new approach using a Generative Adversarial Network (GAN) trained on galaxy images. We test the method using Sloan Digital Sky Survey (SDSS) r-band images with artificial AGN point sources added which are then removed using the GAN and with parametric methods using GALFIT. When the AGN point source PS is more than twice as bright as the host galaxy, we find that our method, PSFGAN, can recover PS and host galaxy magnitudes with smaller systematic error and a lower average scatter (49%). PSFGAN is more tolerant to poor knowledge of the PSF than parametric methods. Our tests show that PSFGAN is robust against a broadening in the PSF width of ±50% if it is trained on multiple PSF's. We demonstrate that while a matched training set does improve performance, we can still subtract point sources using a PSFGAN trained on non-astronomical images. While initial training is computationally expensive, evaluating PSFGAN on data is more than 40 times faster than GALFIT fitting two components. Finally, PSFGAN it is more robust and easy to use than parametric methods as it requires no input parameters.

  12. Generative adversarial networks recover features in astrophysical images of galaxies beyond the deconvolution limit

    Science.gov (United States)

    Schawinski, Kevin; Zhang, Ce; Zhang, Hantian; Fowler, Lucas; Santhanam, Gokula Krishnan

    2017-05-01

    Observations of astrophysical objects such as galaxies are limited by various sources of random and systematic noise from the sky background, the optical system of the telescope and the detector used to record the data. Conventional deconvolution techniques are limited in their ability to recover features in imaging data by the Shannon-Nyquist sampling theorem. Here, we train a generative adversarial network (GAN) on a sample of 4550 images of nearby galaxies at 0.01 < z < 0.02 from the Sloan Digital Sky Survey and conduct 10× cross-validation to evaluate the results. We present a method using a GAN trained on galaxy images that can recover features from artificially degraded images with worse seeing and higher noise than the original with a performance that far exceeds simple deconvolution. The ability to better recover detailed features such as galaxy morphology from low signal to noise and low angular resolution imaging data significantly increases our ability to study existing data sets of astrophysical objects as well as future observations with observatories such as the Large Synoptic Sky Telescope (LSST) and the Hubble and James Webb space telescopes.

  13. Generative Adversarial Networks Based Heterogeneous Data Integration and Its Application for Intelligent Power Distribution and Utilization

    Directory of Open Access Journals (Sweden)

    Yuanpeng Tan

    2018-01-01

    Full Text Available Heterogeneous characteristics of a big data system for intelligent power distribution and utilization have already become more and more prominent, which brings new challenges for the traditional data analysis technologies and restricts the comprehensive management of distribution network assets. In order to solve the problem that heterogeneous data resources of power distribution systems are difficult to be effectively utilized, a novel generative adversarial networks (GANs based heterogeneous data integration method for intelligent power distribution and utilization is proposed. In the proposed method, GANs theory is introduced to expand the distribution of completed data samples. Then, a so-called peak clustering algorithm is proposed to realize the finite open coverage of the expanded sample space, and repair those incomplete samples to eliminate the heterogeneous characteristics. Finally, in order to realize the integration of the heterogeneous data for intelligent power distribution and utilization, the well-trained discriminator model of GANs is employed to check the restored data samples. The simulation experiments verified the validity and stability of the proposed heterogeneous data integration method, which provides a novel perspective for the further data quality management of power distribution systems.

  14. On-line diagnosis and recovery of adversary attack using logic flowgraph methodology simulation

    International Nuclear Information System (INIS)

    Guarro, S.B.

    1986-01-01

    The Logic Flowgraph Methodology (LFM) allows the construction of special graph models for simulation of complex processes of causality, including feedback loops and sequential effects. Among the most notable features of LFM is the formal inclusion in its models of causality conditioning by logic switches imbedded in the modeled process, such as faults or modes of operation. The LFM model of a process is a graph structure that captures, in one synthetic representation, the relevant success and fault space characterization of that process. LFM is very similar to an artificial intelligence expert system shell. To illustrate the utilization of LFM, an application to the assessment and on-line monitoring of a material control facility is presented. The LFM models are used to model adversary action and control response, and to generate mini-diagnostic and recovery trees in real time, as well as reliability tress for off-line evaluation. Although the case study presented is for an imaginary facility, most of the conceptual elements that would be present in a real application have been retained in order to highlight the features and capabilities of the methodology

  15. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.

    Science.gov (United States)

    Brubaker, Chad; Jana, Suman; Ray, Baishakhi; Khurshid, Sarfraz; Shmatikov, Vitaly

    2014-01-01

    Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded devices, and all of secure Web rely on SSL/TLS for protection against network attacks. This protection critically depends on whether SSL/TLS clients correctly validate X.509 certificates presented by servers during the SSL/TLS handshake protocol. We design, implement, and apply the first methodology for large-scale testing of certificate validation logic in SSL/TLS implementations. Our first ingredient is "frankencerts," synthetic certificates that are randomly mutated from parts of real certificates and thus include unusual combinations of extensions and constraints. Our second ingredient is differential testing: if one SSL/TLS implementation accepts a certificate while another rejects the same certificate, we use the discrepancy as an oracle for finding flaws in individual implementations. Differential testing with frankencerts uncovered 208 discrepancies between popular SSL/TLS implementations such as OpenSSL, NSS, CyaSSL, GnuTLS, PolarSSL, MatrixSSL, etc. Many of them are caused by serious security vulnerabilities. For example, any server with a valid X.509 version 1 certificate can act as a rogue certificate authority and issue fake certificates for any domain, enabling man-in-the-middle attacks against MatrixSSL and GnuTLS. Several implementations also accept certificate authorities created by unauthorized issuers, as well as certificates not intended for server authentication. We also found serious vulnerabilities in how users are warned about certificate validation errors. When presented with an expired, self-signed certificate, NSS, Safari, and Chrome (on Linux) report that the certificate has expired-a low-risk, often ignored error-but not that the connection is insecure against a man-in-the-middle attack. These results demonstrate that automated adversarial testing with frankencerts

  16. Training-Image Based Geostatistical Inversion Using a Spatial Generative Adversarial Neural Network

    Science.gov (United States)

    Laloy, Eric; Hérault, Romain; Jacques, Diederik; Linde, Niklas

    2018-01-01

    Probabilistic inversion within a multiple-point statistics framework is often computationally prohibitive for high-dimensional problems. To partly address this, we introduce and evaluate a new training-image based inversion approach for complex geologic media. Our approach relies on a deep neural network of the generative adversarial network (GAN) type. After training using a training image (TI), our proposed spatial GAN (SGAN) can quickly generate 2-D and 3-D unconditional realizations. A key characteristic of our SGAN is that it defines a (very) low-dimensional parameterization, thereby allowing for efficient probabilistic inversion using state-of-the-art Markov chain Monte Carlo (MCMC) methods. In addition, available direct conditioning data can be incorporated within the inversion. Several 2-D and 3-D categorical TIs are first used to analyze the performance of our SGAN for unconditional geostatistical simulation. Training our deep network can take several hours. After training, realizations containing a few millions of pixels/voxels can be produced in a matter of seconds. This makes it especially useful for simulating many thousands of realizations (e.g., for MCMC inversion) as the relative cost of the training per realization diminishes with the considered number of realizations. Synthetic inversion case studies involving 2-D steady state flow and 3-D transient hydraulic tomography with and without direct conditioning data are used to illustrate the effectiveness of our proposed SGAN-based inversion. For the 2-D case, the inversion rapidly explores the posterior model distribution. For the 3-D case, the inversion recovers model realizations that fit the data close to the target level and visually resemble the true model well.

  17. On charge-3 cyclic monopoles

    International Nuclear Information System (INIS)

    Braden, H W; D'Avanzo, Antonella; Enolski, V Z

    2011-01-01

    We determine the spectral curve of charge-3 BPS su(2) monopoles with C 3 cyclic symmetry. The symmetry means that the genus 4 spectral curve covers a (Toda) spectral curve of genus 2. A well adapted homology basis is presented enabling the theta functions and monopole data of the genus 4 curve to be given in terms of genus 2 data. The Richelot correspondence, a generalization of the arithmetic mean, is used to solve for this genus 2 curve. Results of other approaches are compared

  18. On numerically pluricanonical cyclic coverings

    International Nuclear Information System (INIS)

    Kulikov, V S; Kharlamov, V M

    2014-01-01

    We investigate some properties of cyclic coverings f:Y→X (where X is a complex surface of general type) branched along smooth curves B⊂X that are numerically equivalent to a multiple of the canonical class of X. Our main results concern coverings of surfaces of general type with p g =0 and Miyaoka-Yau surfaces. In particular, such coverings provide new examples of multi-component moduli spaces of surfaces with given Chern numbers and new examples of surfaces that are not deformation equivalent to their complex conjugates

  19. Cyclic graphs and Apery's theorem

    International Nuclear Information System (INIS)

    Sorokin, V N

    2002-01-01

    This is a survey of results about the behaviour of Hermite-Pade approximants for graphs of Markov functions, and a survey of interpolation problems leading to Apery's result about the irrationality of the value ζ(3) of the Riemann zeta function. The first example is given of a cyclic graph for which the Hermite-Pade problem leads to Apery's theorem. Explicit formulae for solutions are obtained, namely, Rodrigues' formulae and integral representations. The asymptotic behaviour of the approximants is studied, and recurrence formulae are found

  20. A system for cyclical voltametry

    International Nuclear Information System (INIS)

    Silva, R.P. da; Chierice, G.O.

    1974-01-01

    The constrution of a system composed by two instruments, voltametric circuit and potenciostate is depicted. Both instruments junction joined so that the voltametric circuit works as a triangular pulse generator, capable of operating with independent ascendant and descendant slope change, with unique pulse of continuous regime. The circuit of the potenciostate is composed of an amplifier with high entrance impedance and capable of supplying relatively high currents at the exit. The equipment was tested to study the aqueous Pb 2+ system in mercury electrode. this system depicted for the cyclical-voltometry technique set in use at I.E.A., Sao Paulo (Brazil), has very good linearity

  1. Cyclic AMP in rat pancreatic islets

    International Nuclear Information System (INIS)

    Grill, V.; Borglund, E.; Cerasi, E.; Uppsala Univ.

    1977-01-01

    The incorporation of [ 3 H]adenine into cyclic AMP was studied in rat pancreatic islets under varying conditions of labeling. Prolonging the exposure to [ 3 H]adenine progressively augmented the islet cyclic [ 3 H]AMP level. Islets labeled for different periods of time and subsequently incubated (without adenine) in the presence of D-glucose or cholera toxin showed stimulations of intra-islet cyclic [ 3 H]AMP that were proportionate to the levels of radioactive nucleotide present under non-stimulatory conditions. Labeling the islets in a high glucose concentration (27.7 mM) did not modify the nucleotide responses to glucose or cholera toxin. The specific activity of cyclic [ 3 H]AMP, determined by simultaneous assay of cyclic [ 3 H]AMP and total cyclic AMP, was not influenced by glucose or cholera toxin. Glucose had no effect on the specific activity of labeled ATP

  2. Plasma-focused cyclic accelerators

    International Nuclear Information System (INIS)

    Mondelli, A.A.; Chernin, D.P.

    1985-01-01

    The use of ambient plasma to neutralize the transverse forces of an intense particle beam has been known for many years. Most recently, the so-called ion-focused regime (IFR) for beam propagation has been used as a means of focusing intense electron beams in linear accelerators and suggested for injecting an electron beam across magnetic field lines into a high-current cyclic accelerator. One technique for generating the required background plasma for IFR propagation is to use a laser to ionize ambient gas in the accelerator chamber. For cyclic accelerators a technique is required for carrying the plasma channel and the beam around a bend. Multiple laser-generated channels with dipole magnetic fields to switch the beam from one channel to the next have been tested at Sandia. This paper discusses an alternative means of plasma production for IFR, viz. by using rf breakdown. For this approach the accelerator chamber acts as a waveguide. With a suitable driving frequency, a waveguide mode can be driven which has its peak field intensity on the axis with negligible fields at the chamber walls. The plasma production and hence the beam propagation is thereby isolated from the walls. This technique is not limited to toroidal accelerators. It may be applied to any accelerator or recirculator geometry as well as for beam steering and for injection or extraction of beams in closed accelerator configurations

  3. Cyclic Vomiting Syndrome in Children

    Directory of Open Access Journals (Sweden)

    T.V. Sorokman

    2016-08-01

    Full Text Available Introduction. Cyclic vomiting syndrome (CVS — is a fairly common disease of unknown etiology that affects children of all age groups and sometimes adult population and refers to the functional disorders of the gastrointestinal tract. Objective: to evaluate the effectiveness of the usage of Rehydron Optim for oral rehydration therapy in children. Materials and methods. The treatment of 40 children aged 3 to 11 years with CVS (15 persons and primary acetonemic syndrome (25 persons in the period of acetonemic crisis, including 15 boys and 25 girls, was analyzed. All children were observed in the outpatient department of the Regional children’s hospital of Chernivtsi. Diagnosis was established based on anamnesis, clinical and laboratory data. Patients underwent required clinico-biological tests and instrumental examinations. The dynamics of the following syndromes was investigated: pain, vomiting, dehydration and intoxication. Rehydration therapy in all cases was oral with the usage of Rehydron Optim. Results of the study and their discussion. A cyclical vomiting was observed in children with primary acetonemic syndrome with satisfactory condition in attack-free period. Migraine-like headaches prevailed in 36 patients (80 %, and the age of these patients was older than 7 years. Same children had episodes of paroxysmal autonomic failure. Almost all surveyed children had in their family history the risk factors for CVS development. All children had positive dynamics of the main basic clinical manifestations on the background of oral rehydration therapy using Rehydron Optim. Within the 1st day of oral rehydration therapy with Rehydron Optim in children, we have noted a significant decrease in the incidence of lethargy, vomiting, spastic abdominal pain, smell of acetone in the exhaled air (p < 0.05. In children with the I degree of dehydration, clinical signs of dehydration were not seen before the treatment, and children with the II degree had an

  4. [Cyclic Cushing's Syndrome - rare or rarely recognized].

    Science.gov (United States)

    Kiałka, Marta; Doroszewska, Katarzyna; Mrozińska, Sandra; Milewicz, Tomasz; Stochmal, Ewa

    2015-01-01

    Cyclic Cushing's syndrome is a type of Cushing's disease which is characterized by alternating periods of increasing and decreasing levels of cortisol in the blood. The diagnostic criteria for cyclic Cushing's syndrome are at least three periods of hypercortisolism alternating with at least two episodes of normal levels of serum cortisol concentration. The epidemiology, signs, symptoms, pathogenesis and treatment of cyclic Cushing's syndrome have been discussed.

  5. Modeling Cyclic Variation of Intracranial Pressure

    National Research Council Canada - National Science Library

    Daley, M

    2001-01-01

    ...) recording during mechanical ventilation are due to cyclic extravascular compressional modulation primarily of the cerebral venous bed, an established isovolumetric model of cerebrospinal fluid...

  6. Behaviour of Cohesionless Soils During Cyclic Loading

    DEFF Research Database (Denmark)

    Shajarati, Amir; Sørensen, Kris Wessel; Nielsen, Søren Kjær

    Offshore wind turbine foundations are typically subjected to cyclic loading from both wind and waves, which can lead to unacceptable deformations in the soil. However, no generally accepted standardised method is currently available, when accounting for cyclic loading during the design of offshore...... wind turbine foundations. Therefore a literature study is performed in order to investigate existing research treating the behaviour of cohesionless soils, when subjected to cyclic loading. The behaviour of a soil subjected to cyclic loading is found to be dependent on; the relative density, mean...

  7. Cyclical subnormal separation in A-groups

    International Nuclear Information System (INIS)

    Makarfi, M.U.

    1995-12-01

    Three main results, concerning A-groups in respect of cyclical subnormal separation as defined in, are presented. It is shown in theorem A that any A-group that is generated by elements of prime order and satisfying the cyclical subnormal separation conditions is metabelian. The two other main results give necessary and sufficient conditions for A-groups, that are split extensions of certain abelian p-groups by a metabelian p'-group, to satisfy the cyclical subnormal separation condition. There is also a result which shows that A-groups with elementary abelian Sylow subgroups are cyclically separated as defined. (author). 7 refs

  8. Modeling urbanization patterns at a global scale with generative adversarial networks

    Science.gov (United States)

    Albert, A. T.; Strano, E.; Gonzalez, M.

    2017-12-01

    Current demographic projections show that, in the next 30 years, global population growth will mostly take place in developing countries. Coupled with a decrease in density, such population growth could potentially double the land occupied by settlements by 2050. The lack of reliable and globally consistent socio-demographic data, coupled with the limited predictive performance underlying traditional urban spatial explicit models, call for developing better predictive methods, calibrated using a globally-consistent dataset. Thus, richer models of the spatial interplay between the urban built-up land, population distribution and energy use are central to the discussion around the expansion and development of cities, and their impact on the environment in the context of a changing climate. In this talk we discuss methods for, and present an analysis of, urban form, defined as the spatial distribution of macroeconomic quantities that characterize a city, using modern machine learning methods and best-available remote-sensing data for the world's largest 25,000 cities. We first show that these cities may be described by a small set of patterns in radial building density, nighttime luminosity, and population density, which highlight, to first order, differences in development and land use across the world. We observe significant, spatially-dependent variance around these typical patterns, which would be difficult to model using traditional statistical methods. We take a first step in addressing this challenge by developing CityGAN, a conditional generative adversarial network model for simulating realistic urban forms. To guide learning and measure the quality of the simulated synthetic cities, we develop a specialized loss function for GAN optimization that incorporates standard spatial statistics used by urban analysis experts. Our framework is a stark departure from both the standard physics-based approaches in the literature (that view urban forms as fractals with a

  9. Local cyclic deformation behavior and microstructure of railway wheel materials

    International Nuclear Information System (INIS)

    Walther, F.; Eifler, D.

    2004-01-01

    The current investigations concentrate on the relation between the loading and environmental conditions, the local microstructure and the fatigue behavior of highly stressed railway wheel and tire steels. Experiments under stress control and total strain control were performed at ambient temperature with servohydraulic testing systems. Superimposed mean loadings allow an evaluation of cyclic creep and mean stress relaxation effects. Strain, temperature and electrical measuring techniques were used to characterize the cyclic deformation behavior of specimens from different depth positions of the cross-sections of UIC-specified wheel components (UIC: International Railway Union). The measured values show a strong interrelation. The microstructural characterization of the different material conditions was done by light and scanning electron microscopy together with digital image processing

  10. Plasma-focused cyclic accelerators

    International Nuclear Information System (INIS)

    Mondelli, A.A.; Chernin, D.P.

    1985-01-01

    The use of ambient plasma to neutralize the transverse forces of an intense particle beam has been known for many years. Most recently, the so-called ion-focused regime (IFR) for beam propagation has been used as a means of focusing intense electron beams in linear accelerators and suggested for injecting an electron beam across magnetic field lines into a high-current cyclic accelerator. One technique for generating the required background plasma for IFR propagation is to use a laser to ionize ambient gas in the accelerator chamber. This paper discusses an alternative means of plasma production for IFR, viz. by using RF breakdown. For this approach the accelerator chamber acts as a waveguide. This technique is not limited to toroidal accelerators. It may be applied to any accelerator or recirculator geometry as well as for beam steering and for injection or extraction of beams in closed accelerator configurations

  11. Cyclic creep-rupture behavior of three high-temperature alloys.

    Science.gov (United States)

    Halford, G. R.

    1972-01-01

    Study of some important characteristics of the cyclic creep-rupture curves for the titanium alloy 6Al-2Sn-4Zr-2Mo at 900 and 1100 F (755 and 865 K), the cobalt-base alloy L-605 at 1180 F (910 K), and for two hardness levels of 316 stainless steel at 1300 F (980 K). The cyclic creep-rupture curve relates tensile stress and tensile time-to-rupture for strain-limited cyclic loading and has been found to be independent of the total strain range and the level of compressive stress employed in the cyclic creep-rupture tests. The cyclic creep-rupture curve was always found to be above and to the right of the conventional (constant load) monotonic creep-rupture curve by factors ranging from 2 to 10 in time-to-rupture. This factor tends to be greatest when the creep ductility is large. Cyclic creep acceleration was observed in every cyclic creep-rupture test conducted. The phenomenon was most pronounced at the highest stress levels and when the tensile and compressive stresses were completely reversed. In general, creep rates were found to be lower in compression than in tension for equal true stresses. The differences, however, were strongly material-dependent.

  12. Interuniversal entanglement in a cyclic multiverse

    Science.gov (United States)

    Robles-Pérez, Salvador; Balcerzak, Adam; Dąbrowski, Mariusz P.; Krämer, Manuel

    2017-04-01

    We study scenarios of parallel cyclic multiverses which allow for a different evolution of the physical constants, while having the same geometry. These universes are classically disconnected, but quantum-mechanically entangled. Applying the thermodynamics of entanglement, we calculate the temperature and the entropy of entanglement. It emerges that the entropy of entanglement is large at big bang and big crunch singularities of the parallel universes as well as at the maxima of the expansion of these universes. The latter seems to confirm earlier studies that quantum effects are strong at turning points of the evolution of the universe performed in the context of the timeless nature of the Wheeler-DeWitt equation and decoherence. On the other hand, the entropy of entanglement at big rip singularities is going to zero despite its presumably quantum nature. This may be an effect of total dissociation of the universe structures into infinitely separated patches violating the null energy condition. However, the temperature of entanglement is large/infinite at every classically singular point and at maximum expansion and seems to be a better measure of quantumness.

  13. Cyclic completion of the anamorphic universe

    Science.gov (United States)

    Ijjas, Anna

    2018-04-01

    Cyclic models of the universe have the advantage of avoiding initial conditions problems related to postulating any sort of beginning in time. To date, the best known viable examples of cyclic models have been ekpyrotic. In this paper, we show that the recently proposed anamorphic scenario can also be made cyclic. The key to the cyclic completion is a classically stable, non-singular bounce. Remarkably, even though the bounce construction was originally developed to connect a period of contraction with a period of expansion both described by Einstein gravity, we show here that it can naturally be modified to connect an ordinary contracting phase described by Einstein gravity with a phase of anamorphic smoothing. The paper will present the basic principles and steps in constructing cyclic anamorphic models.

  14. Detection of Cyclic Dinucleotides by STING.

    Science.gov (United States)

    Du, Xiao-Xia; Su, Xiao-Dong

    2017-01-01

    STING (stimulator of interferon genes) is an essential signaling adaptor protein mediating cytosolic DNA-induced innate immunity for both microbial invasion and self-DNA leakage. STING is also a direct receptor for cytosolic cyclic dinucleotides (CDNs), including the microbial secondary messengers c-di-GMP (3',3'-cyclic di-GMP), 3',3'cGAMP (3',3'-cyclic GMP-AMP), and mammalian endogenous 2',3'cGAMP (2',3'-cyclic GMP-AMP) synthesized by cGAS (cyclic GMP-AMP synthase). Upon CDN binding, STING undergoes a conformational change to enable signal transduction by phosphorylation and finally to active IRF3 (Interferon regulatory factor 3) for type I interferon production. Here, we describe some experimental procedures such as Isothermal Titration Calorimetry and luciferase reporter assays to study the CDNs binding and activity by STING proteins.

  15. Binding of the cyclic AMP receptor protein of Escherichia coli to RNA polymerase.

    Science.gov (United States)

    Pinkney, M; Hoggett, J G

    1988-03-15

    Fluorescence polarization studies were used to study the interaction of a fluorescein-labelled conjugate of the Escherichia coli cyclic AMP receptor protein (F-CRP) and RNA polymerase. Under conditions of physiological ionic strength, F-CRP binds to RNA polymerase holoenzyme in a cyclic AMP-dependent manner; the dissociation constant was about 3 microM in the presence of cyclic AMP and about 100 microM in its absence. Binding to core RNA polymerase under the same conditions was weak (Kdiss. approx. 80-100 microM) and independent of cyclic AMP. Competition experiments established that native CRP and F-CRP compete for the same binding site on RNA polymerase holoenzyme and that the native protein binds about 3 times more strongly than does F-CRP. Analytical ultracentrifuge studies showed that CRP binds predominantly to the monomeric rather than the dimeric form of RNA polymerase.

  16. How to achieve public participation in nuclear waste decisions: Public relations or transparent adversary science

    International Nuclear Information System (INIS)

    Treichel, J.

    1999-01-01

    correctly, are in this case, merely tools being employed to co-opt or buy off the opposition and legitimize the process. It appears at this point that there are two choices: either the decision-makers can attempt to continue with the current program of forced siting, ignoring all citizen and scientific opposition and eventually leading to litigation; or a new program can be developed. Since the US nuclear waste programs have utilized or have been perceived as utilizing advocacy science, the country must add 'adversary science' to the national program. This is described as the providing of financial support for competing teams of experts to investigate, and to tell the public about, any hazards which the enthusiasts of a project may have failed to report, or even to see. If citizens were able to participate in the debate between scientists and experts, with differing opinions concerning the merits of a nuclear waste site or indeed, any controversial technology, they would feel represented. They would believe that the final decisions were made only after the program in question had withstood and overcome all criticism-rather than just ignored it. There is probably no chance that the current US nuclear waste program can succeed in light of the level of public opposition. It is therefore necessary to move to a policy that respects those who must pay the costs and live with its consequences

  17. How to achieve public participation in nuclear waste decisions: Public relations or transparent adversary science

    Energy Technology Data Exchange (ETDEWEB)

    Treichel, J. [Nevada Nuclear Waste Task Force, Las Vegas, NV (United States)

    1999-12-01

    applied correctly, are in this case, merely tools being employed to co-opt or buy off the opposition and legitimize the process. It appears at this point that there are two choices: either the decision-makers can attempt to continue with the current program of forced siting, ignoring all citizen and scientific opposition and eventually leading to litigation; or a new program can be developed. Since the US nuclear waste programs have utilized or have been perceived as utilizing advocacy science, the country must add 'adversary science' to the national program. This is described as the providing of financial support for competing teams of experts to investigate, and to tell the public about, any hazards which the enthusiasts of a project may have failed to report, or even to see. If citizens were able to participate in the debate between scientists and experts, with differing opinions concerning the merits of a nuclear waste site or indeed, any controversial technology, they would feel represented. They would believe that the final decisions were made only after the program in question had withstood and overcome all criticism-rather than just ignored it. There is probably no chance that the current US nuclear waste program can succeed in light of the level of public opposition. It is therefore necessary to move to a policy that respects those who must pay the costs and live with its consequences.

  18. Testing strong interaction theories

    International Nuclear Information System (INIS)

    Ellis, J.

    1979-01-01

    The author discusses possible tests of the current theories of the strong interaction, in particular, quantum chromodynamics. High energy e + e - interactions should provide an excellent means of studying the strong force. (W.D.L.)

  19. Specificity of the Cyclic GMP-Binding Activity and of a Cyclic GMP-Dependent Cyclic GMP Phosphodiesterase in Dictyostelium discoideum

    NARCIS (Netherlands)

    Haastert, Peter J.M. van; Walsum, Hans van; Meer, Rob C. van der; Bulgakov, Roman; Konijn, Theo M.

    1982-01-01

    The nucleotide specificity of the cyclic GMP-binding activity in a homogenate of Dictyostelium discoideum was determined by competition of cyclic GMP derivatives with [8-3H] cyclic GMP for the binding sites. The results indicate that cyclic GMP is bound to the binding proteins by hydrogen bonds at

  20. Cyclic characteristics of earthquake time histories

    International Nuclear Information System (INIS)

    Hall, J.R. Jr; Shukla, D.K.; Kissenpfennig, J.F.

    1977-01-01

    From an engineering standpoint, an earthquake record may be characterized by a number of parameters, one of which is its 'cyclic characteristics'. The cyclic characteristics are most significant in fatigue analysis of structures and liquefaction analysis of soils where, in addition to the peak motion, cyclic buildup is significant. Whereas duration peak amplitude and response spectra for earthquakes have been studied extensively, the cyclic characteristics of earthquake records have not received an equivalent attention. Present procedures to define the cyclic characteristics are generally based upon counting the number of peaks at various amplitude ranges on a record. This paper presents a computer approach which describes a time history by an amplitude envelope and a phase curve. Using Fast Fourier Transform Techniques, an earthquake time history is represented as a projection along the x-axis of a rotating vector-the length the vector is given by the amplitude spectra-and the angle between the vector and x-axis is given by the phase curve. Thus one cycle is completed when the vector makes a full rotation. Based upon Miner's cumulative damage concept, the computer code automatically combines the cycles of various amplitudes to obtain the equivalent number of cycles of a given amplitude. To illustrate the overall results, the cyclic characteristics of several real and synthetic earthquake time histories have been studied and are presented in the paper, with the conclusion that this procedure provides a physical interpretation of the cyclic characteristics of earthquakes. (Auth.)

  1. Effects of complex life cycles on genetic diversity: cyclical parthenogenesis.

    Science.gov (United States)

    Rouger, R; Reichel, K; Malrieu, F; Masson, J P; Stoeckel, S

    2016-11-01

    Neutral patterns of population genetic diversity in species with complex life cycles are difficult to anticipate. Cyclical parthenogenesis (CP), in which organisms undergo several rounds of clonal reproduction followed by a sexual event, is one such life cycle. Many species, including crop pests (aphids), human parasites (trematodes) or models used in evolutionary science (Daphnia), are cyclical parthenogens. It is therefore crucial to understand the impact of such a life cycle on neutral genetic diversity. In this paper, we describe distributions of genetic diversity under conditions of CP with various clonal phase lengths. Using a Markov chain model of CP for a single locus and individual-based simulations for two loci, our analysis first demonstrates that strong departures from full sexuality are observed after only a few generations of clonality. The convergence towards predictions made under conditions of full clonality during the clonal phase depends on the balance between mutations and genetic drift. Second, the sexual event of CP usually resets the genetic diversity at a single locus towards predictions made under full sexuality. However, this single recombination event is insufficient to reshuffle gametic phases towards full-sexuality predictions. Finally, for similar levels of clonality, CP and acyclic partial clonality (wherein a fixed proportion of individuals are clonally produced within each generation) differentially affect the distribution of genetic diversity. Overall, this work provides solid predictions of neutral genetic diversity that may serve as a null model in detecting the action of common evolutionary or demographic processes in cyclical parthenogens (for example, selection or bottlenecks).

  2. The Influence of Cognitive Biases on Court Decisions. Contributions of Legal Psychology to the Adversary Criminal Proceedings

    Directory of Open Access Journals (Sweden)

    Paola Iliana De la Rosa Rodríguez

    2016-06-01

    Full Text Available The purpose of this paper is to disperse among the judiciary and society the psychological procedures involved in the decision-making process of judges since they are not only influenced by law but by previous ideas and values. It is worth questioning: in what extent their personal views and beliefs are the bases of verdicts? How can aversions and public opinion have an impact in the court decision? This paper analyzes and states the differences of the judicial role in the Mexican adversarial system and the inquisitorial models of justice. It also critiques the categories of the judicial officers and presents the circumstances that make an impact on judicial decisions, according to Psychology studies. It finally classifies cognitive biases and concludes that the more knowledge judges have about it, the more imparcial judgments will be.

  3. Cyclic voltammetry and reduction mechanistic studies of ...

    African Journals Online (AJOL)

    styrylpyrylium perchlorates have been evaluated using cyclic voltammetry, in comparison to their non-methylated derivatives values. The reduction peak of all studied compounds remained chemically irreversible. The presence of the ...

  4. A cyclically actuated electrolytic drug delivery device

    KAUST Repository

    Yi, Ying; Buttner, Ulrich; Foulds, Ian G.

    2015-01-01

    This work, focusing on an implantable drug delivery system, presents the first prototype electrolytic pump that combines a catalytic reformer and a cyclically actuated mode. These features improve the release performance and extend the lifetime

  5. Introduction of a cyclic-fermentation method

    Energy Technology Data Exchange (ETDEWEB)

    Makarova, C P

    1958-01-01

    Equipment is described, consisting of 8 kettles, which permits a cyclic fermentation process and continuous ethanol production; 100% yields of ethanol are obtained, based on the starch content in grain.

  6. Results on Cyclic Signal Processing Systems

    National Research Council Canada - National Science Library

    Vaidyanathan, P

    1998-01-01

    .... A number of related problems such as the paraunitary interpolation problem and the cyclic paraunitary factorizability problem can be understood in a unified way by using the realization matrix...

  7. Cyclical Variability of Prominences, CMEs and Flares

    Indian Academy of Sciences (India)

    tribpo

    For many years, qualitative studies were made about the cyclical ... plan to review the more recent research concerning all these topics. Key words. ... are distributed in three narrow zones, which show different types of time-latitude behaviour.

  8. Anodic selective functionalization of cyclic amine derivatives

    OpenAIRE

    Onomura, Osamu

    2012-01-01

    Anodic reactions are desirable methods from the viewpoint of Green Chemistry, since no toxic oxidants are necessary for the oxidation of organic molecules. This review introduces usefulness of anodic oxidation and successive reaction for selective functionalization of cyclic amine derivatives.

  9. Macromolecular Networks Containing Fluorinated Cyclic Moieties

    Science.gov (United States)

    2015-12-12

    Briefing Charts 3. DATES COVERED (From - To) 17 Nov 2015 – 12 Dec 2015 4. TITLE AND SUBTITLE Macromolecular Networks Containing Fluorinated Cyclic... FLUORINATED CYCLIC MOIETIES 12 December 2015 Andrew J. Guenthner,1 Scott T. Iacono,2 Cynthia A. Corley,2 Christopher M. Sahagun,3 Kevin R. Lamison,4...Reinforcements Good Flame, Smoke, & Toxicity Characteristics Low Water Uptake with Near Zero Coefficient of Hygroscopic Expansion ∆ DISTRIBUTION A

  10. The Cyclicality of New Product Introductions

    OpenAIRE

    Kostas Axarloglou

    2003-01-01

    This study analyzes empirically the cyclical nature of the timing of new product introductions in U.S. manufacturing. New product introductions vary more in nonseasonal frequencies than in seasonal frequencies. However, the seasons alone account for only a small part of their total variability with demand factors being much more important. Demand fluctuations account for 35%80% and 17%43%, respectively, of the seasonal and cyclical variability of new product introductions in various industrie...

  11. 3' : 5'-Cyclic AMP-dependent 3'

    NARCIS (Netherlands)

    Mato, José M.; Krens, Frans A.; Haastert, Peter J.M. van; Konijn, Theo M.

    1977-01-01

    Suspensions of 3':5'-cyclic AMP (cAMP)-sensitive cells of Dictyostelium discoideum responded to a cAMP pulse with increased 3':5'-cyclic GMP (cGMP) levels. Under the assay conditions used (2 × 10^8 cells per ml in 10 mM phosphate buffer, pH 6.0) cAMP (5 × 10-8 M final concentration) increased cGMP

  12. The calculation of dissipated work, elastoplastic cyclic stress and cyclic strain in a structure

    International Nuclear Information System (INIS)

    Wang Xucheng; Xie Yihuan.

    1986-01-01

    With the development of the reactor technique, there is being an increasing interest in the calculation of elastoplastic response of a structure to its complex loading. This paper introduces a constitutive relation of a material for discribing unloading property, and uses it in an analysis of a real structure under a cyclic loading. The results, which include cyclic stress, cyclic strain and dissipated work, are meaningful in the researches of the structure behavior under complex loading and of the structural safety

  13. Coping with cyclic oxygen availability: evolutionary aspects.

    Science.gov (United States)

    Flück, Martin; Webster, Keith A; Graham, Jeffrey; Giomi, Folco; Gerlach, Frank; Schmitz, Anke

    2007-10-01

    Both the gradual rise in atmospheric oxygen over the Proterozoic Eon as well as episodic fluctuations in oxygen over several million-year time spans during the Phanerozoic Era, have arguably exerted strong selective forces on cellular and organismic respiratory specialization and evolution. The rise in atmospheric oxygen, some 2 billion years after the origin of life, dramatically altered cell biology and set the stage for the appearance of multicelluar life forms in the Vendian (Ediacaran) Period of the Neoproterozoic Era. Over much of the Paleozoic, the level of oxygen in the atmosphere was near the present atmospheric level (21%). In the Late Paleozoic, however, there were extended times during which the level of atmospheric oxygen was either markedly lower or markedly higher than 21%. That these Paleozoic shifts in atmospheric oxygen affected the biota is suggested by the correlations between: (1) Reduced oxygen and the occurrences of extinctions, a lowered biodiversity and shifts in phyletic succession, and (2) During hyperoxia, the corresponding occurrence of phenomena such as arthropod gigantism, the origin of insect flight, and the evolution of vertebrate terrestriality. Basic similarities in features of adaptation to hyopoxia, manifest in living organisms at levels ranging from genetic and cellular to physiological and behavioral, suggest the common and early origin of a suite of adaptive mechanisms responsive to fluctuations in ambient oxygen. Comparative integrative approaches addressing the molecular bases of phenotypic adjustments to cyclic oxygen fluctuation provide broad insight into the incremental steps leading to the early evolution of homeostatic respiratory mechanisms and to the specialization of organismic respiratory function.

  14. Abortion: Strong's counterexamples fail

    DEFF Research Database (Denmark)

    Di Nucci, Ezio

    2009-01-01

    This paper shows that the counterexamples proposed by Strong in 2008 in the Journal of Medical Ethics to Marquis's argument against abortion fail. Strong's basic idea is that there are cases--for example, terminally ill patients--where killing an adult human being is prima facie seriously morally...

  15. Strong Langmuir turbulence

    International Nuclear Information System (INIS)

    Goldman, M.V.

    1984-01-01

    After a brief discussion of beam-excited Langmuir turbulence in the solar wind, we explain the criteria for wave-particle, three-wave and strong turbulence interactions. We then present the results of a numerical integration of the Zakharov equations, which describe the strong turbulence saturation of a weak (low-density) high energy, bump-on-tail beam instability. (author)

  16. 21 CFR 862.1230 - Cyclic AMP test system.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Cyclic AMP test system. 862.1230 Section 862.1230....1230 Cyclic AMP test system. (a) Identification. A cyclic AMP test system is a device intended to measure the level of adenosine 3′, 5′-monophosphate (cyclic AMP) in plasma, urine, and other body fluids...

  17. Oligo cyclic plastic fatigue of Zircaloy-4 under vacuum and in iodinated methanol; Fatigue plastique oligocyclique du Zircaloy-4 sous vide et dans le methanol iode

    Energy Technology Data Exchange (ETDEWEB)

    Beloucif, A.

    1995-01-01

    Our study was bound to the Zircaloy-4 fuel can damage in PWR type reactors. The topic was the damage mechanisms of Zircaloy-4 by oligo-cyclic plastic fatigue in inert atmosphere and in iodinated methanol. The oligo-cyclic plastic fatigue tests, under vacuum, were performed with steady plastic deformation and deformation speed. The corrosion fatigue tests in iodinated methanol put to the fore one obvious harmful part of iodine on Zircaloy-4 resistance to cyclic solicitations. The observations proved the existence of a very strong synergic effect between cyclic mechanical damage and corrosion. (MML). 84 refs., 117 figs., 3 tabs.

  18. Strong intrinsic motivation

    OpenAIRE

    Dessi, Roberta; Rustichini, Aldo

    2015-01-01

    A large literature in psychology, and more recently in economics, has argued that monetary rewards can reduce intrinsic motivation. We investigate whether the negative impact persists when intrinsic motivation is strong, and test this hypothesis experimentally focusing on the motivation to undertake interesting and challenging tasks, informative about individual ability. We find that this type of task can generate strong intrinsic motivation, that is impervious to the effect of monetary incen...

  19. Bitcoin Meets Strong Consistency

    OpenAIRE

    Decker, Christian; Seidel, Jochen; Wattenhofer, Roger

    2014-01-01

    The Bitcoin system only provides eventual consistency. For everyday life, the time to confirm a Bitcoin transaction is prohibitively slow. In this paper we propose a new system, built on the Bitcoin blockchain, which enables strong consistency. Our system, PeerCensus, acts as a certification authority, manages peer identities in a peer-to-peer network, and ultimately enhances Bitcoin and similar systems with strong consistency. Our extensive analysis shows that PeerCensus is in a secure state...

  20. Strong gravity and supersymmetry

    International Nuclear Information System (INIS)

    Chamseddine, Ali H.; Salam, A.; Strathdee, J.

    1977-11-01

    A supersymmetric theory is constructed for a strong f plus a weak g graviton, together with their accompanying massive gravitinos, by gaugin the gradel 0Sp(2,2,1)x 0Sp(2,2,1) structure. The mixing term between f and g fields, which makes the strong graviton massive, can be introduced through a spontaneous symmetry-breaking mechanism implemented in this note by constructing a non-linear realization of the symmetry group

  1. Cyclic transformation of orbital angular momentum modes

    International Nuclear Information System (INIS)

    Schlederer, Florian; Krenn, Mario; Fickler, Robert; Malik, Mehul; Zeilinger, Anton

    2016-01-01

    The spatial modes of photons are one realization of a QuDit, a quantum system that is described in a D-dimensional Hilbert space. In order to perform quantum information tasks with QuDits, a general class of D-dimensional unitary transformations is needed. Among these, cyclic transformations are an important special case required in many high-dimensional quantum communication protocols. In this paper, we experimentally demonstrate a cyclic transformation in the high-dimensional space of photonic orbital angular momentum (OAM). Using simple linear optical components, we show a successful four-fold cyclic transformation of OAM modes. Interestingly, our experimental setup was found by a computer algorithm. In addition to the four-cyclic transformation, the algorithm also found extensions to higher-dimensional cycles in a hybrid space of OAM and polarization. Besides being useful for quantum cryptography with QuDits, cyclic transformations are key for the experimental production of high-dimensional maximally entangled Bell-states. (paper)

  2. On the equivalence of cyclic and quasi-cyclic codes over finite fields

    Directory of Open Access Journals (Sweden)

    Kenza Guenda

    2017-07-01

    Full Text Available This paper studies the equivalence problem for cyclic codes of length $p^r$ and quasi-cyclic codes of length $p^rl$. In particular, we generalize the results of Huffman, Job, and Pless (J. Combin. Theory. A, 62, 183--215, 1993, who considered the special case $p^2$. This is achieved by explicitly giving the permutations by which two cyclic codes of prime power length are equivalent. This allows us to obtain an algorithm which solves the problem of equivalency for cyclic codes of length $p^r$ in polynomial time. Further, we characterize the set by which two quasi-cyclic codes of length $p^rl$ can be equivalent, and prove that the affine group is one of its subsets.

  3. druGAN: An Advanced Generative Adversarial Autoencoder Model for de Novo Generation of New Molecules with Desired Molecular Properties in Silico.

    Science.gov (United States)

    Kadurin, Artur; Nikolenko, Sergey; Khrabrov, Kuzma; Aliper, Alex; Zhavoronkov, Alex

    2017-09-05

    Deep generative adversarial networks (GANs) are the emerging technology in drug discovery and biomarker development. In our recent work, we demonstrated a proof-of-concept of implementing deep generative adversarial autoencoder (AAE) to identify new molecular fingerprints with predefined anticancer properties. Another popular generative model is the variational autoencoder (VAE), which is based on deep neural architectures. In this work, we developed an advanced AAE model for molecular feature extraction problems, and demonstrated its advantages compared to VAE in terms of (a) adjustability in generating molecular fingerprints; (b) capacity of processing very large molecular data sets; and (c) efficiency in unsupervised pretraining for regression model. Our results suggest that the proposed AAE model significantly enhances the capacity and efficiency of development of the new molecules with specific anticancer properties using the deep generative models.

  4. HOST liner cyclic facilities: Facility description

    Science.gov (United States)

    Schultz, D.

    1982-01-01

    A quartz lamp box, a quartz lamp annular rig, and a low pressure liner cyclic can rig planned for liner cyclic tests are described. Special test instrumentation includes an IR-TV camera system for measuring liner cold side temperatures, thin film thermocouples for measuring liner hot side temperatures, and laser and high temperature strain gages for obtaining local strain measurements. A plate temperature of 2,000 F was obtained in an initial test of an apparatus with three quartz lamps. Lamp life, however, appeared to be limited for the standard commercial quartz lamps available. The design of vitiated and nonvitiated preheaters required for the quartz lamp annular rig and the cyclic can test rigs is underway.

  5. Cyclic cellular automata in 3D

    International Nuclear Information System (INIS)

    Reiter, Clifford A.

    2011-01-01

    Highlights: → We explore the self-organization of cyclic cellular automata in 3D. → Von Neumann, Moore and two types of intermediate neighborhoods are investigated. → Random neighborhoods self organize through phases into complex nested structures. → Demons are seen to have many alternatives in 3D. - Abstract: Cyclic cellular automata in two dimensions have long been intriguing because they self organize into spirals and that behavior can be analyzed. The form for the patterns that develop is highly dependent upon the form of the neighborhood. We extend this work to three dimensional cyclic cellular automata and observe self organization dependent upon the neighborhood type. This includes neighborhood types intermediate between Von Neumann and Moore neighborhoods. We also observe that the patterns include nested shells with the appropriate forms but that the nesting is far more complex than the spirals that occur in two dimensions.

  6. Holographic entanglement entropy and cyclic cosmology

    Science.gov (United States)

    Frampton, Paul H.

    2018-06-01

    We discuss a cyclic cosmology in which the visible universe, or introverse, is all that is accessible to an observer while the extroverse represents the total spacetime originating from the time when the dark energy began to dominate. It is argued that entanglement entropy of the introverse is the more appropriate quantity to render infinitely cyclic, rather than the entropy of the total universe. Since vanishing entanglement entropy implies disconnected spacetimes, at the turnaround when the introverse entropy is zero the disconnected extroverse can be jettisoned with impunity.

  7. Entire cyclic cohomology and modular theory

    International Nuclear Information System (INIS)

    Stoytchev, O.Ts.

    1992-04-01

    We display a close relationship between C* and W*-dynamical systems with KMS states on them and entire cyclic cohomology theory. We construct a character form which assigns to each such system (A, α, R) an even entire cyclic cocycle of the subalgebra A of differentiable (with respect to the given automorphism group) elements of A. We argue that the most interesting case is the von Neumann algebra one, where the automorphism group is determined uniquely by the faithful normal state on the algebra (the modular group) and where the character may provide important information about the algebra. (author). 11 refs

  8. Bovine and human lactoferricin peptides: chimeras and new cyclic analogs.

    Science.gov (United States)

    Arias, Mauricio; McDonald, Lindsey J; Haney, Evan F; Nazmi, Kamran; Bolscher, Jan G M; Vogel, Hans J

    2014-10-01

    Lactoferrin (LF) is an important antimicrobial and immune regulatory protein present in neutrophils and most exocrine secretions of mammals. The antimicrobial activity of LF has been related to the presence of an antimicrobial peptide sequence, called lactoferricin (LFcin), located in the N-terminal region of the protein. The antimicrobial activity of bovine LFcin is considerably stronger than the human version. In this work, chimera peptides combining segments of bovine and human LFcin were generated in order to study their antimicrobial activity and mechanism of action. In addition, the relevance of the conserved disulfide bridge and the resulting cyclic structure of both LFcins were analyzed by using "click chemistry" and sortase A-catalyzed cyclization of the peptides. The N-terminal region of bovine LFcin (residues 17-25 of bovine LF) proved to be very important for the antimicrobial activity of the chimera peptides against E. coli, when combined with the C-terminal region of human LFcin. Similarly the cyclic bovine LFcin analogs generated by "click chemistry" and sortase A preserved the antimicrobial activity of the original peptide, showing the significance of these two techniques in the design of cyclic antimicrobial peptides. The mechanism of action of bovine LFcin and its active derived peptides was strongly correlated with membrane leakage in E. coli and up to some extent with the ability to induce vesicle aggregation. This mechanism was also preserved under conditions of high ionic strength (150 mM NaCl) illustrating the importance of these peptides in a more physiologically relevant system.

  9. Mothers' power assertion; children's negative, adversarial orientation; and future behavior problems in low-income families: early maternal responsiveness as a moderator of the developmental cascade.

    Science.gov (United States)

    Kim, Sanghag; Kochanska, Grazyna

    2015-02-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children's negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers' responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children's negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children's behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children's negative, adversarial orientation to future behavior problems was present when mothers' responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  10. Mothers’ Power Assertion, Children’s Negative, Adversarial Orientation, and Future Behavior Problems in Low-Income Families: Early Maternal Responsiveness as a Moderator of the Developmental Cascade

    Science.gov (United States)

    Kim, Sanghag; Kochanska, Grazyna

    2014-01-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children’s negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers’ responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children’s negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children’s behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children’s negative, adversarial orientation to future behavior problems was present when mothers’ responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PMID:25401483

  11. The Adversarial Principle and the5º Paragraph of the Article 307 of the TCE-ES Res. 261/2013

    Directory of Open Access Journals (Sweden)

    Rafael Ambrósio Gava

    2015-12-01

    Full Text Available This paper aims to analyze the implications of the adversarial principle in the administrative process that are judged by the TCE-ES under summary rite. More specifically, we examine if it is possible to judge the process merit without the accused's subpoena. Throughout the study, the characteristics of the Courts of Accounts are explained, according to the doctrine and jurisprudence, as well their prerogative of precautionary action, recognized by the theory of implied powers. In addition, the systematic of the summary procedure, by which develop the processes in which there are precautionary action, is studied, from the specific legislation. At last, the summary procedure is analyzed, specifically with respect to the art. 307, §5º, Res. TCE-ES 261/2013, from the perspective of the adversarial principle, understood, based on the doctrine teaching and according to the New Code of Civil Procedure, as the right of knowledge and of influence the debate. We demonstrated, based on literature and through a deductive argumentative reasoning, that the TEC -ES cannot do disregard the adversarial principle, otherwise there would be violation of this fundamental right.

  12. Strongly interacting Fermi gases

    Directory of Open Access Journals (Sweden)

    Bakr W.

    2013-08-01

    Full Text Available Strongly interacting gases of ultracold fermions have become an amazingly rich test-bed for many-body theories of fermionic matter. Here we present our recent experiments on these systems. Firstly, we discuss high-precision measurements on the thermodynamics of a strongly interacting Fermi gas across the superfluid transition. The onset of superfluidity is directly observed in the compressibility, the chemical potential, the entropy, and the heat capacity. Our measurements provide benchmarks for current many-body theories on strongly interacting fermions. Secondly, we have studied the evolution of fermion pairing from three to two dimensions in these gases, relating to the physics of layered superconductors. In the presence of p-wave interactions, Fermi gases are predicted to display toplogical superfluidity carrying Majorana edge states. Two possible avenues in this direction are discussed, our creation and direct observation of spin-orbit coupling in Fermi gases and the creation of fermionic molecules of 23Na 40K that will feature strong dipolar interactions in their absolute ground state.

  13. A strong comeback

    International Nuclear Information System (INIS)

    Marier, D.

    1992-01-01

    This article presents the results of a financial rankings survey which show a strong economic activity in the independent energy industry. The topics of the article include advisor turnover, overseas banks, and the increase in public offerings. The article identifies the top project finance investors for new projects and restructurings and rankings for lenders

  14. Quantitative damage and detwinning analysis of nanotwinned copper foil under cyclic loading

    International Nuclear Information System (INIS)

    Yoo, Byung-Gil; Boles, Steven T.; Liu, Y.; Zhang, X.; Schwaiger, Ruth; Eberl, Christoph; Kraft, Oliver

    2014-01-01

    High-purity Cu samples containing parallel columns of highly aligned nanotwins with median spacing of ∼25 nm were subjected to tension–compression cyclic loading by a high-throughput cyclic testing method. The methodology utilizes gradients in surface strain amplitude of a vibrating cantilever: one along the beam axis, with decreasing strain from the fixed to the free end of the beam, and the other through the foil thickness with decreasing strain from the surface to the neutral axis. Systematic microstructural investigations indicate that nanotwins are not stable under cyclic loading and that the applied strain amplitude has a strong influence on the resulting twin structure. In the highly stressed regions the detwinning process produces a twin free microstructure, allowing for subsequent extrusion and crack formation, and introduces fatal defects into structural parts

  15. Response of stiff piles in sand to long-term cyclic lateral loading

    DEFF Research Database (Denmark)

    Bakmar, Christian LeBlanc; Houlsby, Guy T.; Byrne, Byron W.

    2010-01-01

    . To address this, a series of laboratory tests were conducted where a stiff pile in drained sand was subjected to between 8000 and 60000 cycles of combined moment and horizontal loading. A typical design for an offshore wind turbine monopile was used as a basis for the study, to ensure that pile dimensions...... and loading ranges were realistic. A complete non-dimensional framework for stiff piles in sand is presented and applied to interpret the test results. The accumulated rotation was found to be dependent on relative density and was strongly affected by the characteristics of the applied cyclic load. The pile...... stiffness increased with number of cycles, which contrasts with the current methodology where static p - y curves are degraded to account for cyclic loading. Methods are presented to predict the change in stiffness and the accumulated rotation of a stiff pile due to long-term cyclic loading. The use...

  16. CaloGAN: Simulating 3D high energy particle showers in multilayer electromagnetic calorimeters with generative adversarial networks

    Science.gov (United States)

    Paganini, Michela; de Oliveira, Luke; Nachman, Benjamin

    2018-01-01

    The precise modeling of subatomic particle interactions and propagation through matter is paramount for the advancement of nuclear and particle physics searches and precision measurements. The most computationally expensive step in the simulation pipeline of a typical experiment at the Large Hadron Collider (LHC) is the detailed modeling of the full complexity of physics processes that govern the motion and evolution of particle showers inside calorimeters. We introduce CaloGAN, a new fast simulation technique based on generative adversarial networks (GANs). We apply these neural networks to the modeling of electromagnetic showers in a longitudinally segmented calorimeter and achieve speedup factors comparable to or better than existing full simulation techniques on CPU (100 ×-1000 × ) and even faster on GPU (up to ˜105× ). There are still challenges for achieving precision across the entire phase space, but our solution can reproduce a variety of geometric shower shape properties of photons, positrons, and charged pions. This represents a significant stepping stone toward a full neural network-based detector simulation that could save significant computing time and enable many analyses now and in the future.

  17. Cyclic Plastic Deformation and Welding Simulation

    NARCIS (Netherlands)

    Ten Horn, C.H.L.J.

    2003-01-01

    One of the concerns of a fitness for purpose analysis is the quantification of the relevant material properties. It is known from experiments that the mechanical properties of a material can change due to a monotonic plastic deformation or a cyclic plastic deformation. For a fitness for purpose

  18. Undrained Cyclic Behaviour of Dense Frederikshavn Sand

    DEFF Research Database (Denmark)

    Nielsen, Søren Kjær; Ibsen, Lars Bo; Sørensen, Kris Wessel

    2013-01-01

    A modified contour diagram is created for the Frederikshavn Sand in the undrained case for a relative density of ID = 80 %. It can be used to estimate the number of cycles to failure for a given combination of pore pressure, average and cyclic load ratio. The diagram is based on a series of undra...

  19. Driving Force Based Design of Cyclic Distillation

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Fjordbak; Huusom, Jakob Kjøbsted; Abildskov, Jens

    2017-01-01

    with mixed phase feeds. A range of binary test cases, benzene toluene, methanol water, and ethanol water, are evaluated. The advantage of the design approach in cyclic distillation is shown to be analogous to the advantages obtained in conventional continuous distillation, including a minimal utility...

  20. Cyclic Cratonic Carbonates and Phanerozoic Calcite Seas.

    Science.gov (United States)

    Wilkinson, Bruce H.

    1982-01-01

    Discusses causes of cyclicity in cratonic carbonate sequences and evidence for and potential significance of postulated primary calcite sediment components in past Paleozoic seas, outlining problems, focusing on models explaining existing data, and identifying background. Future sedimentary geologists will need to address these and related areas…

  1. Hopf Algebroids and Their Cyclic Theory

    NARCIS (Netherlands)

    Kowalzig, N.

    2009-01-01

    The main objective of this thesis is to clarify concepts of generalised symmetries in noncommutative geometry (i.e., the noncommutative analogue of groupoids and Lie algebroids) and their associated (co)homologies. These ideas are incorporated by the notion of Hopf algebroids and Hopf-cyclic

  2. Cyclic viscoelastoplasticity of polypropylene/nanoclay composites

    DEFF Research Database (Denmark)

    Drozdov, A.; Christiansen, Jesper de Claville

    2012-01-01

    Observations are reported on isotactic polypropylene/organically modified nanoclay hybrids with concentrations of filler ranging from 0 to 5 wt.% in cyclic tensile tests with a stress–controlled program (oscillations between various maximum stresses and the zero minimum stress). A pronounced effe...

  3. Breaking antidunes: Cyclic behavior due to hysteresis

    DEFF Research Database (Denmark)

    Deigaard, Rolf

    2006-01-01

    The cyclic behavior of breaking antidunes (growth, breaking of surface wave, obliteration) is investigated by use of a numerical model. The model includes the transition between supercritical and transcritical flow. As the antidune grows the flow becomes transcritical and a hydraulic jump is form...

  4. Inversion of General Cyclic Heptadiagonal Matrices

    Directory of Open Access Journals (Sweden)

    A. A. Karawia

    2013-01-01

    Full Text Available We describe a reliable symbolic computational algorithm for inverting general cyclic heptadiagonal matrices by using parallel computing along with recursion. The computational cost of it is operations. The algorithm is implementable to the Computer Algebra System (CAS such as MAPLE, MATLAB, and MATHEMATICA. Two examples are presented for the sake of illustration.

  5. Cyclic olefin copolymer-silica nanocomposites foams

    Czech Academy of Sciences Publication Activity Database

    Pegoretti, A.; Dorigato, A.; Biani, A.; Šlouf, Miroslav

    2016-01-01

    Roč. 51, č. 8 (2016), s. 3907-3916 ISSN 0022-2461 R&D Projects: GA MŠk(CZ) LO1507 Institutional support: RVO:61389013 Keywords : cyclic olefin copolymer * nanocomposites * silica Subject RIV: CD - Macromolecular Chemistry Impact factor: 2.599, year: 2016

  6. Steady state oxygen reduction and cyclic voltammetry

    DEFF Research Database (Denmark)

    Rossmeisl, Jan; Karlberg, Gustav; Jaramillo, Thomas

    2008-01-01

    The catalytic activity of Pt and Pt3Ni for the oxygen reduction reaction is investigated by applying a Sabatier model based on density functional calculations. We investigate the role of adsorbed OH on the activity, by comparing cyclic voltammetry obtained from theory with previously published ex...

  7. Cyclic deformation mechanisms in a cast gamma titanium aluminide alloy

    International Nuclear Information System (INIS)

    Jouiad, Mustapha; Gloanec, Anne-Lise; Grange, Marjolaine; Henaff, Gilbert

    2005-01-01

    The present study tackles the issue of the identification of the deformation mechanisms governing the cyclic stress-strain behaviour of a cast Ti-48Al-2Cr-2Nb (numbers indicate at.%) with a nearly fully lamellar microstructure. At room temperature, this behaviour and the corresponding deformation mechanisms are shown to be strongly dependent on the applied strain range. Indeed, at low strain range, where almost no hardening is noticed, deformation occurs by motion of long and straight ordinary dislocations. The moderate hardening observed at intermediate values of the strain range is associated with the formation of a vein-like structure due to the progressive tangling of ordinary dislocations. Finally, at higher strain-range values, twinning, by delaying the formation of this vein-like structure, induces a more pronounced cyclic strain hardening. At high temperature (750 deg. C), the material exhibits a rapid saturation of the stress amplitude, regardless of the applied strain range. Transmission electron microscopy indicates that twinning is no longer operative at this temperature, but that dislocation climb is activated

  8. Strong Electroweak Symmetry Breaking

    CERN Document Server

    Grinstein, Benjamin

    2011-01-01

    Models of spontaneous breaking of electroweak symmetry by a strong interaction do not have fine tuning/hierarchy problem. They are conceptually elegant and use the only mechanism of spontaneous breaking of a gauge symmetry that is known to occur in nature. The simplest model, minimal technicolor with extended technicolor interactions, is appealing because one can calculate by scaling up from QCD. But it is ruled out on many counts: inappropriately low quark and lepton masses (or excessive FCNC), bad electroweak data fits, light scalar and vector states, etc. However, nature may not choose the minimal model and then we are stuck: except possibly through lattice simulations, we are unable to compute and test the models. In the LHC era it therefore makes sense to abandon specific models (of strong EW breaking) and concentrate on generic features that may indicate discovery. The Technicolor Straw Man is not a model but a parametrized search strategy inspired by a remarkable generic feature of walking technicolor,...

  9. Plasmons in strong superconductors

    International Nuclear Information System (INIS)

    Baldo, M.; Ducoin, C.

    2011-01-01

    We present a study of the possible plasmon excitations that can occur in systems where strong superconductivity is present. In these systems the plasmon energy is comparable to or smaller than the pairing gap. As a prototype of these systems we consider the proton component of Neutron Star matter just below the crust when electron screening is not taken into account. For the realistic case we consider in detail the different aspects of the elementary excitations when the proton, electron components are considered within the Random-Phase Approximation generalized to the superfluid case, while the influence of the neutron component is considered only at qualitative level. Electron screening plays a major role in modifying the proton spectrum and spectral function. At the same time the electron plasmon is strongly modified and damped by the indirect coupling with the superfluid proton component, even at moderately low values of the gap. The excitation spectrum shows the interplay of the different components and their relevance for each excitation modes. The results are relevant for neutrino physics and thermodynamical processes in neutron stars. If electron screening is neglected, the spectral properties of the proton component show some resemblance with the physical situation in high-T c superconductors, and we briefly discuss similarities and differences in this connection. In a general prospect, the results of the study emphasize the role of Coulomb interaction in strong superconductors.

  10. Experimental Testing of Monopiles in Sand Subjected to One-Way Long-Term Cyclic Lateral Loading

    DEFF Research Database (Denmark)

    Roesen, Hanne Ravn; Ibsen, Lars Bo; Andersen, Lars Vabbersgaard

    2013-01-01

    In the offshore wind turbine industry the most widely used foundation type is the monopile. Due to the wave and wind forces the monopile is subjected to a strong cyclic loading with varying amplitude, maximum loading level, and varying loading period. In this paper the soil–pile interaction...... of a monopile in sand subjected to a long-term cyclic lateral loading is investigated by means of small scale tests. The tests are conducted with a mechanical loading rig capable of applying the cyclic loading as a sine signal with varying amplitude, mean loading level, and loading period for more than 60 000...... cycles. The tests are conducted in dense saturated sand. The maximum moment applied in the cyclic tests is varied from 18% to 36% of the ultimate lateral resistance found in a static loading test. The tests reveal that the accumulated rotation can be expressed by use of a power function. Further, static...

  11. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  12. Identification of cyclic nucleotide gated channels using regular expressions

    KAUST Repository

    Zelman, Alice K.; Dawe, Adam Sean; Berkowitz, Gerald A.

    2013-01-01

    Cyclic nucleotide-gated channels (CNGCs) are nonselective cation channels found in plants, animals, and some bacteria. They have a six-transmembrane/one- pore structure, a cytosolic cyclic nucleotide-binding domain, and a cytosolic calmodulin

  13. Effects of hypokinesia on cyclic nucleotides and hormonal regulation ...

    African Journals Online (AJOL)

    PTH), calcitonin (CT), cyclic nucleotides (cAMP, cGMP) and calcium in the blood of rats, while in urine - phosphate, calcium and cyclic nucleotides. Design: Laboratory based experiment. Setting: Laboratory in the Department of Biochemistry, ...

  14. Rhodium-Catalyzed Dehydrogenative Borylation of Cyclic Alkenes

    Science.gov (United States)

    Kondoh, Azusa; Jamison, Timothy F.

    2010-01-01

    A rhodium-catalyzed dehydrogenative borylation of cyclic alkenes is described. This reaction provides direct access to cyclic 1-alkenylboronic acid pinacol esters, useful intermediates in organic synthesis. Suzuki-Miyaura cross-coupling applications are also presented. PMID:20107646

  15. Cyclic inelastic deformation aspects of fatigue-crack-growth analysis

    Energy Technology Data Exchange (ETDEWEB)

    Leis, B.N.; Zahoor, A.

    1980-01-01

    This paper concentrates on a J-integral analysis of fatigue crack growth. Data on cyclic plasticity are analyzed showing that there are limitations to the usefulness of the deformation theory in applications to cyclic plasticity. 56 refs.

  16. Compressed sensing with cyclic-S Hadamard matrix for terahertz imaging applications

    Science.gov (United States)

    Ermeydan, Esra Şengün; ćankaya, Ilyas

    2018-01-01

    Compressed Sensing (CS) with Cyclic-S Hadamard matrix is proposed for single pixel imaging applications in this study. In single pixel imaging scheme, N = r . c samples should be taken for r×c pixel image where . denotes multiplication. CS is a popular technique claiming that the sparse signals can be reconstructed with samples under Nyquist rate. Therefore to solve the slow data acquisition problem in Terahertz (THz) single pixel imaging, CS is a good candidate. However, changing mask for each measurement is a challenging problem since there is no commercial Spatial Light Modulators (SLM) for THz band yet, therefore circular masks are suggested so that for each measurement one or two column shifting will be enough to change the mask. The CS masks are designed using cyclic-S matrices based on Hadamard transform for 9 × 7 and 15 × 17 pixel images within the framework of this study. The %50 compressed images are reconstructed using total variation based TVAL3 algorithm. Matlab simulations demonstrates that cyclic-S matrices can be used for single pixel imaging based on CS. The circular masks have the advantage to reduce the mechanical SLMs to a single sliding strip, whereas the CS helps to reduce acquisition time and energy since it allows to reconstruct the image from fewer samples.

  17. Cyclic Acetalization of Furfural on Porous Aluminosilicate Acid Catalysts

    Directory of Open Access Journals (Sweden)

    Hartati Hartati

    2016-12-01

    Full Text Available Porous aluminosilicate materials included microporous and mesoporous ZSM-5, hierarchical aluminosilicates, and mesoporous aluminosilicate were tested for acetalization of furfural (furan-2-carbaldehyde with propylene glycol. The existing synthesis methods for aluminosilicate and ZSM-5 were modified to produce aluminosilicate material with hierarchical porous structure. Catalytic activity in acetalization of furfural by propylene glycol were conducted by refluxed of the mixture of furfural, propylene glycol and catalyst, using toluene as solvent and nitrobenzene as internal standard, at 106 °C for 4 h. The result showed that a combination of two structure directing agents, tetrapropylammonium hydroxide (TPAOH and cetyltrimethylammonium bromide (CTAB and modification of catalytic crystallization produced an active aluminosilicate framework that provides a wide access for a bulky reactants and strong acid sites to catalyze the reaction. The pore structure and the strength of the Brønsted acid sites were crucial for the high conversion of furfural to produce a cyclic acetal.

  18. Strongly intensive quantities

    International Nuclear Information System (INIS)

    Gorenstein, M. I.; Gazdzicki, M.

    2011-01-01

    Analysis of fluctuations of hadron production properties in collisions of relativistic particles profits from use of measurable intensive quantities which are independent of system size variations. The first family of such quantities was proposed in 1992; another is introduced in this paper. Furthermore we present a proof of independence of volume fluctuations for quantities from both families within the framework of the grand canonical ensemble. These quantities are referred to as strongly intensive ones. Influence of conservation laws and resonance decays is also discussed.

  19. Strong-coupling approximations

    International Nuclear Information System (INIS)

    Abbott, R.B.

    1984-03-01

    Standard path-integral techniques such as instanton calculations give good answers for weak-coupling problems, but become unreliable for strong-coupling. Here we consider a method of replacing the original potential by a suitably chosen harmonic oscillator potential. Physically this is motivated by the fact that potential barriers below the level of the ground-state energy of a quantum-mechanical system have little effect. Numerically, results are good, both for quantum-mechanical problems and for massive phi 4 field theory in 1 + 1 dimensions. 9 references, 6 figures

  20. Strongly disordered superconductors

    International Nuclear Information System (INIS)

    Muttalib, K.A.

    1982-01-01

    We examine some universal effects of strong non-magnetic disorder on the electron-phonon and electron-electron interactions in a superconductor. In particular we explicitly take into account the effect of slow diffusion of electrons in a disordered medium by working in an exact impurity eigenstate representation. We find that the normal diffusion of electrons characterized by a constant diffusion coefficient does not lead to any significant correction to the electron-phonon or the effective electron-electron interactions in a superconductor. We then consider sufficiently strong disorder where Anderson localization of electrons becomes important and determine the effect of localization on the electron-electron interactions. We find that due to localization, the diffusion of electrons becomes anomalous in the sense that the diffusion coefficient becomes scale dependent. This results in an increase in the effective electron-electron interaction with increasing disorder. We propose that this provides a natural explanation for the unusual sensitivity of the transition temperature T/sub c/ of the high T/sub c/ superconductors (T/sub c/ > 10 0 K) to damage effects

  1. Strong Coupling Holography

    CERN Document Server

    Dvali, Gia

    2009-01-01

    We show that whenever a 4-dimensional theory with N particle species emerges as a consistent low energy description of a 3-brane embedded in an asymptotically-flat (4+d)-dimensional space, the holographic scale of high-dimensional gravity sets the strong coupling scale of the 4D theory. This connection persists in the limit in which gravity can be consistently decoupled. We demonstrate this effect for orbifold planes, as well as for the solitonic branes and string theoretic D-branes. In all cases the emergence of a 4D strong coupling scale from bulk holography is a persistent phenomenon. The effect turns out to be insensitive even to such extreme deformations of the brane action that seemingly shield 4D theory from the bulk gravity effects. A well understood example of such deformation is given by large 4D Einstein term in the 3-brane action, which is known to suppress the strength of 5D gravity at short distances and change the 5D Newton's law into the four-dimensional one. Nevertheless, we observe that the ...

  2. Cyclic Soft Groups and Their Applications on Groups

    Directory of Open Access Journals (Sweden)

    Hacı Aktaş

    2014-01-01

    Full Text Available In crisp environment the notions of order of group and cyclic group are well known due to many applications. In this paper, we introduce order of the soft groups, power of the soft sets, power of the soft groups, and cyclic soft group on a group. We also investigate the relationship between cyclic soft groups and classical groups.

  3. Cyclic Nucleotide Signalling in Kidney Fibrosis

    Directory of Open Access Journals (Sweden)

    Elisabeth Schinner

    2015-01-01

    Full Text Available Kidney fibrosis is an important factor for the progression of kidney diseases, e.g., diabetes mellitus induced kidney failure, glomerulosclerosis and nephritis resulting in chronic kidney disease or end-stage renal disease. Cyclic adenosine monophosphate (cAMP and cyclic guanosine monophosphate (cGMP were implicated to suppress several of the above mentioned renal diseases. In this review article, identified effects and mechanisms of cGMP and cAMP regarding renal fibrosis are summarized. These mechanisms include several signalling pathways of nitric oxide/ANP/guanylyl cyclases/cGMP-dependent protein kinase and cAMP/Epac/adenylyl cyclases/cAMP-dependent protein kinase. Furthermore, diverse possible drugs activating these pathways are discussed. From these diverse mechanisms it is expected that new pharmacological treatments will evolve for the therapy or even prevention of kidney failure.

  4. A cyclic symmetry principle in physics

    International Nuclear Information System (INIS)

    Green, H.S.; Adelaide Univ., SA

    1994-01-01

    Many areas of modern physics are illuminated by the application of a symmetry principle, requiring the invariance of the relevant laws of physics under a group of transformations. This paper examines the implications and some of the applications of the principle of cyclic symmetry, especially in the areas of statistical mechanics and quantum mechanics, including quantized field theory. This principle requires invariance under the transformations of a finite group, which may be a Sylow π-group, a group of Lie type, or a symmetric group. The utility of the principle of cyclic invariance is demonstrated in finding solutions of the Yang-Baxter equation that include and generalize known solutions. It is shown that the Sylow π-groups have other uses, in providing a basis for a type of generalized quantum statistics, and in parametrising a new generalization of Lie groups, with associated algebras that include quantized algebras. 31 refs

  5. Strain gradient effects on cyclic plasticity

    DEFF Research Database (Denmark)

    Niordson, Christian Frithiof; Legarth, Brian Nyvang

    2010-01-01

    Size effects on the cyclic shear response are studied numerically using a recent higher order strain gradient visco-plasticity theory accounting for both dissipative and energetic gradient hardening. Numerical investigations of the response under cyclic pure shear and shear of a finite slab between...... rigid platens have been carried out, using the finite element method. It is shown for elastic–perfectly plastic solids how dissipative gradient effects lead to increased yield strength, whereas energetic gradient contributions lead to increased hardening as well as a Bauschinger effect. For linearly...... hardening materials it is quantified how dissipative and energetic gradient effects promote hardening above that of conventional predictions. Usually, increased hardening is attributed to energetic gradient effects, but here it is found that also dissipative gradient effects lead to additional hardening...

  6. Generalized Toeplitz operators and cyclic vectors

    International Nuclear Information System (INIS)

    Gassier, G.; Mahzouli, H.; Zerouali, E.H.

    2003-04-01

    We give in this paper some asymptotic Von Neumann inequalities for power bounded operators in the class C ρ intersection C 1 . and some spacial von Neumann inequalities associated with non zero elements of the point spectrum, when it is non void, of generalized Toeplitz operators. Introducing perturbed kernel, we consider classes C R which extend the classical classes C ρ . We give results about absolute continuity with respect to the Haar measure for operators in class C R intersection C 1 . This allows us to give new results on cyclic vectors for such operators and provides invariant subspaces for their powers. Relationships between cyclic vectors for T and T* involving generalized Toeplitz operators are given and the commutativity of {T}', the commutant of T is discussed. (author)

  7. Cosmic evolution in a cyclic universe

    International Nuclear Information System (INIS)

    Steinhardt, Paul J.; Turok, Neil

    2002-01-01

    Based on concepts drawn from the ekpyrotic scenario and M theory, we elaborate our recent proposal of a cyclic model of the universe. In this model, the universe undergoes an endless sequence of cosmic epochs which begin with the universe expanding from a 'big bang' and end with the universe contracting to a 'big crunch'. Matching from 'big crunch' to 'big bang' is performed according to the prescription recently proposed with Khoury, Ovrut and Seiberg. The expansion part of the cycle includes a period of radiation and matter domination followed by an extended period of cosmic acceleration at low energies. The cosmic acceleration is crucial in establishing the flat and vacuous initial conditions required for ekpyrosis and for removing the entropy, black holes, and other debris produced in the preceding cycle. By restoring the universe to the same vacuum state before each big crunch, the acceleration ensures that the cycle can repeat and that the cyclic solution is an attractor

  8. Separation of isotopes by cyclical processes

    International Nuclear Information System (INIS)

    Hamrin, C.E. Jr.; Weaver, K.

    1976-01-01

    Various isotopes of hydrogen are separated by a cyclic sorption process in which a gas stream containing the isotopes is periodically passed through a high pressure column containing a palladium sorbent. A portion of the product from the high pressure column is passed through a second column at lower pressure to act as a purge. Before the sorbent in the high pressure column becomes saturated, the sequence is reversed with the stream flowing through the former low-pressure column now at high pressure, and a portion of the product purging the former high pressure column now at low pressure. The sequence is continued in cyclic manner with the product being enriched in a particular isotope

  9. LIGO: The strong belief

    CERN Multimedia

    Antonella Del Rosso

    2016-01-01

    Twenty years of designing, building and testing a number of innovative technologies, with the strong belief that the endeavour would lead to a historic breakthrough. The Bulletin publishes an abstract of the Courier’s interview with Barry Barish, one of the founding fathers of LIGO.   The plots show the signals of gravitational waves detected by the twin LIGO observatories at Livingston, Louisiana, and Hanford, Washington. (Image: Caltech/MIT/LIGO Lab) On 11 February, the Laser Interferometer Gravitational-Wave Observatory (LIGO) and Virgo collaborations published a historic paper in which they showed a gravitational signal emitted by the merger of two black holes. These results come after 20 years of hard work by a large collaboration of scientists operating the two LIGO observatories in the US. Barry Barish, Linde Professor of Physics, Emeritus at the California Institute of Technology and former Director of the Global Design Effort for the Internat...

  10. Strongly interacting Higgs bosons

    International Nuclear Information System (INIS)

    Appelquist, T.; Bernard, C.

    1980-01-01

    The sensitivity of present-energy weak interactions to a strongly interacting heavy-Higgs-boson sector is discussed. The gauged nonlinear sigma model, which is the limit of the linear model as the Higgs-boson mass goes to infinity, is used to organize and catalogue all possible heavy-Higgs-boson effects. As long as the SU(2)/sub L/ x SU(2)/sub R/ symmetry of the Higgs sector is preserved, these effects are found to be small, of the order of the square of the gauge coupling times logarithms (but not powers) of the Higgs-boson mass divided by the W mass. We work in the context of a simplified model with gauge group SU(2)/sub L/; the extension to SU(2)/sub L/ x U(1) is briefly discussed

  11. Soil Fatigue Due To Cyclically Loaded Foundations

    OpenAIRE

    Pytlik, Robert Stanislaw

    2016-01-01

    Cyclic loading on civil structures can lead to a reduction of strength of the used materials. A literature study showed that, in contrast to steel structures and material engineering, there are no design codes or standards for fatigue of foundations and the surrounding ground masses in terms of shear strength reduction. Scientific efforts to study the fatigue behaviour of geomaterials are mainly focused on strain accumulation, while the reduction of shear strength of geomaterials has not been...

  12. Reaction of cyclic epoxide compounds with triphenylphosphine

    International Nuclear Information System (INIS)

    Kas'yan, L.I.; Stepanova, N.V.; Galafeeva, M.F.; Boldeskul, I.E.; Trachevskii, V.V.; Zefirov, N.S.

    1987-01-01

    Significant differences were found in the reactivity of a series of epoxides of cycloalkenes and methylenecycloalkanes and diepoxides in reaction with triphenylphosphine, depending both on the steric effects of the cyclic fragments and on their strain. The level of the strain can be judged indirectly from the chemical shifts of the 1 H and 13 C nuclei and the spin-spin coupling constants of the C-H bonds in the epoxide ring

  13. Human skin kinetics of cyclic depsipeptide mycotoxins

    OpenAIRE

    Taevernier, Lien; Veryser, Lieselotte; ROCHE, NATHALIE; De Spiegeleer, Bart

    2014-01-01

    Cyclic depsipeptides (CDPs) are an emerging group of naturally occurring bioactive peptides, some of which are already developed as pharmaceutical drugs, e.g. valinomycin. They are produced by bacteria, marine organisms and fungi [1]. Some CDPs are secondary fungal metabolites, which can be very toxic to humans and animals, and are therefore called mycotoxins. Currently, dermal exposure data of CDP mycotoxins is scarce and fragmentary with a lack of understanding about the local skin and syst...

  14. Modelling of cyclical stratigraphy using Markov chains

    Energy Technology Data Exchange (ETDEWEB)

    Kulatilake, P.H.S.W.

    1987-07-01

    State-of-the-art on modelling of cyclical stratigraphy using first-order Markov chains is reviewed. Shortcomings of the presently available procedures are identified. A procedure which eliminates all the identified shortcomings is presented. Required statistical tests to perform this modelling are given in detail. An example (the Oficina formation in eastern Venezuela) is given to illustrate the presented procedure. 12 refs., 3 tabs. 1 fig.

  15. Markup cyclicality, employment adjustment, and financial constraints

    OpenAIRE

    Askildsen, Jan Erik; Nilsen, Øivind Anti

    2001-01-01

    We investigate the existence of markups and their cyclical behaviour. Markup is not directly observed. Instead, it is given as a price-cost relation that is estimated from a dynamic model of the firm. The model incorporates potential costly employment adjustments and takes into consideration that firms may be financially constrained. When considering size of the future labour stock, financially constrained firms may behave as if they have a higher discount factor, which may affect the realise...

  16. Characterization of cyclic peptides containing disulfide bonds

    OpenAIRE

    Johnson, Mindy; Liu, Mingtao; Struble, Elaine; Hettiarachchi, Kanthi

    2015-01-01

    Unlike linear peptides, analysis of cyclic peptides containing disulfide bonds is not straightforward and demands indirect methods to achieve a rigorous proof of structure. Three peptides that belong to this category, p-Cl-Phe-DPDPE, DPDPE, and CTOP, were analyzed and the results are presented in this paper. The great potential of two dimensional NMR and ESI tandem mass spectrometry was harnessed during the course of peptide characterizations. A new RP-HPLC method for the analysis of trifluor...

  17. Visual search of cyclic spatio-temporal events

    Science.gov (United States)

    Gautier, Jacques; Davoine, Paule-Annick; Cunty, Claire

    2018-05-01

    The analysis of spatio-temporal events, and especially of relationships between their different dimensions (space-time-thematic attributes), can be done with geovisualization interfaces. But few geovisualization tools integrate the cyclic dimension of spatio-temporal event series (natural events or social events). Time Coil and Time Wave diagrams represent both the linear time and the cyclic time. By introducing a cyclic temporal scale, these diagrams may highlight the cyclic characteristics of spatio-temporal events. However, the settable cyclic temporal scales are limited to usual durations like days or months. Because of that, these diagrams cannot be used to visualize cyclic events, which reappear with an unusual period, and don't allow to make a visual search of cyclic events. Also, they don't give the possibility to identify the relationships between the cyclic behavior of the events and their spatial features, and more especially to identify localised cyclic events. The lack of possibilities to represent the cyclic time, outside of the temporal diagram of multi-view geovisualization interfaces, limits the analysis of relationships between the cyclic reappearance of events and their other dimensions. In this paper, we propose a method and a geovisualization tool, based on the extension of Time Coil and Time Wave, to provide a visual search of cyclic events, by allowing to set any possible duration to the diagram's cyclic temporal scale. We also propose a symbology approach to push the representation of the cyclic time into the map, in order to improve the analysis of relationships between space and the cyclic behavior of events.

  18. Cyclic dominance in evolutionary games: a review

    Science.gov (United States)

    Szolnoki, Attila; Mobilia, Mauro; Jiang, Luo-Luo; Szczesny, Bartosz; Rucklidge, Alastair M.; Perc, Matjaž

    2014-01-01

    Rock is wrapped by paper, paper is cut by scissors and scissors are crushed by rock. This simple game is popular among children and adults to decide on trivial disputes that have no obvious winner, but cyclic dominance is also at the heart of predator–prey interactions, the mating strategy of side-blotched lizards, the overgrowth of marine sessile organisms and competition in microbial populations. Cyclical interactions also emerge spontaneously in evolutionary games entailing volunteering, reward, punishment, and in fact are common when the competing strategies are three or more, regardless of the particularities of the game. Here, we review recent advances on the rock–paper–scissors (RPS) and related evolutionary games, focusing, in particular, on pattern formation, the impact of mobility and the spontaneous emergence of cyclic dominance. We also review mean-field and zero-dimensional RPS models and the application of the complex Ginzburg–Landau equation, and we highlight the importance and usefulness of statistical physics for the successful study of large-scale ecological systems. Directions for future research, related, for example, to dynamical effects of coevolutionary rules and invasion reversals owing to multi-point interactions, are also outlined. PMID:25232048

  19. Scale factor duality for conformal cyclic cosmologies

    Energy Technology Data Exchange (ETDEWEB)

    Silva, University Camara da; Lima, A.L. Alves; Sotkov, G.M. [Departamento de Física - CCE,Universidade Federal de Espirito Santo, 29075-900, Vitoria ES (Brazil)

    2016-11-16

    The scale factor duality is a symmetry of dilaton gravity which is known to lead to pre-big-bang cosmologies. A conformal time version of the scale factor duality (SFD) was recently implemented as a UV/IR symmetry between decelerated and accelerated phases of the post-big-bang evolution within Einstein gravity coupled to a scalar field. The problem investigated in the present paper concerns the employment of the conformal time SFD methods to the construction of pre-big-bang and cyclic extensions of these models. We demonstrate that each big-bang model gives rise to two qualitatively different pre-big-bang evolutions: a contraction/expansion SFD model and Penrose’s Conformal Cyclic Cosmology (CCC). A few examples of SFD symmetric cyclic universes involving certain gauged Kähler sigma models minimally coupled to Einstein gravity are studied. We also describe the specific SFD features of the thermodynamics and the conditions for validity of the generalized second law in the case of Gauss-Bonnet (GB) extension of these selected CCC models.

  20. Scale factor duality for conformal cyclic cosmologies

    International Nuclear Information System (INIS)

    Silva, University Camara da; Lima, A.L. Alves; Sotkov, G.M.

    2016-01-01

    The scale factor duality is a symmetry of dilaton gravity which is known to lead to pre-big-bang cosmologies. A conformal time version of the scale factor duality (SFD) was recently implemented as a UV/IR symmetry between decelerated and accelerated phases of the post-big-bang evolution within Einstein gravity coupled to a scalar field. The problem investigated in the present paper concerns the employment of the conformal time SFD methods to the construction of pre-big-bang and cyclic extensions of these models. We demonstrate that each big-bang model gives rise to two qualitatively different pre-big-bang evolutions: a contraction/expansion SFD model and Penrose’s Conformal Cyclic Cosmology (CCC). A few examples of SFD symmetric cyclic universes involving certain gauged Kähler sigma models minimally coupled to Einstein gravity are studied. We also describe the specific SFD features of the thermodynamics and the conditions for validity of the generalized second law in the case of Gauss-Bonnet (GB) extension of these selected CCC models.

  1. Strong Convergence of Hybrid Algorithm for Asymptotically Nonexpansive Mappings in Hilbert Spaces

    Directory of Open Access Journals (Sweden)

    Juguo Su

    2012-01-01

    Full Text Available The hybrid algorithms for constructing fixed points of nonlinear mappings have been studied extensively in recent years. The advantage of this methods is that one can prove strong convergence theorems while the traditional iteration methods just have weak convergence. In this paper, we propose two types of hybrid algorithm to find a common fixed point of a finite family of asymptotically nonexpansive mappings in Hilbert spaces. One is cyclic Mann's iteration scheme, and the other is cyclic Halpern's iteration scheme. We prove the strong convergence theorems for both iteration schemes.

  2. Strong-interaction nonuniversality

    International Nuclear Information System (INIS)

    Volkas, R.R.; Foot, R.; He, X.; Joshi, G.C.

    1989-01-01

    The universal QCD color theory is extended to an SU(3) 1 direct product SU(3) 2 direct product SU(3) 3 gauge theory, where quarks of the ith generation transform as triplets under SU(3)/sub i/ and singlets under the other two factors. The usual color group is then identified with the diagonal subgroup, which remains exact after symmetry breaking. The gauge bosons associated with the 16 broken generators then form two massive octets under ordinary color. The interactions between quarks and these heavy gluonlike particles are explicitly nonuniversal and thus an exploration of their physical implications allows us to shed light on the fundamental issue of strong-interaction universality. Nonuniversality and weak flavor mixing are shown to generate heavy-gluon-induced flavor-changing neutral currents. The phenomenology of these processes is studied, as they provide the major experimental constraint on the extended theory. Three symmetry-breaking scenarios are presented. The first has color breaking occurring at the weak scale, while the second and third divorce the two scales. The third model has the interesting feature of radiatively induced off-diagonal Kobayashi-Maskawa matrix elements

  3. John Strong (1941 - 2006)

    CERN Multimedia

    Wickens, F

    Our friend and colleague John Strong was cruelly taken from us by a brain tumour on Monday 31st July, a few days before his 65th birthday John started his career working with a group from Westfield College, under the leadership of Ted Bellamy. He obtained his PhD and spent the early part of his career on experiments at Rutherford Appleton Laboratory (RAL), but after the early 1970s his research was focussed on experiments in CERN. Over the years he made a number of notable contributions to experiments in CERN: The Omega spectrometer adopted a system John had originally developed for experiments at RAL using vidicon cameras to record the sparks in the spark chambers; He contributed to the success of NA1 and NA7, where he became heavily involved in the electronic trigger systems; He was responsible for the second level trigger system for the ALEPH detector and spent five years leading a team that designed and built the system, which ran for twelve years with only minor interventions. Following ALEPH he tur...

  4. Stirring Strongly Coupled Plasma

    CERN Document Server

    Fadafan, Kazem Bitaghsir; Rajagopal, Krishna; Wiedemann, Urs Achim

    2009-01-01

    We determine the energy it takes to move a test quark along a circle of radius L with angular frequency w through the strongly coupled plasma of N=4 supersymmetric Yang-Mills (SYM) theory. We find that for most values of L and w the energy deposited by stirring the plasma in this way is governed either by the drag force acting on a test quark moving through the plasma in a straight line with speed v=Lw or by the energy radiated by a quark in circular motion in the absence of any plasma, whichever is larger. There is a continuous crossover from the drag-dominated regime to the radiation-dominated regime. In the crossover regime we find evidence for significant destructive interference between energy loss due to drag and that due to radiation as if in vacuum. The rotating quark thus serves as a model system in which the relative strength of, and interplay between, two different mechanisms of parton energy loss is accessible via a controlled classical gravity calculation. We close by speculating on the implicati...

  5. Isochronous relaxation curves for type 304 stainless steel after monotonic and cyclic strain

    International Nuclear Information System (INIS)

    Swindeman, R.W.

    1978-01-01

    Relaxation tests to 100 hr were performed on type 304 stainless steel in the temperature range 480 to 650 0 C and were used to develop isochronous relaxation curves. Behavior after monotonic and cyclic strain was compared. Relaxation differed only slightly as a consequence of the type of previous strain, provided that plastic flow preceded the relaxation period. We observed that the short-time relaxation behavior did not manifest strong heat-to-heat variation in creep strength

  6. THE ADVERSARIAL SYSTEM AND THE BEST INTERESTS OF THE CHILD IN DIVORCE LITIGATION: SOME THOUGHTS REGARDING COLLABORATIVE LAW AS A MEANS TO RESOLVE PARENTAL DISPUTES

    Directory of Open Access Journals (Sweden)

    JA Robinson

    2016-03-01

    Full Text Available In this contribution it is argued that the adversarial system of litigation does not serve the best interests of children upon divorce. After a brief analysis of the system it is concluded that other less aggressive means of litigation should be considered under upon divorce. Collaborative Law is suggested as a means to bear in mind. The fact that current practice of lawyer negotiations in respect of divorce is not too far removed from Collaborative Law may lead to practitioners readily accepting the concept.

  7. Statistical damage constitutive model for rocks subjected to cyclic stress and cyclic temperature

    Science.gov (United States)

    Zhou, Shu-Wei; Xia, Cai-Chu; Zhao, Hai-Bin; Mei, Song-Hua; Zhou, Yu

    2017-10-01

    A constitutive model of rocks subjected to cyclic stress-temperature was proposed. Based on statistical damage theory, the damage constitutive model with Weibull distribution was extended. Influence of model parameters on the stress-strain curve for rock reloading after stress-temperature cycling was then discussed. The proposed model was initially validated by rock tests for cyclic stress-temperature and only cyclic stress. Finally, the total damage evolution induced by stress-temperature cycling and reloading after cycling was explored and discussed. The proposed constitutive model is reasonable and applicable, describing well the stress-strain relationship during stress-temperature cycles and providing a good fit to the test results. Elastic modulus in the reference state and the damage induced by cycling affect the shape of reloading stress-strain curve. Total damage induced by cycling and reloading after cycling exhibits three stages: initial slow increase, mid-term accelerated increase, and final slow increase.

  8. Virtual screening using combinatorial cyclic peptide libraries reveals protein interfaces readily targetable by cyclic peptides.

    Science.gov (United States)

    Duffy, Fergal J; O'Donovan, Darragh; Devocelle, Marc; Moran, Niamh; O'Connell, David J; Shields, Denis C

    2015-03-23

    Protein-protein and protein-peptide interactions are responsible for the vast majority of biological functions in vivo, but targeting these interactions with small molecules has historically been difficult. What is required are efficient combined computational and experimental screening methods to choose among a number of potential protein interfaces worthy of targeting lead macrocyclic compounds for further investigation. To achieve this, we have generated combinatorial 3D virtual libraries of short disulfide-bonded peptides and compared them to pharmacophore models of important protein-protein and protein-peptide structures, including short linear motifs (SLiMs), protein-binding peptides, and turn structures at protein-protein interfaces, built from 3D models available in the Protein Data Bank. We prepared a total of 372 reference pharmacophores, which were matched against 108,659 multiconformer cyclic peptides. After normalization to exclude nonspecific cyclic peptides, the top hits notably are enriched for mimetics of turn structures, including a turn at the interaction surface of human α thrombin, and also feature several protein-binding peptides. The top cyclic peptide hits also cover the critical "hot spot" interaction sites predicted from the interaction crystal structure. We have validated our method by testing cyclic peptides predicted to inhibit thrombin, a key protein in the blood coagulation pathway of important therapeutic interest, identifying a cyclic peptide inhibitor with lead-like activity. We conclude that protein interfaces most readily targetable by cyclic peptides and related macrocyclic drugs may be identified computationally among a set of candidate interfaces, accelerating the choice of interfaces against which lead compounds may be screened.

  9. Cyclic Oxidation of High Mo, Reduced Density Superalloys

    Directory of Open Access Journals (Sweden)

    James L. Smialek

    2015-11-01

    Full Text Available Cyclic oxidation was characterized as part of a statistically designed, 12-alloy compositional study of 2nd generation single crystal superalloys as part of a broader study to co-optimize density, creep strength, and cyclic oxidation. The primary modification was a replacement of 5 wt. % W by 7% or 12% Mo for density reductions of 2%–7%. Compositions at two levels of Mo, Cr, Co, and Re were produced, along with a midpoint composition. Initially, polycrystalline vacuum induction samples were screened in 1100 °C cyclic furnace tests using 1 h cycles for 200 h. The behavior was primarily delimited by Cr content, producing final weight changes of −40 mg/cm2 to −10 mg/cm2 for 0% Cr alloys and −2 mg/cm2 to +1 mg/cm2 for 5% Cr alloys. Accordingly, a multiple linear regression fit yielded an equation showing a strong positive Cr effect and lesser negative effects of Co and Mo. The results for 5% Cr alloys compare well to −1 mg/cm2, and +0.5 mg/cm2 for Rene′ N4 and Rene′ N5 (or Rene′ N6, respectively. Scale phases commonly identified were Al2O3, NiAl2O4, NiTa2O6, and NiO, with (Ni,CoMoO4 found only on the least resistant alloys having 0% Cr and 12% Mo. Scale microstructures were complex and reflected variations in the regional spallation history. Large faceted NiO grains and fine NiTa2O6 particles distributed along NiAl2O4 grain boundaries were typical distinctive features. NiMoO4 formation, decomposition, and volatility occurred for a few high Mo compositions. A creep, density, phase stability, and oxidation balanced 5% Cr, 10% Co, 7% Mo, and 3% Re alloy was selected to be taken forward for more extensive evaluations in single crystal form.

  10. Cosmological D-instantons and cyclic universes

    International Nuclear Information System (INIS)

    Bergshoeff, E A; Collinucci, A; Roest, D; Russo, J G; Townsend, P K

    2005-01-01

    For models of gravity coupled to hyperbolic sigma models, such as the metric-scalar sector of IIB supergravity, we show how smooth trajectories in the 'augmented target space' connect FLRW cosmologies to non-extremal D-instantons through a cosmological singularity. In particular, we find closed cyclic universes that undergo an endless sequence of big-bang to big-crunch cycles separated by instanton 'phases'. We also find 'big-bounce' universes in which a collapsing closed universe bounces off its cosmological singularity to become an open expanding universe

  11. Increase of cyclic durability of pressure vessels

    International Nuclear Information System (INIS)

    Vorona, V.A.; Zvezdin, Yu.I.

    1980-01-01

    The durability of multilayer pressure vessels under cyclic loading is compared with single-layer vessels. The relative conditional durability is calculated taking into account the assumption on the consequent destruction of layers and viewing a vessel wall as an indefinite plate. It is established that the durability is mainly determined by the number of layers and to a lesser degree depends on the relative size of the defect for the given layer thickness. The advantage of the multilayer vessels is the possibility of selecting layer materials so that to exclude the effect of agressive corrosion media on the strength [ru

  12. Adversarial Geospatial Abduction Problems

    Science.gov (United States)

    2011-01-01

    better). We assume the reasoning agent is using the Spatial Cultural Abductive Reasoning Engine (SCARE) to provide information on cache locations. OAS...Technology, Vol. , No. , 20. 38 · Paulo Shakarian et al. Rossmo, D. K. and Rombouts, S. 2008. Geographic Profiling. In Enviromental Criminology and Crime

  13. Cyber Adversary Dynamics

    Science.gov (United States)

    2013-02-01

    that the Government formulated or supplied the drawings, specifications, or other data does not license the holder or any other person or corporation ...preparation. Berk , V. H., Cybenko, G., Souza, I. G. D., & Murphy, J. P. (2012, January). “Managing Malicious Insider Risk through BANDIT.” In System... finances , human resources for example; • Tactics – Short term goals and techniques to achieve those goals; • Strategy – Long term outcomes and

  14. Corticosteroid receptors adopt distinct cyclical transcriptional signatures.

    Science.gov (United States)

    Le Billan, Florian; Amazit, Larbi; Bleakley, Kevin; Xue, Qiong-Yao; Pussard, Eric; Lhadj, Christophe; Kolkhof, Peter; Viengchareun, Say; Fagart, Jérôme; Lombès, Marc

    2018-05-07

    Mineralocorticoid receptors (MRs) and glucocorticoid receptors (GRs) are two closely related hormone-activated transcription factors that regulate major pathophysiologic functions. High homology between these receptors accounts for the crossbinding of their corresponding ligands, MR being activated by both aldosterone and cortisol and GR essentially activated by cortisol. Their coexpression and ability to bind similar DNA motifs highlight the need to investigate their respective contributions to overall corticosteroid signaling. Here, we decipher the transcriptional regulatory mechanisms that underlie selective effects of MRs and GRs on shared genomic targets in a human renal cellular model. Kinetic, serial, and sequential chromatin immunoprecipitation approaches were performed on the period circadian protein 1 ( PER1) target gene, providing evidence that both receptors dynamically and cyclically interact at the same target promoter in a specific and distinct transcriptional signature. During this process, both receptors regulate PER1 gene by binding as homo- or heterodimers to the same promoter region. Our results suggest a novel level of MR-GR target gene regulation, which should be considered for a better and integrated understanding of corticosteroid-related pathophysiology.-Le Billan, F., Amazit, L., Bleakley, K., Xue, Q.-Y., Pussard, E., Lhadj, C., Kolkhof, P., Viengchareun, S., Fagart, J., Lombès, M. Corticosteroid receptors adopt distinct cyclical transcriptional signatures.

  15. A cyclically actuated electrolytic drug delivery device

    KAUST Repository

    Yi, Ying

    2015-01-01

    This work, focusing on an implantable drug delivery system, presents the first prototype electrolytic pump that combines a catalytic reformer and a cyclically actuated mode. These features improve the release performance and extend the lifetime of the device. Using our platinum (Pt)-coated carbon fiber mesh that acts as a catalytic reforming element, the cyclical mode is improved because the faster recombination rate allows for a shorter cycling time for drug delivery. Another feature of our device is that it uses a solid-drug-in-reservoir (SDR) approach, which allows small amounts of a solid drug to be dissolved in human fluid, forming a reproducible drug solution for long-term therapies. We have conducted proof-of-principle drug delivery studies using such an electrolytic pump and solvent blue 38 as the drug substitute. These tests demonstrate power-controlled and pulsatile release profiles of the chemical substance, as well as the feasibility of this device. A drug delivery rate of 11.44 ± 0.56 μg min-1 was achieved by using an input power of 4 mW for multiple pulses, which indicates the stability of our system. © The Royal Society of Chemistry 2015.

  16. Synthesis of Cyclic Py-Im Polyamide Libraries

    OpenAIRE

    Li, Benjamin C.; Montgomery, David C.; Puckett, James W.; Dervan, Peter B.

    2013-01-01

    Cyclic Py-Im polyamides containing two GABA turn units exhibit enhanced DNA binding affinity, but extensive studies of their biological properties have been hindered due to synthetic inaccessibility. A facile modular approach toward cyclic polyamides has been developed via microwave-assisted solid-phase synthesis of hairpin amino acid oligomer intermediates followed by macrocyclization. A focused library of cyclic polyamides 1–7 targeted to the androgen response element (ARE) and the estrogen...

  17. Characterization of cyclical phases in the manufacturing industry in Spain

    OpenAIRE

    Sala, Mercè; Torres, Teresa; Farré, Mariona

    2014-01-01

    Purpose: The purpose of this paper is to characterize the cyclical phases of the manufacturing industry in Spain and detect which industries have more influence on the Spanish business cycle. We assume that economic growth is a priority; we are going to determine which industries have a more/less appropriate cyclical behavior according this priority. We analyze if the industries with better cyclical behavior are the ones that achieve greater co-movement with the business cycle of the Spanish...

  18. Caffeine, cyclic AMP and postreplication repair of mammalian DNA

    International Nuclear Information System (INIS)

    Ehmann, U.K.

    1976-01-01

    The methylxanthines, caffeine and theophylline, inhibit postreplication repair of DNA in mammalian cells. Because they also inhibit cyclic AMP phosphodiesterase, it was thought that there might be some connection between concentrations of cyclic AMP and postreplication repair. This possibility was tested by performing DNA sedimentation experiments with a cyclic AMP-resistant mouse lymphoma cell mutant and its wild-type counterpart. The results show that there is no connection between cellular cyclic AMP concentrations and the rate of postreplication repair. Therefore, it is more likely that caffeine and theophylline inhibit postreplication repair by some other means, such as by binding to DNA

  19. Regulation of thrombomodulin expression and release in human aortic endothelial cells by cyclic strain.

    Directory of Open Access Journals (Sweden)

    Fiona A Martin

    Full Text Available Thrombomodulin (TM, an integral membrane glycoprotein expressed on the lumenal surface of vascular endothelial cells, promotes anti-coagulant and anti-inflammatory properties. Release of functional TM from the endothelium surface into plasma has also been reported. Much is still unknown however about how endothelial TM is regulated by physiologic hemodynamic forces (and particularly cyclic strain intrinsic to endothelial-mediated vascular homeostasis.This study employed human aortic endothelial cells (HAECs to investigate the effects of equibiaxial cyclic strain (7.5%, 60 cycles/min, 24 hrs, and to a lesser extent, laminar shear stress (10 dynes/cm2, 24 hrs, on TM expression and release. Time-, dose- and frequency-dependency studies were performed.Our initial studies demonstrated that cyclic strain strongly downregulated TM expression in a p38- and receptor tyrosine kinase-dependent manner. This was in contrast to the upregulatory effect of shear stress. Moreover, both forces significantly upregulated TM release over a 48 hr period. With continuing focus on the cyclic strain-induced TM release, we noted both dose (0-7.5% and frequency (0.5-2.0 Hz dependency, with no attenuation of strain-induced TM release observed following inhibition of MAP kinases (p38, ERK-1/2, receptor tyrosine kinase, or eNOS. The concerted impact of cyclic strain and inflammatory mediators on TM release from HAECs was also investigated. In this respect, both TNFα (100 ng/ml and ox-LDL (10-50 µg/ml appeared to potentiate strain-induced TM release. Finally, inhibition of neither MMPs (GM6001 nor rhomboids (3,4-dichloroisocoumarin had any effect on strain-induced TM release. However, significantly elevated levels (2.1 fold of TM were observed in isolated microparticle fractions following 7.5% strain for 24 hrs.A preliminary in vitro investigation into the effects of cyclic strain on TM in HAECs is presented. Physiologic cyclic strain was observed to downregulate TM

  20. Cyclicality of Wages and Union Power

    DEFF Research Database (Denmark)

    Morin, Annaïg

    2017-01-01

    This paper examines how trade unions shape the volatility of wages over the business cycle. I present a dynamic stochastic model of the labor market that integrates two main features: search frictions and trade unions. Because of search frictions, each job match yields an economic surplus...... that is shared between the worker and the firm. Therefore, I can decompose the volatility of wages into two components: the volatility of the match surplus and the volatility of the worker share of the surplus. Starting from the unions' objective function, I show that under collective wage bargaining, the worker...... share is endogenous and counter-cyclical. Consequently, when the economy is hit by a shock, the dynamics of the worker share partially counteract the dynamics of the match surplus, and this mechanism delivers endogenous wage rigidity. The model thus offers new insights into two business cycle features...

  1. Stress relaxation under cyclic electron irradiation

    International Nuclear Information System (INIS)

    Bystrov, L.N.; Reznitskij, M.E.

    1990-01-01

    The kinetics of deformation process in a relaxating sample under 2 MeV electron cyclic irradiation was studied experimentally. The Al-Mg alloys with controllable and different (in dislocation density precipitate presence and their character) structure were used in experiments. It was established that after the beam was switched on the deformation rate increased sharply and then, during prolonged irradiation, in a gradual manner. After the switching-off the relaxation rate decreases by jumps up to values close to extrapolated rates of pre-radiation relaxation. The exhibition of these effects with radiation switching-off and switchin-on is dependent on the initial rate of thermal relaxation, the test temperature, the preliminary cold deformation and the dominating deformation dislocation mechanism. The preliminary cold deformation and test temperature elevation slightly decrease the effect of instantaneous relaxation acceleration with the irradiation switch-on. 17 refs., 5 figs

  2. Numerical Simulation of Cyclic Thermodynamic Processes

    DEFF Research Database (Denmark)

    Andersen, Stig Kildegård

    2006-01-01

    This thesis is on numerical simulation of cyclic thermodynamic processes. A modelling approach and a method for finding periodic steady state solutions are described. Examples of applications are given in the form of four research papers. Stirling machines and pulse tube coolers are introduced...... and a brief overview of the current state of the art in methods for simulating such machines is presented. It was found that different simulation approaches, which model the machines with different levels of detail, currently coexist. Methods using many simplifications can be easy to use and can provide...... models flexible and easy to modify, and to make simulations fast. A high level of accuracy was achieved for integrations of a model created using the modelling approach; the accuracy depended on the settings for the numerical solvers in a very predictable way. Selection of fast numerical algorithms...

  3. Temperature rise of cyclicly loaded power cables

    Energy Technology Data Exchange (ETDEWEB)

    Brakelmann, H

    1984-09-01

    A calculation method for the current ratings of cyclicly loaded power cables is introduced, taking into account optional shapes of the load cycle as well as the drying-out of the soil. The method is based on the Fourier-analysis of the loss cycle, representing an extension of the calculation method of VDE 0298. It is shown, that the ''VDE-method'' gives good results for the thermal resistances, if an ''utility load cycle'' in accordance with VDE 0298 is supposed. Only for cycles deviating essentially from the utility load cycle, the thermal resistances calculated by the ''VDE-method'' may be too great. In these cases the represented method is advantageous and can be processed by the aid of microcomputers.

  4. The cyclic universe: An informal introduction

    International Nuclear Information System (INIS)

    Steinhaxdt, Paul J.; Turok, Neil

    2003-01-01

    The Cyclic Model is a radical, new cosmological scenario which proposes that the Universe undergoes an endless sequence of epochs which begin with a 'big bang' and end in a 'big crunch.' When the Universes bounces from contraction to re-expansion, the temperature and density remain finite. The model does not include a period of rapid inflation, yet it reproduces all of the successful predictions of standard big bang and inflationary cosmology. We point out numerous novel elements that have not been used previously which may open the door to further alternative cosmologies. Although the model is motivated by M-theory, branes and extra dimensions, here we show that the scenario can be described almost entirely in terms of conventional 4d field theory and 4d cosmology

  5. Janus cyclic peptide-polymer nanotubes

    Science.gov (United States)

    Danial, Maarten; My-Nhi Tran, Carmen; Young, Philip G.; Perrier, Sébastien; Jolliffe, Katrina A.

    2013-11-01

    Self-assembled nanotubular structures have numerous potential applications but these are limited by a lack of control over size and functionality. Controlling these features at the molecular level may allow realization of the potential of such structures. Here we report a new generation of self-assembled cyclic peptide-polymer nanotubes with dual functionality in the form of either a Janus or mixed polymeric corona. A ‘relay’ synthetic strategy is used to prepare nanotubes with a demixing or mixing polymeric corona. Nanotube structure is assessed in solution using 1H-1H nuclear Overhauser effect spectroscopy NMR, and in bulk using differential scanning calorimetry. The Janus nanotubes form artificial pores in model phospholipid bilayers. These molecules provide a viable pathway for the development of intriguing nanotubular structures with dual functionality via a demixing or a mixing polymeric corona and may provide new avenues for the creation of synthetic transmembrane protein channel mimics.

  6. Magnetoelastic Demagnetization of Steel under Cyclic Loading

    Science.gov (United States)

    Muratov, K. R.; Novikov, V. F.; Neradovskii, D. F.; Kazakov, R. Kh.

    2018-01-01

    Magnetoelastic demagnetization of steel samples under cyclic tensile loads has been analyzed. It has been established that values of residual magnetization that correspond to peak loads are characterized by the power-law dependence on the number of loading cycles. In some cases, in the region of high loads, the qualitative transition to exponential dependence has been observed. Coefficients of the power-law approximation of peak magnetization depend on the value of amplitude load and have specific characteristics in the vicinity of characteristic loads. The ratios of approximated slide load coefficients depending on the load are common for the three considered samples, and there is an outburst in the vicinity of the fatigue limit, which can be used as the basis for developing the rapid nondestructive method for determination of this limit.

  7. Protein Misfolding Cyclic Amplification of Infectious Prions.

    Science.gov (United States)

    Moda, Fabio

    2017-01-01

    Transmissible spongiform encephalopathies, or prion diseases, are a group of incurable disorders caused by the accumulation of an abnormally folded prion protein (PrP Sc ) in the brain. According to the "protein-only" hypothesis, PrP Sc is the infectious agent able to propagate the disease by acting as a template for the conversion of the correctly folded prion protein (PrP C ) into the pathological isoform. Recently, the mechanism of PrP C conversion has been mimicked in vitro using an innovative technique named protein misfolding cyclic amplification (PMCA). This technology represents a great tool for studying diverse aspects of prion biology in the field of basic research and diagnosis. Moreover, PMCA can be expanded for the study of the misfolding process associated to other neurodegenerative diseases, including Alzheimer's disease, Parkinson's disease, and frontotemporal lobar degeneration. © 2017 Elsevier Inc. All rights reserved.

  8. A "catalyst switch" Strategy for the sequential metal-free polymerization of epoxides and cyclic Esters/Carbonate

    KAUST Repository

    Zhao, Junpeng

    2014-06-24

    A "catalyst switch" strategy was used to synthesize well-defined polyether-polyester/polycarbonate block copolymers. Epoxides (ethylene oxide and/or 1,2-butylene oxide) were first polymerized from a monoalcohol in the presence of a strong phosphazene base promoter (t-BuP4). Then an excess of diphenyl phosphate (DPP) was introduced, followed by the addition and polymerization of a cyclic ester (ε-caprolactone or δ-valerolactone) or a cyclic carbonate (trimethylene carbonate), where DPP acted as both the neutralizer of phosphazenium alkoxide (polyether chain end) and the activator of cyclic ester/carbonate. This work has provided a one-pot sequential polymerization method for the metal-free synthesis of block copolymers from monomers which are suited for different types of organic catalysts. © 2014 American Chemical Society.

  9. A "catalyst switch" Strategy for the sequential metal-free polymerization of epoxides and cyclic Esters/Carbonate

    KAUST Repository

    Zhao, Junpeng; Pahovnik, David; Gnanou, Yves; Hadjichristidis, Nikolaos

    2014-01-01

    A "catalyst switch" strategy was used to synthesize well-defined polyether-polyester/polycarbonate block copolymers. Epoxides (ethylene oxide and/or 1,2-butylene oxide) were first polymerized from a monoalcohol in the presence of a strong phosphazene base promoter (t-BuP4). Then an excess of diphenyl phosphate (DPP) was introduced, followed by the addition and polymerization of a cyclic ester (ε-caprolactone or δ-valerolactone) or a cyclic carbonate (trimethylene carbonate), where DPP acted as both the neutralizer of phosphazenium alkoxide (polyether chain end) and the activator of cyclic ester/carbonate. This work has provided a one-pot sequential polymerization method for the metal-free synthesis of block copolymers from monomers which are suited for different types of organic catalysts. © 2014 American Chemical Society.

  10. Supplementary Material for: The arabidopsis cyclic nucleotide interactome

    KAUST Repository

    Donaldson, Lara; Meier, Stuart; Gehring, Christoph A

    2016-01-01

    Abstract Background Cyclic nucleotides have been shown to play important signaling roles in many physiological processes in plants including photosynthesis and defence. Despite this, little is known about cyclic nucleotide-dependent signaling mechanisms in plants since the downstream target proteins remain unknown. This is largely due to the fact that bioinformatics searches fail to identify plant homologs of protein kinases and phosphodiesterases that are the main targets of cyclic nucleotides in animals. Methods An affinity purification technique was used to identify cyclic nucleotide binding proteins in Arabidopsis thaliana. The identified proteins were subjected to a computational analysis that included a sequence, transcriptional co-expression and functional annotation analysis in order to assess their potential role in plant cyclic nucleotide signaling. Results A total of twelve cyclic nucleotide binding proteins were identified experimentally including key enzymes in the Calvin cycle and photorespiration pathway. Importantly, eight of the twelve proteins were shown to contain putative cyclic nucleotide binding domains. Moreover, the identified proteins are post-translationally modified by nitric oxide, transcriptionally co-expressed and annotated to function in hydrogen peroxide signaling and the defence response. The activity of one of these proteins, GLYGOLATE OXIDASE 1, a photorespiratory enzyme that produces hydrogen peroxide in response to Pseudomonas, was shown to be repressed by a combination of cGMP and nitric oxide treatment. Conclusions We propose that the identified proteins function together as points of cross-talk between cyclic nucleotide, nitric oxide and reactive oxygen species signaling during the defence response.

  11. Infinity-Norm Permutation Covering Codes from Cyclic Groups

    OpenAIRE

    Karni, Ronen; Schwartz, Moshe

    2017-01-01

    We study covering codes of permutations with the $\\ell_\\infty$-metric. We provide a general code construction, which uses smaller building-block codes. We study cyclic transitive groups as building blocks, determining their exact covering radius, and showing linear-time algorithms for finding a covering codeword. We also bound the covering radius of relabeled cyclic transitive groups under conjugation.

  12. Evaluating cyclic fatigue of sealants during outdoor testing

    Science.gov (United States)

    R. Sam Williams; Steven Lacher; Corey Halpin; Christopher White

    2009-01-01

    A computer-controlled test apparatus (CCTA) and other instrumentation for subjecting sealant specimens to cyclic fatigue during outdoor exposure was developed. The CCTA enables us to use weather-induced conditions to cyclic fatigue specimens and to conduct controlled tests in-situ during the outdoor exposure. Thermally induced dimensional changes of an aluminum bar...

  13. A Practical Beginner's Guide to Cyclic Voltammetry

    Science.gov (United States)

    Elgrishi, Noémie; Rountree, Kelley J.; McCarthy, Brian D.; Rountree, Eric S.; Eisenhart, Thomas T.; Dempsey, Jillian L.

    2018-01-01

    Despite the growing popularity of cyclic voltammetry, many students do not receive formalized training in this technique as part of their coursework. Confronted with self-instruction, students can be left wondering where to start. Here, a short introduction to cyclic voltammetry is provided to help the reader with data acquisition and…

  14. Classifying spaces with virtually cyclic stabilizers for linear groups

    DEFF Research Database (Denmark)

    Degrijse, Dieter Dries; Köhl, Ralf; Petrosyan, Nansen

    2015-01-01

    We show that every discrete subgroup of GL(n, ℝ) admits a finite-dimensional classifying space with virtually cyclic stabilizers. Applying our methods to SL(3, ℤ), we obtain a four-dimensional classifying space with virtually cyclic stabilizers and a decomposition of the algebraic K-theory of its...

  15. Cyclic Matching Pursuits with Multiscale Time-frequency Dictionaries

    DEFF Research Database (Denmark)

    Sturm, Bob L.; Christensen, Mads Græsbøll

    2010-01-01

    We generalize cyclic matching pursuit (CMP), propose an orthogonal variant, and examine their performance using multiscale time-frequency dictionaries in the sparse approximation of signals. Overall, we find that the cyclic approach of CMP produces signal models that have a much lower approximation...

  16. Cyclic complex loading of 316 stainless steel: Experiments and calculations

    International Nuclear Information System (INIS)

    Jacquelin, B.; Hourlier, F.; Dang Van, K.; Stolz, C.

    1981-01-01

    To test the ability of cyclic constitutive law established by mean of uniaxial test a benchmark is proposed. The calculated results using the model of Chaboche-Cordier-Dang Van are compared with experimental data obtained on cylindrical specimens undergoing simultaneously constant torque and cyclic tension. (orig.)

  17. Charge initiation schemes for ensuring high-performance operation of cyclic-flow technology cyclic link

    Directory of Open Access Journals (Sweden)

    S. N. Zharikov

    2017-09-01

    Full Text Available The authors consider the issue of ensuring the quality of crushing rock mass by drilling and blasting method for high productivity of a cyclic link of a cyclic-flow technology complex. The article contains recommendations for calculating certain parameters of drilling and blasting operations, such as the width of the retaining wall Bp. s, the collapse with account for the retaining wall Вr, the width of the collapse of the rock mass Bf when blasting onto a free surface (for the first row of vertical wells and for the first series of inclined wells, the width of the collapse from the first series of wells B1, the deceleration time τ, the coefficient kβ that takes into account the incline angle of wells β to the horizon. The authors prove the expediency of using a retaining wall in explosions of technological blocks. The authors raise the question about the management of detonation characteristics of explosives produced in the field of application for the most rational impact of an explosion on a rock massif. Since the technological schemes for preparing the rock mass to the excavation, which ensure the high-performance operation of the cyclic link of the cyclic-flow technology, can be different, then the choice of a specific drilling and blasting circuit is depends on the geological conditions and elements of the development system. As a preliminary method of breaking, one can consider the explosion of charges along the diagonal (diagonal blasting schemes on the retaining wall. This method provides sufficient reliability of technological explosions, and with the development of modern means of blasting with decelerations between charges of more than 67 ms, there are nearly no back emissions.

  18. Modeling linear and cyclic PKS intermediates through atom replacement.

    Science.gov (United States)

    Shakya, Gaurav; Rivera, Heriberto; Lee, D John; Jaremko, Matt J; La Clair, James J; Fox, Daniel T; Haushalter, Robert W; Schaub, Andrew J; Bruegger, Joel; Barajas, Jesus F; White, Alexander R; Kaur, Parminder; Gwozdziowski, Emily R; Wong, Fiona; Tsai, Shiou-Chuan; Burkart, Michael D

    2014-12-03

    The mechanistic details of many polyketide synthases (PKSs) remain elusive due to the instability of transient intermediates that are not accessible via conventional methods. Here we report an atom replacement strategy that enables the rapid preparation of polyketone surrogates by selective atom replacement, thereby providing key substrate mimetics for detailed mechanistic evaluations. Polyketone mimetics are positioned on the actinorhodin acyl carrier protein (actACP) to probe the underpinnings of substrate association upon nascent chain elongation and processivity. Protein NMR is used to visualize substrate interaction with the actACP, where a tetraketide substrate is shown not to bind within the protein, while heptaketide and octaketide substrates show strong association between helix II and IV. To examine the later cyclization stages, we extended this strategy to prepare stabilized cyclic intermediates and evaluate their binding by the actACP. Elongated monocyclic mimics show much longer residence time within actACP than shortened analogs. Taken together, these observations suggest ACP-substrate association occurs both before and after ketoreductase action upon the fully elongated polyketone, indicating a key role played by the ACP within PKS timing and processivity. These atom replacement mimetics offer new tools to study protein and substrate interactions and are applicable to a wide variety of PKSs.

  19. Are the advocates of nuclear power and the adversaries listening to each other? Does Dialogue have a chance? Introductory remarks by John A. Macpherson

    International Nuclear Information System (INIS)

    Macpherson, John A.

    1989-01-01

    Are the advocates of nuclear power and the adversaries listening to each other? Does dialogue have a chance? My short answer to both questions posed as the title for this discussion is 'no'. And I would add: There is no point in trying to bring opposite poles together, it requires too much investment for too little return. A nuclear dialogue will have a chance only it a distinction can be shown between physics and metaphysics, between chemistry and alchemy, and if the gap can be bridged between the polarized views of the world's societal needs which, incidentally, create the nuclear issue in the first place. This is a daunting task Movements in search of a cause have a passion for preaching rather than a love for listening

  20. History-independent cyclic response of nanotwinned metals

    Science.gov (United States)

    Pan, Qingsong; Zhou, Haofei; Lu, Qiuhong; Gao, Huajian; Lu, Lei

    2017-11-01

    Nearly 90 per cent of service failures of metallic components and structures are caused by fatigue at cyclic stress amplitudes much lower than the tensile strength of the materials involved. Metals typically suffer from large amounts of cumulative, irreversible damage to microstructure during cyclic deformation, leading to cyclic responses that are unstable (hardening or softening) and history-dependent. Existing rules for fatigue life prediction, such as the linear cumulative damage rule, cannot account for the effect of loading history, and engineering components are often loaded by complex cyclic stresses with variable amplitudes, mean values and frequencies, such as aircraft wings in turbulent air. It is therefore usually extremely challenging to predict cyclic behaviour and fatigue life under a realistic load spectrum. Here, through both atomistic simulations and variable-strain-amplitude cyclic loading experiments at stress amplitudes lower than the tensile strength of the metal, we report a history-independent and stable cyclic response in bulk copper samples that contain highly oriented nanoscale twins. We demonstrate that this unusual cyclic behaviour is governed by a type of correlated ‘necklace’ dislocation consisting of multiple short component dislocations in adjacent twins, connected like the links of a necklace. Such dislocations are formed in the highly oriented nanotwinned structure under cyclic loading and help to maintain the stability of twin boundaries and the reversible damage, provided that the nanotwins are tilted within about 15 degrees of the loading axis. This cyclic deformation mechanism is distinct from the conventional strain localizing mechanisms associated with irreversible microstructural damage in single-crystal, coarse-grained, ultrafine-grained and nanograined metals.

  1. Quantum electrodynamics of strong fields

    International Nuclear Information System (INIS)

    Greiner, W.

    1983-01-01

    Quantum Electrodynamics of Strong Fields provides a broad survey of the theoretical and experimental work accomplished, presenting papers by a group of international researchers who have made significant contributions to this developing area. Exploring the quantum theory of strong fields, the volume focuses on the phase transition to a charged vacuum in strong electric fields. The contributors also discuss such related topics as QED at short distances, precision tests of QED, nonperturbative QCD and confinement, pion condensation, and strong gravitational fields In addition, the volume features a historical paper on the roots of quantum field theory in the history of quantum physics by noted researcher Friedrich Hund

  2. Instabilities in strongly coupled plasmas

    CERN Document Server

    Kalman, G J

    2003-01-01

    The conventional Vlasov treatment of beam-plasma instabilities is inappropriate when the plasma is strongly coupled. In the strongly coupled liquid state, the strong correlations between the dust grains fundamentally affect the conditions for instability. In the crystalline state, the inherent anisotropy couples the longitudinal and transverse polarizations, and results in unstable excitations in both polarizations. We summarize analyses of resonant and non-resonant, as well as resistive instabilities. We consider both ion-dust streaming and dust beam-plasma instabilities. Strong coupling, in general, leads to an enhancement of the growth rates. In the crystalline phase, a resonant transverse instability can be excited.

  3. Cyclic nucleotide specific phosphodiesterases of Leishmania major

    Directory of Open Access Journals (Sweden)

    Linder Markus

    2006-03-01

    Full Text Available Abstract Background Leishmania represent a complex of important human pathogens that belong to the systematic order of the kinetoplastida. They are transmitted between their human and mammalian hosts by different bloodsucking sandfly vectors. In their hosts, the Leishmania undergo several differentiation steps, and their coordination and optimization crucially depend on numerous interactions between the parasites and the physiological environment presented by the fly and human hosts. Little is still known about the signalling networks involved in these functions. In an attempt to better understand the role of cyclic nucleotide signalling in Leishmania differentiation and host-parasite interaction, we here present an initial study on the cyclic nucleotide-specific phosphodiesterases of Leishmania major. Results This paper presents the identification of three class I cyclic-nucleotide-specific phosphodiesterases (PDEs from L. major, PDEs whose catalytic domains exhibit considerable sequence conservation with, among other, all eleven human PDE families. In contrast to other protozoa such as Dictyostelium, or fungi such as Saccharomyces cerevisiae, Candida ssp or Neurospora, no genes for class II PDEs were found in the Leishmania genomes. LmjPDEA contains a class I catalytic domain at the C-terminus of the polypeptide, with no other discernible functional domains elsewhere. LmjPDEB1 and LmjPDEB2 are coded for by closely related, tandemly linked genes on chromosome 15. Both PDEs contain two GAF domains in their N-terminal region, and their almost identical catalytic domains are located at the C-terminus of the polypeptide. LmjPDEA, LmjPDEB1 and LmjPDEB2 were further characterized by functional complementation in a PDE-deficient S. cerevisiae strain. All three enzymes conferred complementation, demonstrating that all three can hydrolyze cAMP. Recombinant LmjPDEB1 and LmjPDEB2 were shown to be cAMP-specific, with Km values in the low micromolar range

  4. Short proofs of strong normalization

    OpenAIRE

    Wojdyga, Aleksander

    2008-01-01

    This paper presents simple, syntactic strong normalization proofs for the simply-typed lambda-calculus and the polymorphic lambda-calculus (system F) with the full set of logical connectives, and all the permutative reductions. The normalization proofs use translations of terms and types to systems, for which strong normalization property is known.

  5. Strong-back safety latch

    International Nuclear Information System (INIS)

    DeSantis, G.N.

    1995-01-01

    The calculation decides the integrity of the safety latch that will hold the strong-back to the pump during lifting. The safety latch will be welded to the strong-back and will latch to a 1.5-in. dia cantilever rod welded to the pump baseplate. The static and dynamic analysis shows that the safety latch will hold the strong-back to the pump if the friction clamps fail and the pump become free from the strong-back. Thus, the safety latch will meet the requirements of the Lifting and Rigging Manual for under the hook lifting for static loading; it can withstand shock loads from the strong-back falling 0.25 inch

  6. Cyclic deformation of Nb single crystals

    International Nuclear Information System (INIS)

    Guiu, F.; Anglada, M.

    1982-01-01

    The temperature and strain-rate dependence of the cyclic flow stress of Nb single crystals with two different axial orientations has been studied at temperatures between 175 and 350 K. This dependence is found to be independent of the crystal orientation when the internal stresses are taken into account, and the results are discussed in terms of the theory of thermally activated dislocation glide. A transition temperature can be identified at about 250 K which separates two regions with different thermally activated deformation behaviour. Above this transition temperature the strain rate can be described by a stress power law, and the activation energy can be represented by a logarithmic function of the stress, as in Escaig's model of screw dislocation mobility. In the temperature range 170 to 250 K the results are also in agreement with the more recent model proposed by Seeger. The large experimental errors inherent in the values of activation enthalpy at low stresses are emphasized and taken into account in the discussion of the results. It is suggested that either impurity-kink interactions or the flexibility of the screw dislocations are responsible for the trend towards the high values of activation enthalpy measured at the low stresses. (author)

  7. Discrete radioisotopic relays of a cyclic action

    International Nuclear Information System (INIS)

    Klempner, K.S.; Vasil'ev, A.G.

    1975-01-01

    A functional diagram of discrete radioisotopic relay equipment (RRP) with cyclic action was examined. An analysis of its rapid action and reliability under stationary conditions and transition regimes is presented. A structural diagram of radioisotopic relay equipment shows three radiation detectors, a pulse standardizer, an integrator and a power amplifier with a threshold cut-off device. It was established that the basic properties of the RRP - rapid action and reliability - are determined entirely by the counting rate of the average frequency of pulses from the radiation detector, n 0 and n 1 , in the 0 and 1 states (absence of current in the electromagnetic relay winding and activation of the winding of the output relay), capacities N 1 and N 2 of the dual counters, and the frequency of the transition threshold, f, of the generator. Formulas are presented which allow making engineering calculations for determining the optimum RRP parameters. High speed and reliability are shown, which are determined by the production purposes of the relay

  8. Step-by-step cyclic processes scheduling

    DEFF Research Database (Denmark)

    Bocewicz, G.; Nielsen, Izabela Ewa; Banaszak, Z.

    2013-01-01

    Automated Guided Vehicles (AGVs) fleet scheduling is one of the big problems in Flexible Manufacturing System (FMS) control. The problem is more complicated when concurrent multi-product manufacturing and resource deadlock avoidance policies are considered. The objective of the research is to pro......Automated Guided Vehicles (AGVs) fleet scheduling is one of the big problems in Flexible Manufacturing System (FMS) control. The problem is more complicated when concurrent multi-product manufacturing and resource deadlock avoidance policies are considered. The objective of the research...... is to provide a declarative model enabling to state a constraint satisfaction problem aimed at AGVs fleet scheduling subject to assumed itineraries of concurrently manufactured product types. In other words, assuming a given layout of FMS’s material handling and production routes of simultaneously manufactured...... orders, the main objective is to provide the declarative framework aimed at conditions allowing one to calculate the AGVs fleet schedule in online mode. An illustrative example of the relevant algebra-like driven step-by-stem cyclic scheduling is provided....

  9. Magnetic properties of cyclically deformed austenite

    Energy Technology Data Exchange (ETDEWEB)

    Das, Arpan, E-mail: dasarpan1@yahoo.co.in

    2014-06-01

    In meta-stable austenitic stainless steels, low cycle fatigue deformation is accompanied by a partial stress/strain-induced solid state phase transformation of paramagnetic γ(fcc) austenite phase to ferromagnetic α{sup /}(bcc) martensite. The measured characteristic of magnetic properties, which are the saturation magnetization, susceptibility, coercivity, retentivity, and the area under the magnetic hysteresis loop are sensitive to the total strain amplitude imposed and the corresponding material behaviour. The morphologies and nucleation characteristics of deformation induced martensites (i.e., ϵ(hcp), α{sup /}(bcc)) have been investigated through analytical transmission electron microscope. It has been observed that deformation induced martensites can nucleate at a number of sites (i.e., shear band intersections, isolated shear bands, shear band–grain boundary intersection, grain boundary triple points, etc.) through multiple transformation sequences: γ(fcc)→ϵ(hcp), γ(fcc)→ϵ(hcp)→α{sup /}(bcc), γ(fcc)→ deformation twin →α{sup /}(bcc) and γ(fcc)→α{sup /}(bcc). - Highlights: • LCF tests were done at various strain amplitudes of 304LNSS. • Quantification of martensite was done through ferritecope. • Magnetic properties were characterised through VSM. • Correlation of magnetic properties with the cyclic plastic response was done. • TEM was done to investigate the transformation micro-mechanisms.

  10. Cyclic metal migration in a groundwater stream

    International Nuclear Information System (INIS)

    Goerlich, W.; Portmann, W.; Wernli, C.; Linder, P.; Burkart, W.

    1988-04-01

    The behaviour of dissolved (<0.45 μm) inorganic species (e.g. metals, anions), and changes in relevant properties of polluted river water during infiltration into adjacent groundwater are investigated. Water from the river and from several wells is analyzed for temporal and spacial changes. For many of the measured quantities a pronounced annual cycle is observed. The temperature differences between summer and winter influence biological activity. Growth and degradation of organic material lead to drastic changes in pH and redox conditions in the near infiltration field. During summer, under relatively anoxic conditions, manganese oxides/hydroxides dissolve. In winter, the higher concentration of dissolved oxygen induce reprecipitation of manganese. Trace metal mobility (e.g. Cu, Zn, Cd) is influenced by these annual variations. In the river, daily cycles are observed for many of the measured quantities. These short term variations are induced by photosynthesis and respiration of aquatic biota. The cyclic behaviour disappears during the early stage of infiltration. The changes between river and groundwater can be modelled by a combination of simplified electron transfer and weathering reactions. (author) 11 refs., 5 figs

  11. Simulations of Granular Particles Under Cyclic Shear

    Science.gov (United States)

    Royer, John; Chaikin, Paul

    2012-02-01

    We perform molecular dynamics (MD) simulations of spherical grains subjected to cyclic, quasi-static shear in a 3D parallelepiped shear cell. This virtual shear cell is constructed out of rough, bumpy walls in order to minimize wall-induced ordering and has an open top surface to allow the packing to readily dilate or compact. Using a standard routine for MD simulations of frictional grains, we simulate over 1000 shear cycles, measuring grain displacements, the local packing density and changes in the contact network. Varying the shear amplitude and the friction coefficient between grains, we map out a phase diagram for the different types of behavior exhibited by these sheared grains. With low friction and high enough shear, the grains can spontaneously order into densely packed crystals. With low shear and increasing friction the packing remains disordered, yet the grains arrange themselves into configurations which exhibit limit cycles where all grains return to the same position after each full shear cycle. At higher shear and friction there is a transition to a diffusive state, where grains continue rearrange and move throughout the shear cell.

  12. Cyclic adenosine monophosphate levels and the function of skin microvascular endothelial cells.

    Science.gov (United States)

    Tuder, R M; Karasek, M A; Bensch, K G

    1990-02-01

    The maintenance of the normal epithelioid morphology of human dermal microvascular endothelial cells (MEC) grown in vitro depends strongly on the presence of factors that increase intracellular levels of cyclic AMP. Complete removal of dibutyryl cAMP and isobutylmethylxanthine (IMX) from the growth medium results in a progressive transition from an epithelioid to a spindle-shaped cell line. This transition cannot be reversed by the readdition of dibutyryl cAMP and IMX to the growth medium or by addition of agonists that increase cAMP levels. Spindle-shaped MEC lose the ability to express Factor VIII rAG and DR antigens and to bind peripheral blood mononuclear leukocyte (PBML). Ultrastructural analyses of transitional cells and spindle-shaped cells show decreased numbers of Weibel-Palade bodies in transitional cells and their complete absence in spindle-shaped cells. Interferon-gamma alters several functional properties of both epithelioid and spindle-shaped cells. In the absence of dibutyryl cAMP it accelerates the transition from epithelial to spindle-shaped cells, whereas in the presence of cyclic AMP interferon-gamma increases the binding of PBMLs to both epithelioid and spindle-shaped MEC and the endocytic activity of the endothelial cells. These results suggest that cyclic AMP is an important second messenger in the maintenance of several key functions of microvascular endothelial cells. Factors that influence the levels of this messenger in vivo can be expected to influence the angiogenic and immunologic functions of the microvasculature.

  13. Cyclic saturation dislocation structures of multiple-slip-oriented copper single crystals

    International Nuclear Information System (INIS)

    Li, X.W.; Chinese Academy of Sciences, Shenyang; Umakoshi, Y.; Li, S.X.; Wang, Z.G.

    2001-01-01

    The dislocation structures of [011] and [ anti 111] multiple-slip-oriented Cu single crystals cyclically saturated at constant plastic strain amplitudes were investigated through transmission electron microscopy. The results obtained on [001] multiple-slip-oriented Cu single crystals were also included for summarization. Unlike the case for single-slip-oriented Cu single crystals, the crystallographic orientation has a strong effect on the saturation dislocation structure in these three multiple-slip-oriented crystals. For the [011] crystal, different dislocation patterns such as veins, PSB walls, labyrinths and PSB ladders were observed. The formation of PSB ladders is believed to be a major reason for the existence of a plateau region in the cyclic stress-strain (CSS) curve for the [011] crystal. The cyclic saturation dislocation structure of a [ anti 111] crystal cycled at a low applied strain amplitude γ pl of 2.0 x 10 -4 was found to consist of irregular cells, which would develop into a more regular arrangement (e. g. PSB ladder-like) and the scale of which tends to decrease with increasing γ pl . Finally, three kinds of representative micro-deformation mode were summarized and termed as labyrinth-mode (or [001]-mode), cell-mode (or [ anti 111]-mode) and PSB ladder-mode (or [011]-mode). (orig.)

  14. Long-Term Cyclic Oxidation Behavior of Wrought Commercial Alloys at High Temperatures

    Energy Technology Data Exchange (ETDEWEB)

    Li, Bingtao [Iowa State Univ., Ames, IA (United States)

    2003-01-01

    The oxidation resistance of a high-temperature alloy is dependent upon sustaining the formation of a protective scale, which is strongly related to the alloying composition and the oxidation condition. The protective oxide scale only provides a finite period of oxidation resistance owing to its eventual breakdown, which is especially accelerated under thermal cycling conditions. This current study focuses on the long-term cyclic oxidation behavior of a number of commercial wrought alloys. The alloys studied were Fe- and Ni-based, containing different levels of minor elements, such as Si, Al, Mn, and Ti. Oxidation testing was conducted at 1000 and 1100 C in still air under both isothermal and thermal cycling conditions (1-day and 7-days). The specific aspects studied were the oxidation behavior of chromia-forming alloys that are used extensively in industry. The current study analyzed the effects of alloying elements, especially the effect of minor element Si, on cyclic oxidation resistance. The behavior of oxide scale growth, scale spallation, subsurface changes, and chromium interdiffusion in the alloy were analyzed in detail. A novel model was developed in the current study to predict the life-time during cyclic oxidation by simulating oxidation kinetics and chromium interdiffusion in the subsurface of chromia-forming alloys.

  15. Accelerated Cyclic Reduction: A Distributed-Memory Fast Solver for Structured Linear Systems

    KAUST Repository

    Chávez, Gustavo

    2017-12-15

    We present Accelerated Cyclic Reduction (ACR), a distributed-memory fast solver for rank-compressible block tridiagonal linear systems arising from the discretization of elliptic operators, developed here for three dimensions. Algorithmic synergies between Cyclic Reduction and hierarchical matrix arithmetic operations result in a solver that has O(kNlogN(logN+k2)) arithmetic complexity and O(k Nlog N) memory footprint, where N is the number of degrees of freedom and k is the rank of a block in the hierarchical approximation, and which exhibits substantial concurrency. We provide a baseline for performance and applicability by comparing with the multifrontal method with and without hierarchical semi-separable matrices, with algebraic multigrid and with the classic cyclic reduction method. Over a set of large-scale elliptic systems with features of nonsymmetry and indefiniteness, the robustness of the direct solvers extends beyond that of the multigrid solver, and relative to the multifrontal approach ACR has lower or comparable execution time and size of the factors, with substantially lower numerical ranks. ACR exhibits good strong and weak scaling in a distributed context and, as with any direct solver, is advantageous for problems that require the solution of multiple right-hand sides. Numerical experiments show that the rank k patterns are of O(1) for the Poisson equation and of O(n) for the indefinite Helmholtz equation. The solver is ideal in situations where low-accuracy solutions are sufficient, or otherwise as a preconditioner within an iterative method.

  16. Accelerated Cyclic Reduction: A Distributed-Memory Fast Solver for Structured Linear Systems

    KAUST Repository

    Chá vez, Gustavo; Turkiyyah, George; Zampini, Stefano; Ltaief, Hatem; Keyes, David E.

    2017-01-01

    We present Accelerated Cyclic Reduction (ACR), a distributed-memory fast solver for rank-compressible block tridiagonal linear systems arising from the discretization of elliptic operators, developed here for three dimensions. Algorithmic synergies between Cyclic Reduction and hierarchical matrix arithmetic operations result in a solver that has O(kNlogN(logN+k2)) arithmetic complexity and O(k Nlog N) memory footprint, where N is the number of degrees of freedom and k is the rank of a block in the hierarchical approximation, and which exhibits substantial concurrency. We provide a baseline for performance and applicability by comparing with the multifrontal method with and without hierarchical semi-separable matrices, with algebraic multigrid and with the classic cyclic reduction method. Over a set of large-scale elliptic systems with features of nonsymmetry and indefiniteness, the robustness of the direct solvers extends beyond that of the multigrid solver, and relative to the multifrontal approach ACR has lower or comparable execution time and size of the factors, with substantially lower numerical ranks. ACR exhibits good strong and weak scaling in a distributed context and, as with any direct solver, is advantageous for problems that require the solution of multiple right-hand sides. Numerical experiments show that the rank k patterns are of O(1) for the Poisson equation and of O(n) for the indefinite Helmholtz equation. The solver is ideal in situations where low-accuracy solutions are sufficient, or otherwise as a preconditioner within an iterative method.

  17. Laterally cyclic loading of monopile in dense sand

    DEFF Research Database (Denmark)

    Klinkvort, Rasmus Tofte; Hededal, Ole; Svensson, M.

    2011-01-01

    In order to investigate the response from laterally cyclic loading of monopiles a large centrifuge tests series is ongoing at the Technical University of Denmark (DTU). This paper will present some of the tests carried out with a focus on the influence of accumulation of rotation when changing...... the loading conditions. In these tests the load conditions are controlled by two load characteristics, one controlling the level of the cyclic loading and one controlling the characteristic of the cyclic loading. The centrifuge tests were performed in dense dry sand on a pile with prototype dimensions...

  18. Centrifuge modelling of a laterally cyclic loaded pile

    DEFF Research Database (Denmark)

    Klinkvort, Rasmus Tofte; Leth, Caspar Thrane; Hededal, Ole

    2010-01-01

    A total number of 9 static and 6 cyclic centrifuge tests on laterally loaded piles in very dense, dry sand was erformed. The prototype dimensions of the piles were 1 meter in diameter and penetration depths varying from 6 to 10 meters. The static tests were used to investigate the initial subgrade...... reaction modulus and as a reference for cyclic tests. For the cyclic tests the accumulation of deflections and the change in secant stiffness of the soil from repetitive loading were investigated. From all the tests carried out accumulations of deflections were seen. rom the centrifuge tests it was seen...

  19. The mycotoxin definition reconsidered towards fungal cyclic depsipeptides.

    Science.gov (United States)

    Taevernier, Lien; Wynendaele, Evelien; De Vreese, Leen; Burvenich, Christian; De Spiegeleer, Bart

    2016-04-02

    Currently, next to the major classes, cyclic depsipeptides beauvericin and enniatins are also positioned as mycotoxins. However, as there are hundreds more fungal cyclic depsipeptides already identified, should these not be considered as mycotoxins as well? The current status of the mycotoxin definition revealed a lack of consistency, leading to confusion about what compounds should be called mycotoxins. Because this is of pivotal importance in risk assessment prioritization, a clear and quantitatively expressed mycotoxin definition is proposed, based on data of widely accepted mycotoxins. Finally, this definition is applied to a set of fungal cyclic depsipeptides, revealing that some of these should indeed be considered as mycotoxins.

  20. Cyclic plasticity models and application in fatigue analysis

    Science.gov (United States)

    Kalev, I.

    1981-01-01

    An analytical procedure for prediction of the cyclic plasticity effects on both the structural fatigue life to crack initiation and the rate of crack growth is presented. The crack initiation criterion is based on the Coffin-Manson formulae extended for multiaxial stress state and for inclusion of the mean stress effect. This criterion is also applied for the accumulated damage ahead of the existing crack tip which is assumed to be related to the crack growth rate. Three cyclic plasticity models, based on the concept of combination of several yield surfaces, are employed for computing the crack growth rate of a crack plane stress panel under several cyclic loading conditions.

  1. Influence of cyclic torsional preloading on cyclic fatigue resistance of nickel - titanium instruments.

    Science.gov (United States)

    Pedullà, E; Lo Savio, F; Boninelli, S; Plotino, G; Grande, N M; Rapisarda, E; La Rosa, G

    2015-11-01

    To evaluate the effect of different torsional preloads on cyclic fatigue resistance of endodontic rotary instruments constructed from conventional nickel-titanium (NiTi), M-Wire or CM-Wire. Eighty new size 25, 0.06 taper Mtwo instruments (Sweden & Martina), size 25, 0.06 taper HyFlex CM (Coltene/Whaledent, Inc) and X2 ProTaper Next (Dentsply Maillefer) were used. The Torque and distortion angles at failure of new instruments (n = 10) were measured, and 0% (n = 10), 25%, 50% and 75% (n = 20) of the mean ultimate torsional strength as preloading condition were applied according to ISO 3630-1 for each brand. The twenty files tested for every extent of preload were subjected to 20 or 40 torsional cycles (n = 10). After torsional preloading, the number of cycles to failure was evaluated in a simulated canal with 60° angle of curvature and 5 mm of radius of curvature. Data were analysed using two-way analysis of variance. The fracture surface of each fragment was examined with a scanning electron microscope (SEM). Data were analysed by two-way analyses of variance. Preload repetitions did not influence the cyclic fatigue of the three brands; however, the 25%, 50% and 75% torsional preloading significantly reduced the fatigue resistance of all instruments tested (P 0.05). Torsional preloads reduced the cyclic fatigue resistance of conventional and treated (M-wire and CM-wire) NiTi rotary instruments except for size 25, 0.06 taper HyFlex CM instruments with a 25% of torsional preloading. © 2014 International Endodontic Journal. Published by John Wiley & Sons Ltd.

  2. Cyclic response and early damage evolution in multiaxial cyclic loading of 316L austenitic steel

    Czech Academy of Sciences Publication Activity Database

    Mazánová, Veronika; Škorík, Viktor; Kruml, Tomáš; Polák, Jaroslav

    2017-01-01

    Roč. 100, JUL (2017), s. 466-476 ISSN 0142-1123 R&D Projects: GA MŠk LM2015069; GA MŠk(CZ) LQ1601; GA ČR(CZ) GA13-23652S; GA ČR GA15-08826S Institutional support: RVO:68081723 Keywords : 316L steel * Crack initiation * Cyclic plasticity * Damage mechanism * Multiaxial straining Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering, reliability analysis Impact factor: 2.899, year: 2016

  3. Cyclic softening in annealed Zircaloy-2: Role of edge dislocation dipoles and vacancies

    Science.gov (United States)

    Sudhakar Rao, G.; Singh, S. R.; Krsjak, Vladimir; Singh, Vakil

    2018-04-01

    The mechanism of cyclic softening in annealed Zircaloy-2 at low strain amplitudes under strain controlled fatigue at room temperature is rationalized. The unusual softening due to continuous decrease in the phenomenological friction stress is found to be associated with decrease in the resistance against movement of dislocations because of the formation and easy glide of pure edge dislocation dipoles and consequent decrease in friction stress from reduction in the shear modulus. Positron annihilation spectroscopy data strongly support the increase in edge dislocation density containing jogs, from increased positron trapping and increase in annihilation lifetime.

  4. Cyclic elastic analysis of a PWR nozzle subjected to a repeated thermal shock

    International Nuclear Information System (INIS)

    Locci, J.M.; Prost, J.P.

    1979-01-01

    In the primary piping system of a PWR nuclear power plant, some nozzles are subjected to strong thermal shocks due to sudden thermal variations in the internal water flow. The thermal gradients are sufficiently high to induce general elastic plastic behaviour. The design of these nozzles using the simplified elastic plastic analysis given in the ASME III Code NB-3200 generally leads to a very high usage factor. The aim of this work is to show by giving an example that a complete cyclic elastic plastic analysis makes it possible to considerably reduce the usage factor. (orig.)

  5. Cyclic Fiber Push-In Test Monitors Evolution of Interfacial Behavior in Ceramic Matrix Composites

    Science.gov (United States)

    Eldridge, Jeffrey I.

    1998-01-01

    SiC fiber-reinforced ceramic matrix composites are being developed for high-temperature advanced jet engine applications. Obtaining a strong, tough composite material depends critically on optimizing the mechanical coupling between the reinforcing fibers and the surrounding matrix material. This has usually been accomplished by applying a thin C or BN coating onto the surface of the reinforcing fibers. The performance of these fiber coatings, however, may degrade under cyclic loading conditions or exposure to different environments. Degradation of the coating-controlled interfacial behavior will strongly affect the useful service lifetime of the composite material. Cyclic fiber push-in testing was applied to monitor the evolution of fiber sliding behavior in both C- and BN-coated small-diameter (15-mm) SiC-fiber-reinforced ceramic matrix composites. The cyclic fiber push-in tests were performed using a desktop fiber push-out apparatus. At the beginning of each test, the fiber to be tested was aligned underneath a 10- mm-diameter diamond punch; then, the applied load was cycled between selected maximum and minimum loads. From the measured response, the fiber sliding distance and frictional sliding stresses were determined for each cycle. Tests were performed in both room air and nitrogen. Cyclic fiber push-in tests of C-coated, SiC-fiber-reinforced SiC showed progressive increases in fiber sliding distances along with decreases in frictional sliding stresses for continued cycling in room air. This rapid degradation in interfacial response was not observed for cycling in nitrogen, indicating that moisture exposure had a large effect in immediately lowering the frictional sliding stresses of C-coated fibers. These results indicate that matrix cracks bridged by C-coated fibers will not be stable, but will rapidly grow in moisture-containing environments. In contrast, cyclic fiber push-in tests of both BN-coated, SiC-fiber-reinforced SiC and BNcoated, Si

  6. Cyclic steady states in diffusion-induced plasticity with applications to lithium-ion batteries

    Science.gov (United States)

    Peigney, Michaël

    2018-02-01

    Electrode materials in lithium-ion batteries offer an example of medium in which stress and plastic flow are generated by the diffusion of guest atoms. In such a medium, deformation and diffusion are strongly coupled processes. For designing electrodes with improved lifetime and electro-mechanical efficiency, it is crucial to understand how plasticity and diffusion evolve over consecutive charging-recharging cycles. With such questions in mind, this paper provides general results for the large-time behavior of media coupling plasticity with diffusion when submitted to cyclic chemo-mechanical loadings. Under suitable assumptions, we show that the stress, the plastic strain rate, the chemical potential and the flux of guest atoms converge to a cyclic steady state which is largely independent of the initial state. A special emphasis is laid on the special case of elastic shakedown, which corresponds to the situation where the plastic strain stops evolving after a sufficiently large number of cycles. Elastic shakedown is expected to be beneficial for the fatigue behavior and - in the case of lithium-ion batteries - for the electro-chemical efficiency. We provide a characterization of the chemo-mechanical loadings for which elastic shakedown occurs. Building on that characterization, we suggest a general method for designing structures in such fashion that they operate in the elastic shakedown regime, whatever the initial state is. An attractive feature of the proposed method is that incremental analysis of the fully coupled plasticity-diffusion problem is avoided. The results obtained are applied to the model problem of a battery electrode cylinder particle under cyclic charging. Closed-form expressions are obtained for the set of charging rates and charging amplitudes for which elastic shakedown occurs, as well as for the corresponding cyclic steady states of stress, lithium concentration and chemical potential. Some results for a spherical particle are also presented.

  7. Crack-jump mechanism of microvein formation and its implications for stress cyclicity during extension fracturing

    Science.gov (United States)

    Caputo, Riccardo; Hancock, Paul L.

    1998-11-01

    It is well accepted and documented that faulting is produced by the cyclic behaviour of a stress field. Some extension fractures, such as veins characterised by the crack-seal mechanism, have also been presumed to result from repeated stress cycles. In the present note, some commonly observed field phenomena and relationships such as hackle marks and vein and joint spacing, are employed to argue that a stress field can also display cyclic behaviour during extensional fracturing. Indeed, the requirement of critical stress conditions for the occurrence of extensional failure events does not accord with the presence of contemporaneously open nearby parallel fractures. Therefore, because after each fracture event there is stress release within the surrounding volume of rock, high density sets of parallel extensional fractures also strongly support the idea that rocks undergo stress cyclicity during jointing and veining. A comparison with seismological data from earthquakes with dipole mechanical solutions, confirms that this process presently occurs at depth in the Earth crust. Furthermore, in order to explain dense sets of hair-like closely spaced microveins, a crack-jump mechanism is introduced here as an alternative to the crack-seal mechanism. We also propose that as a consequence of medium-scale stress cyclicity during brittle deformation, the re-fracturing of a rock mass occurs in either one or the other of these two possible ways depending on the ratio between the elastic parameters of the sealing material and those of the host rock. The crack-jump mechanism occurs when the former is stronger.

  8. Modeling Individual Cyclic Variation in Human Behavior.

    Science.gov (United States)

    Pierson, Emma; Althoff, Tim; Leskovec, Jure

    2018-04-01

    Cycles are fundamental to human health and behavior. Examples include mood cycles, circadian rhythms, and the menstrual cycle. However, modeling cycles in time series data is challenging because in most cases the cycles are not labeled or directly observed and need to be inferred from multidimensional measurements taken over time. Here, we present Cyclic Hidden Markov Models (CyH-MMs) for detecting and modeling cycles in a collection of multidimensional heterogeneous time series data. In contrast to previous cycle modeling methods, CyHMMs deal with a number of challenges encountered in modeling real-world cycles: they can model multivariate data with both discrete and continuous dimensions; they explicitly model and are robust to missing data; and they can share information across individuals to accommodate variation both within and between individual time series. Experiments on synthetic and real-world health-tracking data demonstrate that CyHMMs infer cycle lengths more accurately than existing methods, with 58% lower error on simulated data and 63% lower error on real-world data compared to the best-performing baseline. CyHMMs can also perform functions which baselines cannot: they can model the progression of individual features/symptoms over the course of the cycle, identify the most variable features, and cluster individual time series into groups with distinct characteristics. Applying CyHMMs to two real-world health-tracking datasets-of human menstrual cycle symptoms and physical activity tracking data-yields important insights including which symptoms to expect at each point during the cycle. We also find that people fall into several groups with distinct cycle patterns, and that these groups differ along dimensions not provided to the model. For example, by modeling missing data in the menstrual cycles dataset, we are able to discover a medically relevant group of birth control users even though information on birth control is not given to the model.

  9. Determination of band structure parameters and the quasi-particle gap of CdSe quantum dots by cyclic voltammetry.

    Science.gov (United States)

    Inamdar, Shaukatali N; Ingole, Pravin P; Haram, Santosh K

    2008-12-01

    Band structure parameters such as the conduction band edge, the valence band edge and the quasi-particle gap of diffusing CdSe quantum dots (Q-dots) of various sizes were determined using cyclic voltammetry. These parameters are strongly dependent on the size of the Q-dots. The results obtained from voltammetric measurements are compared to spectroscopic and theoretical data. The fit obtained to the reported calculations based on the semi-empirical pseudopotential method (SEPM)-especially in the strong size-confinement region, is the best reported so far, according to our knowledge. For the smallest CdSe Q-dots, the difference between the quasi-particle gap and the optical band gap gives the electron-hole Coulombic interaction energy (J(e1,h1)). Interband states seen in the photoluminescence spectra were verified with cyclic voltammetry measurements.

  10. Safety Discrete Event Models for Holonic Cyclic Manufacturing Systems

    Science.gov (United States)

    Ciufudean, Calin; Filote, Constantin

    In this paper the expression “holonic cyclic manufacturing systems” refers to complex assembly/disassembly systems or fork/join systems, kanban systems, and in general, to any discrete event system that transforms raw material and/or components into products. Such a system is said to be cyclic if it provides the same sequence of products indefinitely. This paper considers the scheduling of holonic cyclic manufacturing systems and describes a new approach using Petri nets formalism. We propose an approach to frame the optimum schedule of holonic cyclic manufacturing systems in order to maximize the throughput while minimize the work in process. We also propose an algorithm to verify the optimum schedule.

  11. Cyclic deformation of NiTi shape memory alloys

    International Nuclear Information System (INIS)

    Liu Yong; Van Humbeeck, J.; Xie Zeliang

    1999-01-01

    Recently, there is an increasing interest in applying the high damping capacity of shape memory alloys (SMAs). The purpose is to explore the feasibility of those materials for the protection of buildings and other civil constructions as a result of earthquake damages. So far, few experimental results have been reported concerning the mechanical cyclic behaviour of SMAs in their martensitic state (ferroelastic). In the present work, the experimental results on the mechanical behaviour of martensitic NiTi SMAs under tension-compression cyclic deformation up to strains of ±4% are summarized with major attention to the damping capacity, characteristic stresses and strains as a function of deformation cycles. Effect of strain rate, strain amplitude and annealing condition on the martensite damping is summarized. Explanation of the cyclic hardening and cyclic softening phenomenon is proposed based on TEM observations. (orig.)

  12. Quantum Codes From Cyclic Codes Over The Ring R 2

    International Nuclear Information System (INIS)

    Altinel, Alev; Güzeltepe, Murat

    2016-01-01

    Let R 2 denotes the ring F 2 + μF 2 + υ 2 + μυ F 2 + wF 2 + μwF 2 + υwF 2 + μυwF 2 . In this study, we construct quantum codes from cyclic codes over the ring R 2 , for arbitrary length n, with the restrictions μ 2 = 0, υ 2 = 0, w 2 = 0, μυ = υμ, μw = wμ, υw = wυ and μ (υw) = (μυ) w. Also, we give a necessary and sufficient condition for cyclic codes over R 2 that contains its dual. As a final point, we obtain the parameters of quantum error-correcting codes from cyclic codes over R 2 and we give an example of quantum error-correcting codes form cyclic codes over R 2 . (paper)

  13. Cyclic deformation behaviour of austenitic steels at ambient and ...

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    Fatigue; cyclic deformation behaviour; metastable austenitic steel; .... Figure 4 shows a sequence of the basic diagrams which can be used to assess the fatigue .... well as the change of temperature and the development of the magnetic ...

  14. Constitutive model and electroplastic analysis of structures under cyclic loading

    International Nuclear Information System (INIS)

    Wang, X.; Lei, Y; Du, Q.

    1989-01-01

    Many engineering structures in nuclear reactors, thermal power stations, chemical plants and aerospace vehicles are subjected to cyclic mechanic-thermal loading, which is the main cause of structural fatigue failure. Over the past twenty years, designers and researchers have paid great attention to the research on life prediction and elastoplastic analysis of structures under cyclic loading. One of the key problems in elastoplastic analysis is to construct a reasonable constitutive model for cyclic plasticity. In the paper, the constitutive equations are briefly outlined. Then, the model is implemented in a finite element code to predict the response of cyclic loaded structural components such as a double-edge-notched plate, a grooved bar and a nozzle in spherical shell. Numerical results are compared with those from other theories and experiments

  15. The Cyclical Relationship Approach in Teaching Basic Accounting Principles.

    Science.gov (United States)

    Golen, Steven

    1981-01-01

    Shows how teachers can provide a more meaningful presentation of various accounting principles by illustrating them through a cyclical relationship approach. Thus, the students see the entire accounting relationship as a result of doing business. (CT)

  16. Riboflavin in cyclic vomiting syndrome: efficacy in three children.

    Science.gov (United States)

    Martinez-Esteve Melnikova, Anastasia; Schäppi, Michela G; Korff, Christian

    2016-01-01

    Cyclic vomiting syndrome is an episodic disorder considered to be a migraine variant. Riboflavin is efficient in the prophylactic treatment of migraines in adults. We describe the effectiveness and tolerance of riboflavin treatment in three children with cyclic vomiting syndrome. All of them fulfilled the diagnosis criteria for cyclic vomiting syndrome. They received prophylactic monotherapy with riboflavin for at least 12 months. Excellent response and tolerability was observed. Based on clinical observation in three cases, riboflavin may be an effective and safe prophylactic treatment for children with cyclic vomiting syndrome. CVS is one of the "childhood periodic syndromes" classified as a migraine subtype by the International Headache Society. Riboflavin is currently used as a prophylactic treatment in patients with migraine. Riboflavin may be an effective and safe prophylactic treatment for children with CVS. Increasing doses of riboflavin and long periods of prophylaxis may be needed in some children..

  17. INFLUENCE OF INTERMITTENT CYCLIC LOADING ON REINFORCED CONCRETE RESISTANCE MODEL

    Directory of Open Access Journals (Sweden)

    Vasyl Karpiuk

    2017-01-01

    Full Text Available This article describes the study of reinforced concrete span bending structures under conditions of high-level cyclic loading. Previous studies on the development of physical models of bending reinforced concrete element fatigue resistance, cyclic effect of lateral forces, and methods of calculation, are important and appropriate owing to certain features and the essential specificity of the mentioned loading type. These primarily include the nonlinearity of deformation, damage accumulation in the form of fatigue micro- and macro-cracks, and exhausting destruction of construction materials. In this paper, key expressions determining the endurance limits of concrete, longitudinal reinforcement, and anchoring longitudinal reinforcement, which contribute to endurance throughout the entire construction, are considered. Establishing a link between stresses in the elements and deformations in the element under conditions of cyclic loading action is of equal importance because of the presence of cyclic stress-induced creep deformation.

  18. Cyclical Cushing's syndrome due to an atypical thymic carcinoid

    NARCIS (Netherlands)

    Meinardi, [No Value; van den Berg, G; Wolffenbuttel, BHR; Kema, IP; Dullaart, RPF

    A 43-year-old man presented with fluctuating symptoms of weight gain, shortness of breath, pretibial oedema, associated with anxiety and memory disturbances. Laboratory investigation revealed an adrenocorticotropin (ACTH)-dependent cyclical Cushing's syndrome characterised by remarkable variations

  19. A Novel Cyclic Catalytic Reformer for Hydrocarbon Fuels, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposed Small Business Innovative Research (SBIR) Phase I addresses development of a compact reformer system based on a cyclic partial oxidation (POx)...

  20. Association of Marijuana Use and Cyclic Vomiting Syndrome

    Directory of Open Access Journals (Sweden)

    Mithun B. Pattathan

    2012-06-01

    Full Text Available Cannabis use has become one of the most commonly abused drugs in the world. It is estimated that each year 2.6 million individuals in the USA become new users and most are younger than 19 years of age. Reports describe marijuana use as high as 40–50% in male Cyclic Vomiting Syndrome patients. It is this interest in cannabis in the World, coupled with recognition of a cyclic vomiting illness associated with its chronic use that beckons a review of the most current articles, as well as a contribution from our own experiences in this area. The similarities we have demonstrated for both cannibinoid hyperemesis syndrome and cyclic vomiting make the case that cannibinoid hyperemesis syndrome is a subset of patients who have the diagnoses of cyclic vomiting syndrome and the role of marijuana should always be considered in the diagnosis of CVS, particularly in males.

  1. The evolution of GDP in USA using cyclic regression analysis

    OpenAIRE

    Catalin Angelo IOAN; Gina IOAN

    2013-01-01

    Based on the four major types of economic cycles (Kondratieff, Juglar, Kitchin, Kuznet), the paper aims to determine their actual length (for the U.S. economy) using cyclic regressions based on Fourier analysis.

  2. Cyclical mastalgia: Prevalence and associated determinants in Hamadan City, Iran

    Directory of Open Access Journals (Sweden)

    Fatemeh Shobeiri

    2016-03-01

    Conclusions: Most of women with breast discomfort suffered cyclical mastalgia which severity can be determined by advanced age, age of marriage, history of abortion and history of premenstrual syndrome, but inversely by oral contraceptive use and exercise activity.

  3. The Chemistry of Cyclic All-Nitrogen Molecules

    National Research Council Canada - National Science Library

    Wodtke, Alec M

    2006-01-01

    ..., $474,927, February 15, 2004 - December 31, 2006. During this period, we have extended our preliminary investigations of azide photochemistry, with the aim of demonstrating unambiguously the photochemical production of cyclic-N, and of revealing...

  4. Multiaxial elastoplastic cyclic loading of austenitic 316L steel

    Czech Academy of Sciences Publication Activity Database

    Mazánová, Veronika; Polák, Jaroslav; Škorík, Viktor; Kruml, Tomáš

    2017-01-01

    Roč. 11, č. 40 (2017), s. 162-169 ISSN 1971-8993 R&D Projects: GA ČR(CZ) GA13-23652S; GA MŠk LM2015069; GA MŠk(CZ) LQ1601; GA ČR GA15-08826S Institutional support: RVO:68081723 Keywords : 316L steel * Crack initiation * Cyclic stress-strain curve * Multiaxial cyclic loading Subject RIV: JL - Materials Fatigue, Friction Mechanics OBOR OECD: Audio engineering, reliability analysis

  5. Phantom energy accretion onto black holes in a cyclic universe

    International Nuclear Information System (INIS)

    Sun Chengyi

    2008-01-01

    Black holes pose a serious problem in cyclic or oscillating cosmology. It is speculated that, in the cyclic universe with phantom turnarounds, black holes will be torn apart by phantom energy prior to turnaround before they can create any problems. In this paper, using the mechanism of phantom accretion onto black holes, we find that black holes do not disappear before phantom turnaround. But the remanent black holes will not cause any problems due to Hawking evaporation.

  6. Microgravity changes in heart structure and cyclic-AMP metabolism

    Science.gov (United States)

    Philpott, D. E.; Fine, A.; Kato, K.; Egnor, R.; Cheng, L.

    1985-01-01

    The effects of microgravity on cardiac ultrastructure and cyclic AMP metabolism in tissues of rats flown on Spacelab 3 are reported. Light and electron microscope studies of cell structure, measurements of low and high Km phosphodiesterase activity, cyclic AMP-dependent protein kinase activity, and regulatory subunit compartmentation show significant deviations in flight animals when compared to ground controls. The results indicate that some changes have occurred in cellular responses associated with catecholamine receptor interactions and intracellular signal processing.

  7. Constraining cyclic peptides to mimic protein structure motifs

    DEFF Research Database (Denmark)

    Hill, Timothy A.; Shepherd, Nicholas E.; Diness, Frederik

    2014-01-01

    peptides can have protein-like biological activities and potencies, enabling their uses as biological probes and leads to therapeutics, diagnostics and vaccines. This Review highlights examples of cyclic peptides that mimic three-dimensional structures of strand, turn or helical segments of peptides...... and proteins, and identifies some additional restraints incorporated into natural product cyclic peptides and synthetic macrocyclic pepti-domimetics that refine peptide structure and confer biological properties....

  8. Facile and Green Synthesis of Saturated Cyclic Amines

    Directory of Open Access Journals (Sweden)

    Arruje Hameed

    2017-10-01

    Full Text Available Single-nitrogen containing saturated cyclic amines are an important part of both natural and synthetic bioactive compounds. A number of methodologies have been developed for the synthesis of aziridines, azetidines, pyrrolidines, piperidines, azepanes and azocanes. This review highlights some facile and green synthetic routes for the synthesis of unsubstituted, multisubstituted and highly functionalized saturated cyclic amines including one-pot, microwave assisted, metal-free, solvent-free and in aqueous media.

  9. Paediatric cyclical Cushing's disease due to corticotroph cell hyperplasia.

    LENUS (Irish Health Repository)

    Noctor, E

    2015-06-01

    Cushing\\'s disease is very rare in the paediatric population. Although uncommon, corticotroph hyperplasia causing Cushing\\'s syndrome has been described in the adult population, but appears to be extremely rare in children. Likewise, cyclical cortisol hypersecretion, while accounting for 15 % of adult cases of Cushing\\'s disease, has only rarely been described in the paediatric population. Here, we describe a very rare case of a 13-year old boy with cyclical cortisol hypersecretion secondary to corticotroph cell hyperplasia.

  10. Deformation localization and cyclic strength in polycrystalline molybdenum

    Energy Technology Data Exchange (ETDEWEB)

    Sidorov, O.T.; Rakshin, A.F.; Fenyuk, M.I.

    1983-06-01

    Conditions of deformation localization and its interrelation with cyclic strength in polycrystalline molybdenum were investigated. A fatigue failure of polycrystalline molybdenum after rolling and in an embrittled state reached by recrystallization annealing under cyclic bending at room temperature takes place under nonuniform distribution of microplastic strain resulting in a temperature rise in separate sections of more than 314 K. More intensive structural changes take place in molybdenum after rolling than in recrystallized state.

  11. One-dimensional model of cable-in-conduit superconductors under cyclic loading using artificial neural networks

    International Nuclear Information System (INIS)

    Lefik, M.; Schrefler, B.A.

    2002-01-01

    An artificial neural network with two hidden layers is trained to define a mechanical constitutive relation for superconducting cable under transverse cyclic loading. The training is performed using a set of experimental data. The behaviour of the cable is strongly non-linear. Irreversible phenomena result with complicated loops of hysteresis. The performance of the ANN, which is applied as a tool for storage, interpolation and interpretation of experimental data is investigated, both from numerical, as well as from physical viewpoints

  12. Effect of cyclic torsional preloading on cyclic fatigue resistance of ProTaper Next and Mtwo nickel–titanium instruments

    Directory of Open Access Journals (Sweden)

    Eugenio Pedullà

    2015-06-01

    Conclusions: Torsional preloads reduced the cyclic fatigue resistance of M-wire and conventional (as ProTaper Next and Mtwo NiTi rotary instruments except for Mtwo with 25% or 50% of torsional preloading.

  13. Comparison Of INAA Methods (Long Conventional, Cyclic And Pseudo-Cyclic) For The Determination Of Se In Biological Samples

    International Nuclear Information System (INIS)

    Sarheel, A.

    2004-01-01

    Selenium content in serum blood, sample were received from international comparison programme (SABC) has been determined by Cyclic irradiation, pseudo-cyclic irradiation and long irradiation conventional Instrumental neutron activation analysis through the 162 keV gamma ray of the 77m Se nuclide for both cyclic and pseudo-cyclic and 264 keV gamma ray of 75 Se nuclide for conventional (long irradiation). The CINAA involve irradiation of samples for 20 s, decay for 15 s and counting for 20 s, samples recycling four times to improve the precision. The PCINAA involve irradiation of samples for 20 s, decay for 20 s and counting for 30s, samples recycling four times day by day. The Conventional (long irradiation) involve irradiation of samples for 20 hr (1 week), decay for 4 weeks and counting for 20 hr. The accuracy has been evaluated by analyzing the certified reference materials. (Author)

  14. Wild cyclic voles maintain high neutral and MHC diversity without strong evidence for parasite-mediated selection

    Czech Academy of Sciences Publication Activity Database

    Winternitz, Jamie Caroline; Wares, J. P.; Yabsley, M. J.; Altizer, S.

    2014-01-01

    Roč. 28, č. 5 (2014), s. 957-975 ISSN 0269-7653 Institutional support: RVO:68081766 Keywords : Major histocompatibility complex * Host-parasite relationship * Balancing selection * Microtus montanus * Cestodes * Eimeria * Microsatellites Subject RIV: EG - Zoology Impact factor: 2.517, year: 2014

  15. Cyclic steps and superimposed antidune deposits: important elements of coarse-grained deepwater channel-levée complexes

    Science.gov (United States)

    Lang, Joerg; Brandes, Christian; Winsemann, Jutta

    2017-04-01

    The facies distribution and architecture of submarine fans can be strongly impacted by erosion and deposition by supercritical density flows. We present field examples from the Sandino Forearc Basin (southern Central America), where cyclic-step and antidune deposits represent important sedimentary facies of coarse-grained channel-levée complexes. These bedforms occur in all sub-environments of the depositional systems and relate to the different stages of avulsion, bypass, levée construction and channel backfilling. Large-scale scours (18 to 29 m deep, 18 to 25 m wide, 60 to >120 m long) with an amalgamated infill, comprising massive, normally coarse-tail graded or spaced subhorizontally stratified conglomerates and pebbly sandstones, are interpreted as deposits of the hydraulic-jump zone of cyclic steps. These cyclic steps probably formed during avulsion, when high-density flows were routed into the evolving channel. The large-scale scour fills can be distinguished from small-scale channel fills based on the preservation of a steep upper margin and a coarse-grained infill comprising mainly amalgamated hydraulic-jump deposits. Channel fills include repetitive successions deposited by cyclic steps with superimposed antidunes. The hydraulic-jump zone of cyclic-step deposits comprises regularly spaced scours (0.2 to 2.6 m deep, 0.8 to 23 m wide), which are infilled by intraclast-rich conglomerates or pebbly sandstones and display normal coarse-tail grading or backsets. Laterally and vertically these deposits are associated with subhorizontally stratified, low-angle cross-stratified or sinusoidal stratified pebbly sandstones and sandstones (wavelength 0.5 to 18 m), interpreted as representing antidune deposits formed on the stoss-side of the cyclic steps during flow re-acceleration. The field examples indicate that so-called crudely or spaced stratified deposits may commonly represent antidune deposits with varying stratification styles controlled by the aggradation

  16. Strong coupling phase in QED

    International Nuclear Information System (INIS)

    Aoki, Ken-ichi

    1988-01-01

    Existence of a strong coupling phase in QED has been suggested in solutions of the Schwinger-Dyson equation and in Monte Carlo simulation of lattice QED. In this article we recapitulate the previous arguments, and formulate the problem in the modern framework of the renormalization theory, Wilsonian renormalization. This scheme of renormalization gives the best understanding of the basic structure of a field theory especially when it has a multi-phase structure. We resolve some misleading arguments in the previous literature. Then we set up a strategy to attack the strong phase, if any. We describe a trial; a coupled Schwinger-Dyson equation. Possible picture of the strong coupling phase QED is presented. (author)

  17. Effect of Surgical Removal of Endometriomas on Cyclic and Non-cyclic Pelvic Pain

    Directory of Open Access Journals (Sweden)

    Murat Api

    2015-07-01

    Full Text Available Background: Endometriosis is a complex disease with a spectrum of pain symptoms from mild dysmenorrhea to debilitating pelvic pain. There is no concrete evidence in the literature whether endometriotic cyst per se, causes pain spectrum related to the disease. The aim of the present study was to evaluate the effect of surgical removal of endometriomas on pain symptoms. Materials and Methods: In this prospective, observational, before-after study, which was conducted between March 2012 and January 2013 in Training and Research Hospital,Adana, Turkey, a total of 23 patients including 16 sexually active and 7 virgin symptomatic women were questioned for non-cyclic pelvic pain (NCPP, intensity of the NCPP, presence of cyclic dysmenorrhea, and dyspareunia before and after the endometrioma operation. Participants who were sonographically diagnosed and later pathologically confirmed as having endometrioma without sign and symptoms of deep infiltrative endometriosis (DIE were also questioned for pain symptoms before and after the laparoscopic removal of cyst wall. Patients with intraabdominal adhesions, history of pelvic inflammatory disease, and pathological diagnosis other than endometrioma were excluded. No ancillary procedures were applied for pain management, but if pain was present, pelvic peritoneal endometriotic lesions were ablated beside the removal of ovarian endometriotic cysts. Results: Out of 23 cases with endometrioma, 91 and 78% reported to have NCPP and dysmenorrhea, respectively, before the operation, while 60 and 48%, respectively, after the operation (McNemar’s test, P=0.016 for both figures. Among the sexually active cases, 31% (5/16 had dyspareunia before the operation and only 1 case reported the pain relief after the operation (McNemar’s test, P=1. Intensity of NCPP were reported to be none (8.7%, moderate (21.7%, severe (56.5% and unbearable (13% before the operation and decreased to none (43.5%, mild (43.5%, moderate (4

  18. Strong interactions at high energy

    International Nuclear Information System (INIS)

    Anselmino, M.

    1995-01-01

    Spin effects in strong interaction high energy processes are subtle phenomena which involve both short and long distance physics and test perturbative and non perturbative aspects of QCD. Moreover, depending on quantities like interferences between different amplitudes and relative phases, spin observables always test a theory at a fundamental quantum mechanical level; it is then no surprise that spin data are often difficult to accommodate within the existing models. A report is made on the main issues and contributions discussed in the parallel Session on the open-quote open-quote Strong interactions at high energy close-quote close-quote in this Conference. copyright 1995 American Institute of Physics

  19. Strong-field dissociation dynamics

    International Nuclear Information System (INIS)

    DiMauro, L.F.; Yang, Baorui.

    1993-01-01

    The strong-field dissociation behavior of diatomic molecules is examined under two distinctive physical scenarios. In the first scenario, the dissociation of the isolated hydrogen and deuterium molecular ions is discussed. The dynamics of above-threshold dissociation (ATD) are investigated over a wide range of green and infrared intensities and compared to a dressed-state model. The second situation arises when strong-field neutral dissociation is followed by ionization of the atomic fragments. The study results in a direct measure of the atomic fragment's ac-Stark shift by observing the intensity-dependent shifts in the electron or nuclear fragment kinetic energy. 8 figs., 14 refs

  20. Strong Decomposition of Random Variables

    DEFF Research Database (Denmark)

    Hoffmann-Jørgensen, Jørgen; Kagan, Abram M.; Pitt, Loren D.

    2007-01-01

    A random variable X is stongly decomposable if X=Y+Z where Y=Φ(X) and Z=X-Φ(X) are independent non-degenerated random variables (called the components). It is shown that at least one of the components is singular, and we derive a necessary and sufficient condition for strong decomposability...... of a discrete random variable....

  1. Strong coupling electroweak symmetry breaking

    International Nuclear Information System (INIS)

    Barklow, T.L.; Burdman, G.; Chivukula, R.S.

    1997-04-01

    The authors review models of electroweak symmetry breaking due to new strong interactions at the TeV energy scale and discuss the prospects for their experimental tests. They emphasize the direct observation of the new interactions through high-energy scattering of vector bosons. They also discuss indirect probes of the new interactions and exotic particles predicted by specific theoretical models

  2. Strong coupling electroweak symmetry breaking

    Energy Technology Data Exchange (ETDEWEB)

    Barklow, T.L. [Stanford Linear Accelerator Center, Menlo Park, CA (United States); Burdman, G. [Univ. of Wisconsin, Madison, WI (United States). Dept. of Physics; Chivukula, R.S. [Boston Univ., MA (United States). Dept. of Physics

    1997-04-01

    The authors review models of electroweak symmetry breaking due to new strong interactions at the TeV energy scale and discuss the prospects for their experimental tests. They emphasize the direct observation of the new interactions through high-energy scattering of vector bosons. They also discuss indirect probes of the new interactions and exotic particles predicted by specific theoretical models.

  3. The colours of strong interaction

    International Nuclear Information System (INIS)

    1995-01-01

    The aim of this session is to draw a consistent framework about the different ways to consider strong interaction. A large part is dedicated to theoretical work and the latest experimental results obtained at the first electron collider HERA are discussed. (A.C.)

  4. Strong cosmic censorship and the strong curvature singularities

    International Nuclear Information System (INIS)

    Krolak, A.

    1987-01-01

    Conditions are given under which any asymptotically simple and empty space-time that has a partial Cauchy surface with an asymptotically simple past is globally hyperbolic. It is shown that this result suggests that the Cauchy horizons of the type occurring in Reissner--Nordstroem and Kerr space-times are unstable. This in turn gives support for the validity of the strong cosmic censorship hypothesis

  5. The Role of Cyclic Nucleotide Signaling Pathways in Cancer: Targets for Prevention and Treatment

    Energy Technology Data Exchange (ETDEWEB)

    Fajardo, Alexandra M.; Piazza, Gary A. [Drug Discovery Research Center, Mitchell Cancer Institute, University of South Alabama, 1660 Springhill Ave, Suite 3029, Mobile, AL 36604 (United States); Tinsley, Heather N., E-mail: htinsley@montevallo.edu [Department of Biology, Chemistry, and Mathematics, University of Montevallo, Station 6480, Montevallo, AL 35115 (United States)

    2014-02-26

    For more than four decades, the cyclic nucleotides cyclic AMP (cAMP) and cyclic GMP (cGMP) have been recognized as important signaling molecules within cells. Under normal physiological conditions, cyclic nucleotides regulate a myriad of biological processes such as cell growth and adhesion, energy homeostasis, neuronal signaling, and muscle relaxation. In addition, altered cyclic nucleotide signaling has been observed in a number of pathophysiological conditions, including cancer. While the distinct molecular alterations responsible for these effects vary depending on the specific cancer type, several studies have demonstrated that activation of cyclic nucleotide signaling through one of three mechanisms—induction of cyclic nucleotide synthesis, inhibition of cyclic nucleotide degradation, or activation of cyclic nucleotide receptors—is sufficient to inhibit proliferation and activate apoptosis in many types of cancer cells. These findings suggest that targeting cyclic nucleotide signaling can provide a strategy for the discovery of novel agents for the prevention and/or treatment of selected cancers.

  6. Are the advocates of nuclear power and the adversaries listening to each other? Does Dialogue have a chance? Introductory remarks by John A. Macpherson[Roundtable discussion on whether the advocates of nuclear power and the adversaries are listening to each other

    Energy Technology Data Exchange (ETDEWEB)

    Macpherson, John A [Atomic Energy of Canada Ltd., Mississauga, ON (Canada)

    1989-07-01

    Are the advocates of nuclear power and the adversaries listening to each other? Does dialogue have a chance? My short answer to both questions posed as the title for this discussion is 'no'. And I would add: There is no point in trying to bring opposite poles together, it requires too much investment for too little return. A nuclear dialogue will have a chance only it a distinction can be shown between physics and metaphysics, between chemistry and alchemy, and if the gap can be bridged between the polarized views of the world's societal needs which, incidentally, create the nuclear issue in the first place. This is a daunting task Movements in search of a cause have a passion for preaching rather than a love for listening.

  7. Exploring the Potential of Generative Adversarial Networks for Synthesizing Radiological Images of the Spine to be Used in In Silico Trials

    Directory of Open Access Journals (Sweden)

    Fabio Galbusera

    2018-05-01

    Full Text Available In silico trials recently emerged as a disruptive technology, which may reduce the costs related to the development and marketing approval of novel medical technologies, as well as shortening their time-to-market. In these trials, virtual patients are recruited from a large database and their response to the therapy, such as the implantation of a medical device, is simulated by means of numerical models. In this work, we propose the use of generative adversarial networks to produce synthetic radiological images to be used in in silico trials. The generative models produced credible synthetic sagittal X-rays of the lumbar spine based on a simple sketch, and were able to generate sagittal radiological images of the trunk using coronal projections as inputs, and vice versa. Although numerous inaccuracies in the anatomical details may still allow distinguishing synthetic and real images in the majority of cases, the present work showed that generative models are a feasible solution for creating synthetic imaging data to be used in in silico trials of novel medical devices.

  8. Introductory remarks by Augusto Ancarani[Roundtable discussion on whether the advocates of nuclear power and the adversaries are listening to each other

    Energy Technology Data Exchange (ETDEWEB)

    Ancarani, Augusto [Commission of the European Communities, Brussels (Belgium)

    1989-07-01

    The subject proposed for the present roundtable is in the form of a twofold question. To assert that advocates and adversaries of nuclear power are listening to each other will hopefully result from what will be said. But, as far as the chance of a dialogue is concerned, one can answer in the positive from the start. Indeed a dialogue is always possible, even among deaf people, provided they are polite. This has been and still is the situation in many instances. If we consider the politics situation in a worldwide perspective, we hove to acknowledge that the mood is favorable to the dialogue on almost every possible subject. If this is true among the great powers, it will also be the case, at all the Levels, inside our democratic and articulate societies, O rice set in motion the solution of the great problems concerning peace among notions, still remain to be tackled the ones about the welfare of humankind. Such welfare rests heavily on the availability of energy; besides, energy cannot bp produced without some consequences upon the environment. This process will bi a Long and a difficult one; it will be exhausted only through confrontations, exchanges of view, dialogues, discussions - any term that you will care to choose.

  9. Cyclic Stretch Alters Vascular Reactivity of Mouse Aortic Segments

    Directory of Open Access Journals (Sweden)

    Arthur Leloup

    2017-10-01

    Full Text Available Large, elastic arteries buffer the pressure wave originating in the left ventricle and are constantly exposed to higher amplitudes of cyclic stretch (10% than muscular arteries (2%. As a crucial factor for endothelial and smooth muscle cell function, cyclic stretch has, however, never been studied in ex vivo aortic segments of mice. To investigate the effects of cyclic stretch on vaso-reactivity of mouse aortic segments, we used the Rodent Oscillatory Tension Set-up to study Arterial Compliance (ROTSAC. The aortic segments were clamped at frequencies of 6–600 bpm between two variable preloads, thereby mimicking dilation as upon left ventricular systole and recoiling as during diastole. The preloads corresponding to different transmural pressures were chosen to correspond to a low, normal or high amplitude of cyclic stretch. At different time intervals, cyclic stretch was interrupted, the segments were afterloaded and isometric contractions by α1-adrenergic stimulation with 2 μM phenylephrine in the absence and presence of 300 μM L-NAME (eNOS inhibitor and/or 35 μM diltiazem (blocker of voltage-gated Ca2+ channels were measured. As compared with static or cyclic stretch at low amplitude (<10 mN or low frequency (0.1 Hz, cyclic stretch at physiological amplitude (>10 mN and frequency (1–10 Hz caused better ex vivo conservation of basal NO release with time after mounting. The relaxation of PE-precontracted segments by addition of ACh to stimulate NO release was unaffected by cyclic stretch. In the absence of basal NO release (hence, presence of L-NAME, physiological in comparison with aberrant cyclic stretch decreased the baseline tension, attenuated the phasic contraction by phenylephrine in the absence of extracellular Ca2+ and shifted the smaller tonic contraction more from a voltage-gated Ca2+ channel-mediated to a non-selective cation channel-mediated. Data highlight the need of sufficient mechanical activation of endothelial and

  10. Evolutive masing model, cyclic plasticity, ageing and memory effects

    International Nuclear Information System (INIS)

    Sidoroff, F.

    1987-01-01

    Many models are proposed for the mechanical description of the cyclic behaviour of metals and used for structure analysis under cyclic loading. Such a model must include two basic features: Dissipative behaviour on each cycle (hysteresis loop); evolution of this behaviour during the material's life (cyclic hardening or softening, aging,...). However, if both aspects are present in most existing models, the balance between them may be quite different. Many metallurgical investigations have been performed about the microstructure and its evolution during cyclic loading, and it is desirable to introduce these informations in phenomenological models. The evolutive Masing model has been proposed to combine: the accuracy of hereditary models for the description of hysteresis on each cycle, the versatility of internal variables for the state description and evolution, a sufficient microstructural basis to make the interaction easier with microstructural investigations. The purpose of the present work is to discuss this model and to compare different evolution assumptions with respect to some memory effects (cyclic hardening and softening, multilevel tests, aging). Attention is limited to uniaxial, rate independent elasto-plastic behaviour

  11. Ceramic breeder pebble bed packing stability under cyclic loads

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Chunbo, E-mail: chunbozhang@fusion.ucla.edu [Fusion Science and Technology Center, University of California, Los Angeles, CA 90095-1597 (United States); Ying, Alice; Abdou, Mohamed A. [Fusion Science and Technology Center, University of California, Los Angeles, CA 90095-1597 (United States); Park, Yi-Hyun [National Fusion Research Institute, Daejeon (Korea, Republic of)

    2016-11-01

    Highlights: • The feasibility of obtaining packing stability for pebble beds is studied. • The responses of pebble bed to cyclic loads have been presented and analyzed in details. • Pebble bed packing saturation and its applications are discussed. • A suggestion is made regarding the improvement of pebbles filling technique. - Abstract: Considering the optimization of blanket performance, it is desired that the bed morphology and packing state during reactor operation are stable and predictable. Both experimental and numerical work are performed to explore the stability of pebble beds, in particular under pulsed loading conditions. Uniaxial compaction tests have been performed for both KIT’s Li{sub 4}SiO{sub 4} and NFRI’s Li{sub 2}TiO{sub 3} pebble beds at elevated temperatures (up to 750 °C) under cyclic loads (up to 6 MPa). The obtained data shows the stress-strain loop initially moves towards the larger strain and nearly saturates after a certain number of cyclic loading cycles. The characterized FEM CAP material models for a Li{sub 4}SiO{sub 4} pebble bed with an edge-on configuration are used to simulate the thermomechanical behavior of pebble bed under ITER pulsed operations. Simulation results have shown the cyclic variation of temperature/stress/strain/gap and also the same saturation trend with experiments under cyclic loads. Therefore, it is feasible for pebble bed to maintain its packing stability during operation when disregarding pebbles’ breakage and irradiation.

  12. Degradation forecast for PEMFC cathode-catalysts under cyclic loads

    Science.gov (United States)

    Moein-Jahromi, M.; Kermani, M. J.; Movahed, S.

    2017-08-01

    Degradation of Fuel Cell (FC) components under cyclic loads is one of the biggest bottlenecks in FC commercialization. In this paper, a novel experimental based algorithm is presented to predict the Catalyst Layer (CL) performance loss during cyclic load. The algorithm consists of two models namely Models 1 and 2. The Model 1 calculates the Electro-Chemical Surface Area (ECSA) and agglomerate size (e.g. agglomerate radius, rt,agg) for the catalyst layer under cyclic load. The Model 2 is the already-existing model from our earlier studies that computes catalyst performance with fixed structural parameters. Combinations of these two Models predict the CL performance under an arbitrary cyclic load. A set of parametric/sensitivity studies is performed to investigate the effects of operating parameters on the percentage of Voltage Degradation Rate (VDR%) with rank 1 for the most influential one. Amongst the considered parameters (such as: temperature, relative humidity, pressure, minimum and maximum voltage of the cyclic load), the results show that temperature and pressure have the most and the least influences on the VDR%, respectively. So that, increase of temperature from 60 °C to 80 °C leads to over 20% VDR intensification, the VDR will also reduce 1.41% by increasing pressure from 2 atm to 4 atm.

  13. Micromechanics of soil responses in cyclic simple shear tests

    Directory of Open Access Journals (Sweden)

    Cui Liang

    2017-01-01

    Full Text Available Offshore wind turbine (OWT foundations are subjected to a combination of cyclic and dynamic loading arising from wind, wave, rotor and blade shadowing. Under cyclic loading, most soils change their characteristics including stiffness, which may cause the system natural frequency to approach the loading frequency and lead to unplanned resonance and system damage or even collapse. To investigate such changes and the underlying micromechanics, a series of cyclic simple shear tests were performed on the RedHill 110 sand with different shear strain amplitudes, vertical stresses and initial relative densities of soil. The test results showed that: (a Vertical accumulated strain is proportional to the shear strain amplitude but inversely proportional to relative density of soil; (b Shear modulus increases rapidly in the initial loading cycles and then the rate of increase diminishes and the shear modulus remains below an asymptote; (c Shear modulus increases with increasing vertical stress and relative density, but decreasing with increasing strain amplitude. Coupled DEM simulations were performed using PFC2D to analyse the micromechanics underlying the cyclic behaviour of soils. Micromechanical parameters (e.g. fabric tensor, coordination number were examined to explore the reasons for the various cyclic responses to different shear strain amplitudes or vertical stresses. Both coordination number and magnitude of fabric anisotropy contribute to the increasing shear modulus.

  14. Topological chaos, braiding and bifurcation of almost-cyclic sets.

    Science.gov (United States)

    Grover, Piyush; Ross, Shane D; Stremler, Mark A; Kumar, Pankaj

    2012-12-01

    In certain two-dimensional time-dependent flows, the braiding of periodic orbits provides a way to analyze chaos in the system through application of the Thurston-Nielsen classification theorem (TNCT). We expand upon earlier work that introduced the application of the TNCT to braiding of almost-cyclic sets, which are individual components of almost-invariant sets [Stremler et al., "Topological chaos and periodic braiding of almost-cyclic sets," Phys. Rev. Lett. 106, 114101 (2011)]. In this context, almost-cyclic sets are periodic regions in the flow with high local residence time that act as stirrers or "ghost rods" around which the surrounding fluid appears to be stretched and folded. In the present work, we discuss the bifurcation of the almost-cyclic sets as a system parameter is varied, which results in a sequence of topologically distinct braids. We show that, for Stokes' flow in a lid-driven cavity, these various braids give good lower bounds on the topological entropy over the respective parameter regimes in which they exist. We make the case that a topological analysis based on spatiotemporal braiding of almost-cyclic sets can be used for analyzing chaos in fluid flows. Hence, we further develop a connection between set-oriented statistical methods and topological methods, which promises to be an important analysis tool in the study of complex systems.

  15. Strongly Correlated Systems Theoretical Methods

    CERN Document Server

    Avella, Adolfo

    2012-01-01

    The volume presents, for the very first time, an exhaustive collection of those modern theoretical methods specifically tailored for the analysis of Strongly Correlated Systems. Many novel materials, with functional properties emerging from macroscopic quantum behaviors at the frontier of modern research in physics, chemistry and materials science, belong to this class of systems. Any technique is presented in great detail by its own inventor or by one of the world-wide recognized main contributors. The exposition has a clear pedagogical cut and fully reports on the most relevant case study where the specific technique showed to be very successful in describing and enlightening the puzzling physics of a particular strongly correlated system. The book is intended for advanced graduate students and post-docs in the field as textbook and/or main reference, but also for other researchers in the field who appreciates consulting a single, but comprehensive, source or wishes to get acquainted, in a as painless as po...

  16. Strongly correlated systems numerical methods

    CERN Document Server

    Mancini, Ferdinando

    2013-01-01

    This volume presents, for the very first time, an exhaustive collection of those modern numerical methods specifically tailored for the analysis of Strongly Correlated Systems. Many novel materials, with functional properties emerging from macroscopic quantum behaviors at the frontier of modern research in physics, chemistry and material science, belong to this class of systems. Any technique is presented in great detail by its own inventor or by one of the world-wide recognized main contributors. The exposition has a clear pedagogical cut and fully reports on the most relevant case study where the specific technique showed to be very successful in describing and enlightening the puzzling physics of a particular strongly correlated system. The book is intended for advanced graduate students and post-docs in the field as textbook and/or main reference, but also for other researchers in the field who appreciate consulting a single, but comprehensive, source or wishes to get acquainted, in a as painless as possi...

  17. Strongly correlated systems experimental techniques

    CERN Document Server

    Mancini, Ferdinando

    2015-01-01

    The continuous evolution and development of experimental techniques is at the basis of any fundamental achievement in modern physics. Strongly correlated systems (SCS), more than any other, need to be investigated through the greatest variety of experimental techniques in order to unveil and crosscheck the numerous and puzzling anomalous behaviors characterizing them. The study of SCS fostered the improvement of many old experimental techniques, but also the advent of many new ones just invented in order to analyze the complex behaviors of these systems. Many novel materials, with functional properties emerging from macroscopic quantum behaviors at the frontier of modern research in physics, chemistry and materials science, belong to this class of systems. The volume presents a representative collection of the modern experimental techniques specifically tailored for the analysis of strongly correlated systems. Any technique is presented in great detail by its own inventor or by one of the world-wide recognize...

  18. Flavour Democracy in Strong Unification

    CERN Document Server

    Abel, S A; Abel, Steven; King, Steven

    1998-01-01

    We show that the fermion mass spectrum may naturally be understood in terms of flavour democratic fixed points in supersymmetric theories which have a large domain of attraction in the presence of "strong unification". Our approach provides an alternative to the approximate Yukawa texture zeroes of the Froggatt-Nielsen mechanism. We discuss a particular model based on a broken gauged $SU(3)_L\\times SU(3)_R$ family symmetry which illustrates our approach.

  19. String dynamics at strong coupling

    International Nuclear Information System (INIS)

    Hull, C.M.

    1996-01-01

    The dynamics of superstring, supergravity and M-theories and their compactifications are probed by studying the various perturbation theories that emerge in the strong and weak-coupling limits for various directions in coupling constant space. The results support the picture of an underlying non-perturbative theory that, when expanded perturbatively in different coupling constants, gives different perturbation theories, which can be perturbative superstring theories or superparticle theories. The p-brane spectrum is considered in detail and a criterion found to establish which p-branes govern the strong-coupling dynamics. In many cases there are competing conjectures in the literature, and this analysis decides between them. In other cases, new results are found. The chiral 6-dimensional theory resulting from compactifying the type IIB string on K 3 is studied in detail and it is found that certain strong-coupling limits appear to give new theories, some of which hint at the possibility of a 12-dimensional origin. (orig.)

  20. Differences in the cyclic deformation behaviour of quenched and tempered steel 42 CrMo 4 (AISI 4140) due to stress- and strain-control

    International Nuclear Information System (INIS)

    Schulze, V.; Lang, K.-H.; Voehringer, O.; Macherauch, E.

    1998-01-01

    Cyclic stress-strain-curves and Manson-Coffin-plots of quenched and tempered steel 42 CrMo 4 (AISI 4140) strongly depend on whether they are determined under stress- or total-strain-control. At total-strain-controlled experiments, this is caused on the one hand by comparatively high initial stress-amplitudes which lead to distinctive cyclic work softening. On the other hand, the occuring differences in the evolution of inhomogeneous deformation patterns at both types of loading, which can be recorded by means of photoelasticity and microscopy, lead to differently distributed plastic deformations and to different integral values of plastic strain. (orig.)

  1. A coupled soil-pore fluid formulation for modeling soil liquefaction and cyclic mobility in seabed using the finite volume method

    DEFF Research Database (Denmark)

    Tang, Tian; Roenby, Johan; Hededal, Ole

    The stability of offshore structures, such as wind turbine foundations, breakwaters, and immersed tunnels can be strongly affected by the liquefaction and cyclic mobility phenomena in the seabed. Our goal is to develop a numerical code for analysis of these situations. For this purpose, we start ...... matrix solver, are discussed as well. Overall, investigations in this paper provide a methodology for developing a numerical code simulating liquefaction and cyclic mobility. In future work this will be implemented in practice with the aid of the open source CFD toolbox, OpenFOAM....

  2. Cyclic AMP system in muscle tissue during prolonged hypokinesia

    Science.gov (United States)

    Antipenko, Y. A.; Bubeyev, Y. A.; Korovkin, B. F.; Mikhaleva, N. P.

    1980-01-01

    Components of the cyclic Adenosine-cyclic-35-monophosphate (AMP) system in the muscle tissue of white rats were studied during 70-75 days of hypokinesia, created by placing the animals in small booths which restricted their movements, and during the readaptation period. In the initial period, cyclic AMP levels and the activities of phosphodiesterase and adenylate cyclase in muscle tissue were increased. The values for these indices were roughly equal for controls and experimental animals during the adaptation period, but on the 70th day of the experiment cAMP levels dropped, phosphodiesterase activity increased, and the stimulative effect of epinephrine on the activity of adenylate cyclase decreased. The indices under study normalized during the readaptation period.

  3. Response of monopiles under cyclic lateral loading in sand

    DEFF Research Database (Denmark)

    Nicolai, Giulio; Ibsen, Lars Bo

    2015-01-01

    Currently the main design guidelines propose to reduce the lateral resistance of offshore piles when accounting for cyclic loading. The present work provides results from laboratory tests in which such reduction has not occurred. The experimental investigation is based on testing a small......-scale monopile model in dense saturated sand. The experimental setup used to carry out the laboratory tests is able to apply thousands of load cycles and static loading to the monopile model. The purpose of the laboratory tests is to investigate the effects of cyclic loading on the lateral resistance...... of the monopile. It is shown that the soil-pile system becomes stiffer and more resistant after applying cyclic loading, depending on the number of cycles....

  4. Laboratory Test Setup for Cyclic Axially Loaded Piles in Sand

    DEFF Research Database (Denmark)

    Thomassen, Kristina; Ibsen, Lars Bo; Andersen, Lars Vabbersgaard

    2017-01-01

    This paper presents a comprehensive description and the considerations regarding the design of a new laboratory test setup for testing cyclic axially loaded piles in sand. The test setup aims at analysing the effect of axial one-way cyclic loading on pile capacity and accumulated displacements....... Another aim was to test a large diameter pile segment with dimensions resembling full-scale piles to model the interface properties between pile and sand correctly. The pile segment was an open-ended steel pipe pile with a diameter of 0.5 m and a length of 1 m. The sand conditions resembled the dense sand...... determined from the API RP 2GEO standard and from the test results indicated over consolidation of the sand. Two initial one-way cyclic loading tests provided results of effects on pile capacity and accumulated displacements in agreement with other researchers’ test results....

  5. Anisotropic yield surfaces in bi-axial cyclic plasticity

    International Nuclear Information System (INIS)

    Rider, R.J.; Harvey, S.J.; Breckell, T.H.

    1985-01-01

    Some aspects of the behaviour of yield surfaces and work-hardening surfaces occurring in biaxial cyclic plasticity have been studied experimentally and theoretically. The experimental work consisted of subjecting thin-walled tubular steel specimens to cyclic plastic torsion in the presence of sustained axial loads of various magnitudes. The experimental results show that considerable anisotropy is induced when the cyclic shear strains are dominant. Although the true shapes of yield and work-hardening surfaces can be very complex, a mathematical model is presented which includes both anisotropy and Bauschinger effects. The model is able to qualitatively predict the deformation patterns during a cycle of applied plastic shear strain for a range of sustained axial stresses and also indicate the material response to changes in axial stress. (orig.)

  6. Cyclic and Explosive Evaluation of New Proposed Steel Joint

    Directory of Open Access Journals (Sweden)

    Iman Faridmehr

    2016-01-01

    Full Text Available The behaviour of a novel steel beam-to-column connection, the saddlebag, subjected to cyclic and progressive collapse, was evaluated in this paper. The cyclic behaviour considered the interstory drift angle and flexural strength in accordance with 2010 AISC Seismic Provisions, while progressive collapse assessment was evaluated through the plastic hinge rotation angle based on acceptance criteria provided in the UFC 4-023-03 guideline. From the cyclic test, one complete cycle of an interstory drift angle of 0.06 rad was satisfied for the saddlebag connection, which is an indication of the effectiveness in accordance with 2010 AISC Seismic Provisions. Besides, the new proposed connection developed adequate catenary action, which is a fundamental criterion to resist against progressive collapse. The resulting fuller hysteretic loops with large energy dissipation capacity in the proposed saddlebag connection guarantee its ability to address the inelastic deformation demands in earthquake conditions.

  7. Cyclic plastic hinges with degradation effects for frame structures

    DEFF Research Database (Denmark)

    Tidemann, Lasse; Krenk, Steen

    2017-01-01

    A model of cyclic plastic hinges in frame structures including degradation effects for stiffness and strength is developed. The model is formulated via potentials in terms of section forces. It consists of a yield surface, described in a generic format permitting representation of general convex...... shapes including corners, and a set of evolution equations based on an internal energy potential and a plastic flow potential. The form of these potentials is specified by five parameters for each generalized stress-strain component describing yield level, ultimate stress capacity, elastic...... and stiffness parameters. The cyclic plastic hinges are introduced into a six-component equilibrium-based beam element, using additive element and hinge flexibilities. When converted to stiffness format the plastic hinges are incorporated into the element stiffness matrix. The cyclic plastic hinge model...

  8. Detection of Corrosion Resistance of Components in Cyclic Salt Spray

    Directory of Open Access Journals (Sweden)

    Štefan Álló

    2015-01-01

    Full Text Available The aim of this research is, to investigate the influence of two types of cyclic salt spray tests on parts surface treated with galvanizing. On the selected components was performed the method Zn-Ni surface treating on the bath line. Subsequently were the components embedded in the corrosion chamber, where was performed two types of cyclic salt test. In the first test was performed 4 hour salt spray, 8 hours drying, 60 hours condensation and 24 hours drying. Once cycle lasted 96 hours, and it was repeated 4 times. During the second test was performed 2 hours salt spray, 2 hours condensation. The cycle was repeated 4 times, that means 96 hours. After the cycle was performed 72 hours free relaxation in the corrosion chamber, on 20–25 °C temperature. As the research showed, after the cyclic salt spray was no red corrosion on the selected components. The white corrosion appeared only slightly.

  9. Improving oral bioavailability of cyclic peptides by N-methylation.

    Science.gov (United States)

    Räder, Andreas F B; Reichart, Florian; Weinmüller, Michael; Kessler, Horst

    2018-06-01

    The renaissance of peptides in pharmaceutical industry results from their importance in many biological functions. However, low metabolic stability and the lack of oral availability of most peptides is a certain limitation. Whereas metabolic instability may be often overcome by development of small cyclic peptides containing d-amino acids, the very low oral availability of most peptides is a serious limitation for some medicinal applications. The situation is complicated because a twofold optimization - biological activity and oral availability - is required to overcome this problem. Moreover, most simple "rules" for achieving oral availability are not general and are applicable only to limited cases. Many structural modifications for increasing biological activities and metabolic stabilities of cyclic peptides have been described, of which N-alkylation is probably the most common. This mini-review focuses on the effects of N-methylation of cyclic peptides in strategies to optimize bioavailabilities. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  10. The cyclical monitoring system for digital power supplies at SSRF

    International Nuclear Information System (INIS)

    Tang Junlong; Li Deming; Shen Tianjian

    2009-01-01

    Based on available digital PS testing system and long-distance monitoring hardwares, the cyclical monitoring system for digital power supplies (PS) was developed at SSRF. Two models, i.e.long-distance cyclical monitoring and local cyclical monitoring, were established. The software developed in LabVIEW language was applied to the two models without any user interface modification. The user interface is simple. The system is suitable for debugging the digital PSs during long-distance monitoring and examining the performance. The long-distance model imitates the digital PSs' status for fault analysis and communication between the digital PS and the centre control room. The local model simultaneously examines stability of 18 new PSs for 24 h, monitors the PS controller, and detects malfunction. Parameters and status of the controller can be stored in Excel or Text file. The two models have been used at SSRF for monitoring the digital PSs. (authors)

  11. PREFACE: Strongly correlated electron systems Strongly correlated electron systems

    Science.gov (United States)

    Saxena, Siddharth S.; Littlewood, P. B.

    2012-07-01

    This special section is dedicated to the Strongly Correlated Electron Systems Conference (SCES) 2011, which was held from 29 August-3 September 2011, in Cambridge, UK. SCES'2011 is dedicated to 100 years of superconductivity and covers a range of topics in the area of strongly correlated systems. The correlated electronic and magnetic materials featured include f-electron based heavy fermion intermetallics and d-electron based transition metal compounds. The selected papers derived from invited presentations seek to deepen our understanding of the rich physical phenomena that arise from correlation effects. The focus is on quantum phase transitions, non-Fermi liquid phenomena, quantum magnetism, unconventional superconductivity and metal-insulator transitions. Both experimental and theoretical work is presented. Based on fundamental advances in the understanding of electronic materials, much of 20th century materials physics was driven by miniaturisation and integration in the electronics industry to the current generation of nanometre scale devices. The achievements of this industry have brought unprecedented advances to society and well-being, and no doubt there is much further to go—note that this progress is founded on investments and studies in the fundamentals of condensed matter physics from more than 50 years ago. Nevertheless, the defining challenges for the 21st century will lie in the discovery in science, and deployment through engineering, of technologies that can deliver the scale needed to have an impact on the sustainability agenda. Thus the big developments in nanotechnology may lie not in the pursuit of yet smaller transistors, but in the design of new structures that can revolutionise the performance of solar cells, batteries, fuel cells, light-weight structural materials, refrigeration, water purification, etc. The science presented in the papers of this special section also highlights the underlying interest in energy-dense materials, which

  12. Cyclic operation of power plant; Cyklisk drift av kraftvaermeverk

    Energy Technology Data Exchange (ETDEWEB)

    Storesund, Jan

    2007-12-15

    The great majority of power plants are designed for base load operation with a relatively small number of starts and stops per year. Therefore, there has been no need to consider fatigue at design. Over the last few years operation with more frequent starts and stops exists as a consequence of swinging electricity prices that has become common. This involves significantly higher frequency of damages; not least fatigue relates damages, and the number of severe failures in components that never before have had damage problems may increase as well. In the present work the different types of component that may suffer from cyclic operation related damage are gathered by a literature survey and described as follows: - where and how the damages comes up, - constructions that should be avoided, - non-destructive testing (NDT) for damage that may come up under cyclic operation, - calculation and assessment of integrity of critical components - areas where continued research would be valuable. Recommendations have been put together to be used to prevent cyclic operation related damage and to detect it in time. The target group for this study is i) plant owners of plants where cyclic operation is or may be present, ii) researchers in the area, and, iii) inspectors and NDT-operators. There are quite a number of components where cyclic operation has been found to significantly influence the lift time. Some of these components are described in many papers whereas occasional papers have been found for others. The amount of information that is possible to get for a certain component is likely related to its significance for cyclic operation damage. The most frequently reported problem is ligament cracking of high temperature headers. Other components where extensive studies have been done are: wall panels, creep-fatigue loaded welds and turbine components

  13. Atoms in strong laser fields

    International Nuclear Information System (INIS)

    L'Huillier, A.

    2002-01-01

    When a high-power laser focuses into a gas of atoms, the electromagnetic field becomes of the same magnitude as the Coulomb field which binds a 1s electron in a hydrogen atom. 3 highly non-linear phenomena can happen: 1) ATI (above threshold ionization): electrons initially in the ground state absorb a large number of photons, many more than the minimum number required for ionization; 2) multiple ionization: many electrons can be emitted one at a time, in a sequential process, or simultaneously in a mechanism called direct or non-sequential; and 3) high order harmonic generation (HHG): efficient photon emission in the extreme ultraviolet range, in the form of high-order harmonics of the fundamental laser field can occur. The theoretical problem consists in solving the time dependent Schroedinger equation (TDSE) that describes the interaction of a many-electron atom with a laser field. A number of methods have been proposed to solve this problem in the case of a hydrogen atom or a single-active electron atom in a strong laser field. A large effort is presently being devoted to go beyond the single-active approximation. The understanding of the physics of the interaction between atoms and strong laser fields has been provided by a very simple model called ''simple man's theory''. A unified view of HHG, ATI, and non-sequential ionization, originating from the simple man's model and the strong field approximation, expressed in terms of electrons trajectories or quantum paths is slowly emerging. (A.C.)

  14. Determination of silver using cyclic epithermal neutron activation analysis

    International Nuclear Information System (INIS)

    Pun, T.H.; Landsberger, S.

    2012-01-01

    A fast pneumatic transfer facility was installed in Nuclear Engineering Teaching Laboratory (NETL) of the University of Texas at Austin for the purpose of cyclic thermal and epithermal neutron activation analysis. In this study efforts were focused on the evaluation of cyclic epithermal neutron activation analysis (CENAA). Various NIST and CANMET certified materials were analyzed by the system. Experiment results showed 110 Ag with its 25 s half-life as one of the isotopes favored by the system. Thus, the system was put into practical application in identifying silver in metallic ores. Comparison of sliver concentrations as determined by CENAA in CANMET certified reference materials gave very good results. (author)

  15. Progressive buckling under both constant axial load and cyclic distortion

    International Nuclear Information System (INIS)

    Clement, G.; Acker, D.; Lebey, J.

    1988-09-01

    Thin structures submitted to compressive loads must be carefully designed to avoid any risk of ruin by buckling. The aim of this paper is, first, to evidence that the critical buckling load may be notably lowered when cyclic strains are added to the compressive load and, secondly, to propose a practical rule of prevention against the ruin due to the progressive buckling phenomenon. This rule is validated by the results of numerous tests related to the entire range of modes of buckling (i.e. from fully plastic to fully elastic). Practical cases of interest for its use could mainly be those where cyclic thermal stresses are involved

  16. New cyclic peptides with osteoblastic proliferative activity from Dianthus superbus.

    Science.gov (United States)

    Tong, Yun; Luo, Jian-Guang; Wang, Rui; Wang, Xiao-Bing; Kong, Ling-Yi

    2012-03-01

    Two new cyclic peptides, dianthins G-H (1 and 2), together with the known dianthin E (3), were isolated from the traditional Chinese medicinal plant Dianthus superbus. The sequences of cyclic peptides 1 and 2 were elucidated as cyclo (-Gly(1)-Pro(2)-Leu(3)-Thr(4)-Leu(5)-Phe(6)-) and cyclo (-Gly(1)-Pro(2)-Val(3)-Thr(4)-Ile(5)-Phe(6)-), on the basis of ESI tandem mass fragmentation analysis, extensive 2D NMR methods and X-ray diffraction. The isolated three compounds all increase proliferation of MC3T3-E1 cells in vitro using MTT method. Copyright © 2012 Elsevier Ltd. All rights reserved.

  17. Solving cyclical nurse scheduling problem using preemptive goal programming

    Science.gov (United States)

    Sundari, V. E.; Mardiyati, S.

    2017-07-01

    Nurse scheduling system in a hospital is being modeled as a preemptive goal programming problem that is solved by using LINGO software with the objective function to minimize deviation variable at each goal. The scheduling is done cyclically, so every nurse is treated fairly since they have the same work shift portion with the other nurses. By paying attention to the hospital's rules regarding nursing work shift cyclically, it can be obtained that numbers of nurse needed in every ward are 18 nurses and the numbers of scheduling periods are 18 periods where every period consists of 21 days.

  18. Cyclic GMP-AMP Displays Mucosal Adjuvant Activity in Mice

    OpenAIRE

    Škrnjug, Ivana; Guzmán, Carlos Alberto; Ruecker, Christine

    2014-01-01

    The recently discovered mammalian enzyme cyclic GMP-AMP synthase produces cyclic GMP-AMP (cGAMP) after being activated by pathogen-derived cytosolic double stranded DNA. The product can stimulate STING-dependent interferon type I signaling. Here, we explore the efficacy of cGAMP as a mucosal adjuvant in mice. We show that cGAMP can enhance the adaptive immune response to the model antigen ovalbumin. It promotes antigen specific IgG and a balanced Th1/Th2 lymphocyte response in immunized mice....

  19. The Reduction of Directed Cyclic Graph for Task Assignment Problem

    Directory of Open Access Journals (Sweden)

    Ariffin W.N.M.

    2018-01-01

    Full Text Available In this paper, a directed cyclic graph (DCG is proposed as the task graph. It is undesirable and impossible to complete the task according to the constraints if the cycle exists. Therefore, an effort should be done in order to eliminate the cycle to obtain a directed acyclic graph (DAG, so that the minimum amount of time required for the entire task can be found. The technique of reducing the complexity of the directed cyclic graph to a directed acyclic graph by reversing the orientation of the path is the main contribution of this study. The algorithm was coded using Java programming and consistently produced good assignment and task schedule.

  20. A compact cyclic plasticity model with parameter evolution

    DEFF Research Database (Denmark)

    Krenk, Steen; Tidemann, L.

    2017-01-01

    The paper presents a compact model for cyclic plasticity based on energy in terms of external and internal variables, and plastic yielding described by kinematic hardening and a flow potential with an additive term controlling the nonlinear cyclic hardening. The model is basically described by five...... parameters: external and internal stiffness, a yield stress and a limiting ultimate stress, and finally a parameter controlling the gradual development of plastic deformation. Calibration against numerous experimental results indicates that typically larger plastic strains develop than predicted...

  1. Geometric phases for mixed states during cyclic evolutions

    International Nuclear Information System (INIS)

    Fu Libin; Chen Jingling

    2004-01-01

    The geometric phases of cyclic evolutions for mixed states are discussed in the framework of unitary evolution. A canonical 1-form is defined whose line integral gives the geometric phase, which is gauge invariant. It reduces to the Aharonov and Anandan phase in the pure state case. Our definition is consistent with the phase shift in the proposed experiment (Sjoeqvist et al 2000 Phys. Rev. Lett. 85 2845) for a cyclic evolution if the unitary transformation satisfies the parallel transport condition. A comprehensive geometric interpretation is also given. It shows that the geometric phases for mixed states share the same geometric sense with the pure states

  2. The Cyclic Stress-Strain Curve of Polycrystals

    DEFF Research Database (Denmark)

    Pedersen, Ole Bøcker; Rasmussen, K. V.; Winter, A. T.

    1982-01-01

    The internal stresses implied by the Sachs model are estimated for individual PSBs at low plastic strain amplitudes and for homogeneously sheared grains at higher plastic strain amplitudes. The analysis shows that the Sachs model can account semi-quantitatively for experimentally measured cyclic...... stress-strain curves for copper. A similar approximative analysis of the Taylor model cannot account for the data. An interesting feature of the Sachs model is that, although it is assumed that the flow condition is entirely controlled by the PSBs. the predicted cyclic stress-strain curve displays...

  3. Rydberg atoms in strong fields

    International Nuclear Information System (INIS)

    Kleppner, D.; Tsimmerman, M.

    1985-01-01

    Experimental and theoretical achievements in studying Rydberg atoms in external fields are considered. Only static (or quasistatic) fields and ''one-electron'' atoms, i.e. atoms that are well described by one-electron states, are discussed. Mainly behaviour of alkali metal atoms in electric field is considered. The state of theoretical investigations for hydrogen atom in magnetic field is described, but experimental data for atoms of alkali metals are presented as an illustration. Results of the latest experimental and theoretical investigations into the structure of Rydberg atoms in strong fields are presented

  4. Strong versions of Bell's theorem

    International Nuclear Information System (INIS)

    Stapp, H.P.

    1994-01-01

    Technical aspects of a recently constructed strong version of Bell's theorem are discussed. The theorem assumes neither hidden variables nor factorization, and neither determinism nor counterfactual definiteness. It deals directly with logical connections. Hence its relationship with modal logic needs to be described. It is shown that the proof can be embedded in an orthodox modal logic, and hence its compatibility with modal logic assured, but that this embedding weakens the theorem by introducing as added assumptions the conventionalities of the particular modal logic that is adopted. This weakening is avoided in the recent proof by using directly the set-theoretic conditions entailed by the locality assumption

  5. Strongly interacting light dark matter

    International Nuclear Information System (INIS)

    Bruggisser, Sebastian; Riva, Francesco; Urbano, Alfredo

    2016-07-01

    In the presence of approximate global symmetries that forbid relevant interactions, strongly coupled light Dark Matter (DM) can appear weakly coupled at small-energy and generate a sizable relic abundance. Fundamental principles like unitarity restrict these symmetries to a small class, where the leading interactions are captured by effective operators up to dimension-8. Chiral symmetry, spontaneously broken global symmetries and non-linearly realized supersymmetry are examples of this. Their DM candidates (composite fermions, pseudo-Nambu-Goldstone Bosons and Goldstini) are interesting targets for LHC missing-energy searches.

  6. Weak consistency and strong paraconsistency

    Directory of Open Access Journals (Sweden)

    Gemma Robles

    2009-11-01

    Full Text Available In a standard sense, consistency and paraconsistency are understood as, respectively, the absence of any contradiction and as the absence of the ECQ (“E contradictione quodlibet” rule that allows us to conclude any well formed formula from any contradiction. The aim of this paper is to explain the concepts of weak consistency alternative to the standard one, the concepts of paraconsistency related to them and the concept of strong paraconsistency, all of which have been defined by the author together with José M. Méndez.

  7. On the strong CP problem

    Energy Technology Data Exchange (ETDEWEB)

    Dowrick, N.J. (Dept. of Physics, Oxford (United Kingdom)); McDougall, N.A. (National Lab. for High Energy Physics, Tsukuba, Ibaraki (Japan))

    1992-07-09

    We show that two well-known solutions to the strong CP problem, the axion and a massless quark, may be understood in terms of the mechanism recently proposed by Samuel where long-range interactions between topological charges may be responsible for the removal of CP violation. We explain how the axion and a QCD meson (identified as the {eta}' if all quarks are massless) suppress fluctuations in global topological charge by almost identical dynamical although the masses, couplings and relevant length scales are very different. Furthermore, we elucidate the precise origin of the {eta}' mass. (orig.).

  8. Scalar strong interaction hadron theory

    CERN Document Server

    Hoh, Fang Chao

    2015-01-01

    The scalar strong interaction hadron theory, SSI, is a first principles' and nonlocal theory at quantum mechanical level that provides an alternative to low energy QCD and Higgs related part of the standard model. The quark-quark interaction is scalar rather than color-vectorial. A set of equations of motion for mesons and another set for baryons have been constructed. This book provides an account of the present state of a theory supposedly still at its early stage of development. This work will facilitate researchers interested in entering into this field and serve as a basis for possible future development of this theory.

  9. Estimation of strong ground motion

    International Nuclear Information System (INIS)

    Watabe, Makoto

    1993-01-01

    Fault model has been developed to estimate a strong ground motion in consideration of characteristics of seismic source and propagation path of seismic waves. There are two different approaches in the model. The first one is a theoretical approach, while the second approach is a semi-empirical approach. Though the latter is more practical than the former to be applied to the estimation of input motions, it needs at least the small-event records, the value of the seismic moment of the small event and the fault model of the large event

  10. Strong Mechanoluminescence from Oxynitridosilicate Phosphors

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Lin; Xu Chaonan; Yamada, Hiroshi, E-mail: cn-xu@aist.go.jp [National Institute of Advanced Industrial Science and Technology (AIST), 807-1 Shuku, Tosu, Saga 841-0052 (Japan)

    2011-10-29

    We successfully developed a novel Mechanoluminescence (ML) material with water resistance, oxynitridosilicate; BaSi{sub 2}O{sub 2}N{sub 2}: Eu{sup 2+}. The crystal structure, photoluminescence (PL) and ML properties were characterized. The ML of BaSi{sub 2}O{sub 2}N{sub 2}: Eu{sup 2+} is so strong that the blue-green emission can be observed by the naked eyes clearly. In addition, it shows superior water resistance property. No changes were found in the ML intensities during the total water treatment test.

  11. The interplay between seasonality and density: consequences for female breeding decisions in a small cyclic herbivore.

    Science.gov (United States)

    Pinot, Adrien; Gauffre, Bertrand; Bretagnolle, Vincent

    2014-05-28

    Cyclic rodent population dynamics are subjected to both intrinsic regulatory processes such as density-dependence and extrinsic environmental forcing. Among extrinsic factors, seasonal environmental variation is understood to facilitate cycles. In rodents, these processes have been studied mostly independently and their relative importance for population dynamics is poorly known. We performed a detailed analysis of common vole (Microtus arvalis) reproduction in a cyclic population using a spatially extensive data set over 17 years in central-western France. Environmental seasonality was the main source of explained variation in common vole reproduction. Additionally, inter-annual variation in the environment explained a smaller part of the variance in reproduction in spring and summer than in winter, whereas the effect of density was only found in autumn and winter. In particular, we detected a strong impact of plant productivity on fecundity during the breeding season, with low vegetation productivity being able to bring vole reproduction nearly to a halt. In contrast, vole reproduction during autumn and winter was mainly shaped by intrinsic factors, with only the longer and heavier females being able to reproduce. The effect of population density on reproduction was negative, mediated by direct negative effects on the proportion of breeders in autumn and winter during outbreak years and by a delayed negative effect on litter size the following year. During the main breeding season, variability of female vole reproduction is predominantly shaped by food resources, suggesting that only highly productive environment may induce vole outbreaks. During fall and winter, variability of female vole reproduction is mainly controlled by intrinsic factors, with high population density suppressing reproduction. This suggests, in this cyclic population, that negative direct density dependence on reproduction could explain winter declines after outbreaks.

  12. Insulin alters the target size of the peripheral cyclic AMP phosphodiesterase but not the integral cyclic GMP-stimulated cyclic AMP phosphodiesterase in liver plasma membranes

    International Nuclear Information System (INIS)

    Wallace, A.V.; Martin, B.R.; Houslay, M.D.

    1990-01-01

    Radiation inactivation of the two high affinity cyclic AMP phosphodiesterases (PDE) found in liver plasma membranes afforded an estimation of their molecular target sizes in situ. The activity of the peripheral plasma membrane PDE decayed as a single exponential with a target size corresponding to a monomer of circa 54 kDa. The integral, cyclic GMP-stimulated PDE decayed as a dimer of circa 125 kDa. Preincubation of plasma membranes with insulin (10nM), prior to irradiation, caused the target size of only the peripheral plasma membrane PDE to increase. We suggest that insulin addition causes the peripheral plasma membrane PDE to alter its coupling to an integral plasma membrane protein with a target size of circa 90 kDa

  13. Effective lagrangian for strong interactions

    International Nuclear Information System (INIS)

    Jain, P.

    1988-01-01

    We attempt to construct a realistic phenomenological Lagrangian in order to describe strong interactions. This is in general a very complicated problem and we shall explore its various aspects. We first include the vector mesons by writing down the most general chiral invariant terms proportional to the Levi-Civita symbol ε μναβ . These terms involve three unknown coefficients, which are calculated by using the experimental results of strong interaction processes. We then calculate the static nucleon properties by finding the solitonic excitations of this model. The results turn out to be, as is also the case for most other vector-pseudoscalar Lagrangians, better than the Skyrme model but are still somewhat different from the experiments. Another aspect that we shall study is the incorporation of scale anomaly of QCD into the Skyrme model. We thus introduce a scalar glueball in our Lagrangian. Here we find an interesting result that the effective glue field dynamically forms a bag for the soliton. Depending on the values of the parameters, we get either a deep bag or a shallow bag. However by including the scalar meson, we find that to get realistic scalar sector we must have the shallow bag. Finally we show some intriguing connections between the chiral quark model, in which the nucleon is described as a solitonic excitation, and the ordinary potential binding quark model

  14. EDITORIAL: Strongly correlated electron systems Strongly correlated electron systems

    Science.gov (United States)

    Ronning, Filip; Batista, Cristian

    2011-03-01

    Strongly correlated electrons is an exciting and diverse field in condensed matter physics. This special issue aims to capture some of that excitement and recent developments in the field. Given that this issue was inspired by the 2010 International Conference on Strongly Correlated Electron Systems (SCES 2010), we briefly give some history in order to place this issue in context. The 2010 International Conference on Strongly Correlated Electron Systems was held in Santa Fe, New Mexico, a reunion of sorts from the 1989 International Conference on the Physics of Highly Correlated Electron Systems that also convened in Santa Fe. SCES 2010—co-chaired by John Sarrao and Joe Thompson—followed the tradition of earlier conferences, in this century, hosted by Buzios (2008), Houston (2007), Vienna (2005), Karlsruhe (2004), Krakow (2002) and Ann Arbor (2001). Every three years since 1997, SCES has joined the International Conference on Magnetism (ICM), held in Recife (2000), Rome (2003), Kyoto (2006) and Karlsruhe (2009). Like its predecessors, SCES 2010 topics included strongly correlated f- and d-electron systems, heavy-fermion behaviors, quantum-phase transitions, non-Fermi liquid phenomena, unconventional superconductivity, and emergent states that arise from electronic correlations. Recent developments from studies of quantum magnetism and cold atoms complemented the traditional subjects and were included in SCES 2010. 2010 celebrated the 400th anniversary of Santa Fe as well as the birth of astronomy. So what's the connection to SCES? The Dutch invention of the first practical telescope and its use by Galileo in 1610 and subsequent years overturned dogma that the sun revolved about the earth. This revolutionary, and at the time heretical, conclusion required innovative combinations of new instrumentation, observation and mathematics. These same combinations are just as important 400 years later and are the foundation of scientific discoveries that were discussed

  15. Selective hydrodeoxygenation of cyclic vicinal diols to cyclic alcohols over tungsten oxide-palladium catalysts.

    Science.gov (United States)

    Amada, Yasushi; Ota, Nobuhiko; Tamura, Masazumi; Nakagawa, Yoshinao; Tomishige, Keiichi

    2014-08-01

    Hydrodeoxygenation of cyclic vicinal diols such as 1,4-anhydroerythritol was conducted over catalysts containing both a noble metal and a group 5-7 transition-metal oxide. The combination of Pd and WOx allowed the removal of one of the two OH groups selectively. 3-Hydroxytetrahydrofuran was obtained from 1,4-anhydroerythritol in 72 and 74% yield over WOx -Pd/C and WOx -Pd/ZrO2 , respectively. The WOx -Pd/ZrO2 catalyst was reusable without significant loss of activity if the catalyst was calcined as a method of regeneration. Characterization of WOx -Pd/C with temperature-programmed reduction, X-ray diffraction, and transmission electron microscopy/energy-dispersive X-ray spectroscopy suggested that Pd metal particles approximately 9 nm in size were formed on amorphous tungsten oxide particles. A reaction mechanism was proposed on the basis of kinetics, reaction results with tungsten oxides under an atmosphere of Ar, and density functional theory calculations. A tetravalent tungsten center (W(IV) ) was formed by reduction of WO3 with the Pd catalyst and H2 , and this center served as the reductant for partial hydrodeoxygenation. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  16. Strong Selective Adsorption of Polymers.

    Science.gov (United States)

    Ge, Ting; Rubinstein, Michael

    2015-06-09

    A scaling theory is developed for selective adsorption of polymers induced by the strong binding between specific monomers and complementary surface adsorption sites. By "selective" we mean specific attraction between a subset of all monomers, called "sticky", and a subset of surface sites, called "adsorption sites". We demonstrate that, in addition to the expected dependence on the polymer volume fraction ϕ bulk in the bulk solution, selective adsorption strongly depends on the ratio between two characteristic length scales, the root-mean-square distance l between neighboring sticky monomers along the polymer, and the average distance d between neighboring surface adsorption sites. The role of the ratio l / d arises from the fact that a polymer needs to deform to enable the spatial commensurability between its sticky monomers and the surface adsorption sites for selective adsorption. We study strong selective adsorption of both telechelic polymers with two end monomers being sticky and multisticker polymers with many sticky monomers between sticky ends. For telechelic polymers, we identify four adsorption regimes at l / d 1, we expect that the adsorption layer at exponentially low ϕ bulk consists of separated unstretched loops, while as ϕ bulk increases the layer crosses over to a brush of extended loops with a second layer of weakly overlapping tails. For multisticker chains, in the limit of exponentially low ϕ bulk , adsorbed polymers are well separated from each other. As l / d increases, the conformation of an individual polymer changes from a single-end-adsorbed "mushroom" to a random walk of loops. For high ϕ bulk , adsorbed polymers at small l / d are mushrooms that cover all the adsorption sites. At sufficiently large l / d , adsorbed multisticker polymers strongly overlap. We anticipate the formation of a self-similar carpet and with increasing l / d a two-layer structure with a brush of loops covered by a self-similar carpet. As l / d exceeds the

  17. Proline-Based Cyclic Dipeptides from Korean Fermented Vegetable Kimchi and from Leuconostoc mesenteroides LBP-K06 Have Activities against Multidrug-Resistant Bacteria.

    Science.gov (United States)

    Liu, Rui; Kim, Andrew H; Kwak, Min-Kyu; Kang, Sa-Ouk

    2017-01-01

    Lactobacillus plantarum and Leuconostoc mesenteroides play a prominent role as functional starters and predominant isolates in the production of various types of antimicrobial compound-containing fermented foods, especially including kimchi. In the case of the bioactive cyclic dipeptides, their racemic diastereomers inhibitory to bacteria and fungi have been suggested to come solely from Lactobacillus spp. of these strains. We previously demonstrated the antifungal and antiviral activities of proline-based cyclic dipeptides, which were fractionated from culture filtrates of Lb. plantarum LBP-K10 originated from kimchi. However, cyclic dipeptides have not been identified in the filtrates, either from cultures or fermented subject matter, driven by Ln. mesenteroides , which have been widely used as starter cultures for kimchi fermentation. Most importantly, the experimental verification of cyclic dipeptide-content changes during kimchi fermentation have also not been elucidated. Herein, the antibacterial fractions, including cyclo(Leu-Pro) and cyclo(Phe-Pro), from Ln. mesenteroides LBP-K06 culture filtrates, which exhibited a typical chromatographic retention behavior (t R ), were identified by using semi-preparative high-performance liquid chromatography and gas chromatography-mass spectrometry. Based on this finding, the proline-based cyclic dipeptides, including cyclo(Ser-Pro), cyclo(Tyr-Pro), and cyclo(Leu-Pro), were additionally identified in the filtrates only when fermenting Chinese cabbage produced with Ln. mesenteroides LBP-K06 starter cultures. The detection and isolation of cyclic dipeptides solely in controlled fermented cabbage were conducted under the control of fermentation-process parameters concomitantly with strong CDP selectivity by using a two-consecutive-purification strategy. Interestingly, cyclic dipeptides in the filtrates, when using this strain as a starter, increased with fermentation time. However, no cyclic dipeptides were observed in the

  18. Complex Interplay between FleQ, Cyclic Diguanylate and Multiple σ Factors Coordinately Regulates Flagellar Motility and Biofilm Development in Pseudomonas putida.

    Directory of Open Access Journals (Sweden)

    Alicia Jiménez-Fernández

    Full Text Available Most bacteria alternate between a free living planktonic lifestyle and the formation of structured surface-associated communities named biofilms. The transition between these two lifestyles requires a precise and timely regulation of the factors involved in each of the stages that has been likened to a developmental process. Here we characterize the involvement of the transcriptional regulator FleQ and the second messenger cyclic diguanylate in the coordinate regulation of multiple functions related to motility and surface colonization in Pseudomonas putida. Disruption of fleQ caused strong defects in flagellar motility, biofilm formation and surface attachment, and the ability of this mutation to suppress multiple biofilm-related phenotypes associated to cyclic diguanylate overproduction suggests that FleQ mediates cyclic diguanylate signaling critical to biofilm growth. We have constructed a library containing 94 promoters potentially involved in motility and biofilm development fused to gfp and lacZ, screened this library for FleQ and cyclic diguanylate regulation, and assessed the involvement of alternative σ factors σN and FliA in the transcription of FleQ-regulated promoters. Our results suggest a dual mode of action for FleQ. Low cyclic diguanylate levels favor FleQ interaction with σN-dependent promoters to activate the flagellar cascade, encompassing the flagellar cluster and additional genes involved in cyclic diguanylate metabolism, signal transduction and gene regulation. On the other hand, characterization of the FleQ-regulated σN- and FliA-independent PlapA and PbcsD promoters revealed two disparate regulatory mechanisms leading to a similar outcome: the synthesis of biofilm matrix components in response to increased cyclic diguanylate levels.

  19. Cyclic and heteroclinic flows near general static spherically symmetric black holes: semi-cyclic flows - addendum and corrigendum

    Energy Technology Data Exchange (ETDEWEB)

    Azreg-Ainou, Mustapha [Baskent University, Engineering Faculty, Ankara (Turkey)

    2017-01-15

    We present new accretion solutions of a polytropic perfect fluid onto an f(R)-gravity de Sitter-like black hole. We consider two f(R)-gravity models and obtain finite-period cyclic flows oscillating between the event and cosmological horizons as well as semi-cyclic critical flows executing a two-way motion from and back to the same horizon. Besides the generalizations and new solutions presented in this work, a corrigendum to Eur. Phys. J. C (2016) 76:280 is provided. (orig.)

  20. Nearly Cyclic Pursuit and its Hierarchical variant for Multi-agent Systems

    DEFF Research Database (Denmark)

    Iqbal, Muhammad; Leth, John-Josef; Ngo, Trung Dung

    2015-01-01

    The rendezvous problem for multiple agents under nearly cyclic pursuit and hierarchical nearly cyclic pursuit is discussed in this paper. The control law designed under nearly cyclic pursuit strategy enables the agents to converge at a point dictated by a beacon. A hierarchical version of the nea......The rendezvous problem for multiple agents under nearly cyclic pursuit and hierarchical nearly cyclic pursuit is discussed in this paper. The control law designed under nearly cyclic pursuit strategy enables the agents to converge at a point dictated by a beacon. A hierarchical version...

  1. Experimental study under uniaxial cyclic behavior at room and high temperature of 316L stainless steel

    International Nuclear Information System (INIS)

    Kang Guozheng; Gao Qing; Yang Xianjie; Sun Yafang

    2001-01-01

    An experimental study was carried out of the cyclic properties of 316L stainless steel subjected to uniaxial strain and stress at room and high temperature. The effects of cyclic strain amplitude, temperature and their histories on the cyclic deformation behavior of 316L stainless steel are investigated. And, the influences of stress amplitude, mean stress, temperature and their histories on ratcheting are also analyzed. It is shown that either uniaxial cyclic property under cyclic strain or ratcheting under asymmetric uniaxial cyclic stress depends not only on the current temperature and loading state, but also on the previous temperature and loading history. Some significant results are obtained

  2. Strong growth for Queensland mining

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    The Queensland mining industry experienced strong growth during 1989-90 as shown in the latest statistics released by the Department of Resource Industries. The total value of Queensland mineral and energy production rose to a new record of $5.1 billion, an increase of 16.5% on 1988-89 production. A major contributing factor was a 20.9 percent increase in the value of coal production. While the quantity of coal produced rose only 1.1 percent, the substantial increase in the value of coal production is attributable to higher coal prices negotiated for export contracts. In Australian dollar terms coal, gold, lead, zinc and crude oil on average experienced higher international prices than in the previous year. Only copper and silver prices declined. 3 tabs.

  3. Strong moduli stabilization and phenomenology

    CERN Document Server

    Dudas, Emilian; Mambrini, Yann; Mustafayev, Azar; Olive, Keith A

    2013-01-01

    We describe the resulting phenomenology of string theory/supergravity models with strong moduli stabilization. The KL model with F-term uplifting, is one such example. Models of this type predict universal scalar masses equal to the gravitino mass. In contrast, A-terms receive highly suppressed gravity mediated contributions. Under certain conditions, the same conclusion is valid for gaugino masses, which like A-terms, are then determined by anomalies. In such models, we are forced to relatively large gravitino masses (30-1000 TeV). We compute the low energy spectrum as a function of m_{3/2}. We see that the Higgs masses naturally takes values between 125-130 GeV. The lower limit is obtained from the requirement of chargino masses greater than 104 GeV, while the upper limit is determined by the relic density of dark matter (wino-like).

  4. Strongly interacting W's and Z's

    International Nuclear Information System (INIS)

    Gaillard, M.K.

    1984-01-01

    The study focussed primarily on the dynamics of a strongly interacting W, Z(SIW) sector, with the aim of sharpening predictions for total W, Z yield and W, Z multiplicities expected from WW fusion for various scenarios. Specific issues raised in the context of the general problem of modeling SIW included the specificity of the technicolor (or, equivalently, QCD) model, whether or not a composite scalar model can be evaded, and whether the standard model necessarily implies an I = J = O state (≅ Higgs particle) that is relatively ''light'' (M ≤ hundreds of TeV). The consensus on the last issue was that existing arguments are inconclusive. While the author shall briefly address compositeness and alternatives to the technicolor model, quantitative estimates will be of necessity based on technicolor or an extrapolation of pion data

  5. Uniquely Strongly Clean Group Rings

    Institute of Scientific and Technical Information of China (English)

    WANG XIU-LAN

    2012-01-01

    A ring R is called clean if every element is the sum of an idempotent and a unit,and R is called uniquely strongly clean (USC for short) if every element is uniquely the sum of an idempotent and a unit that commute.In this article,some conditions on a ring R and a group G such that RG is clean are given.It is also shown that if G is a locally finite group,then the group ring RG is USC if and only if R is USC,and G is a 2-group.The left uniquely exchange group ring,as a middle ring of the uniquely clean ring and the USC ring,does not possess this property,and so does the uniquely exchange group ring.

  6. Electrophoresis in strong electric fields.

    Science.gov (United States)

    Barany, Sandor

    2009-01-01

    Two kinds of non-linear electrophoresis (ef) that can be detected in strong electric fields (several hundred V/cm) are considered. The first ("classical" non-linear ef) is due to the interaction of the outer field with field-induced ionic charges in the electric double layer (EDL) under conditions, when field-induced variations of electrolyte concentration remain to be small comparatively to its equilibrium value. According to the Shilov theory, the non-linear component of the electrophoretic velocity for dielectric particles is proportional to the cubic power of the applied field strength (cubic electrophoresis) and to the second power of the particles radius; it is independent of the zeta-potential but is determined by the surface conductivity of particles. The second one, the so-called "superfast electrophoresis" is connected with the interaction of a strong outer field with a secondary diffuse layer of counterions (space charge) that is induced outside the primary (classical) diffuse EDL by the external field itself because of concentration polarization. The Dukhin-Mishchuk theory of "superfast electrophoresis" predicts quadratic dependence of the electrophoretic velocity of unipolar (ionically or electronically) conducting particles on the external field gradient and linear dependence on the particle's size in strong electric fields. These are in sharp contrast to the laws of classical electrophoresis (no dependence of V(ef) on the particle's size and linear dependence on the electric field gradient). A new method to measure the ef velocity of particles in strong electric fields is developed that is based on separation of the effects of sedimentation and electrophoresis using videoimaging and a new flowcell and use of short electric pulses. To test the "classical" non-linear electrophoresis, we have measured the ef velocity of non-conducting polystyrene, aluminium-oxide and (semiconductor) graphite particles as well as Saccharomice cerevisiae yeast cells as a

  7. Global optimization of cyclic Kannan nonexpansive mappings in ...

    African Journals Online (AJOL)

    As an application of the existence theorem, we conclude an old fixed point problem in Banach spaces which are not reflexive necessarily. Examples are given to support the usability of our main conclusions. Keywords: Best proximity point, fixed point, cyclic Kannan nonexpansive mapping, T-uniformly semi-normal structure, ...

  8. Selective discrimination of cyclodextrin diols using cyclic sulfates

    DEFF Research Database (Denmark)

    Petrillo, Marta; Marinescu, Lavinia; Rousseau, Cyril

    2009-01-01

    A method for selective monofunctionalition of readily available cyclodextrin diols (2(A-F),3(A-F),6(B,C,E,F)-hexadeca-O-benzyl-alpha-cyclodextrin and 2(A-G),3(A-G),6(B,C,E-G)-nonadeca-O-benzyl-beta-cyclodextrin) by regioselective nucleophilic opening of their cyclic sulfates is presented. Although...

  9. Antifungal cyclic peptides from the marine sponge Microscleroderma herdmani

    Science.gov (United States)

    Screening natural product extracts from National Cancer Institute Open Repository for antifungal discovery afforded hits for bioassay-guided fractionation. Upon LC-MS analysis of column fractions with antifungal activities to generate information on chemical structure, two new cyclic hexapeptides, m...

  10. Involvement of cyclic nucleotides in locust flight muscle metabolism

    NARCIS (Netherlands)

    Worm, R.A.A.

    1980-01-01

    1. Flight had no significant effect on the levels of c-AMP of c-GMP in the flight muscles of Locusta migratoria. 2. Injections of 0.01 or 0.1 corpus cardiacum equivalents into the abdominal cavity did not elicit any effect on cyclic nucleotide levels either. 3. Injection of A23187 resulted in

  11. [Prognostic significance of the cyclic AMP concentration in acute leukemias].

    Science.gov (United States)

    Paietta, E; Mittermayer, K; Schwarzmeier, J D

    1979-01-01

    In patients with acute leukemia (myeloblastic, lymphoblastic, undifferentiated) proliferation kinetics and cyclic adenosine-3', 5'-monophosphate (cAMP) concentration of the leukemic cells were studied for their significance in the prediction of responsiveness to cytostatic therapy. Patients with good clinical response had significantly faster turnover and lower cAMP-levels than those who failed to respond to treatment.

  12. Cyclic deformation and fatigue behaviors of Hadfield manganese steel

    Energy Technology Data Exchange (ETDEWEB)

    Kang, J. [State Key Laboratory of Metastable Materials Science and Technology, Yanshan University, Qinhuangdao 066004 (China); Zhang, F.C., E-mail: zfc@ysu.edu.cn [State Key Laboratory of Metastable Materials Science and Technology, Yanshan University, Qinhuangdao 066004 (China); Long, X.Y. [State Key Laboratory of Metastable Materials Science and Technology, Yanshan University, Qinhuangdao 066004 (China); Lv, B. [School of Environmental and Chemical Engineering, Yanshan University, Qinhuangdao 066004 (China)

    2014-01-03

    The cyclic deformation characteristics and fatigue behaviors of Hadfield manganese steel have been investigated by means of its ability to memorize strain and stress history. Detailed studies were performed on the strain-controlled low cycle fatigue (LCF) and stress-controlled high cycle fatigue (HCF). Initial cyclic hardening to saturation or peak stress followed by softening to fracture occurred in LCF. Internal stress made the dominant contribution to the fatigue crack propagation until failure. Effective stress evolution revealed the existence of C–Mn clusters with short-range ordering in Hadfield manganese steel and demonstrated that the interaction between C atoms in the C–Mn cluster and dislocation was essential for its cyclic hardening. The developing/developed dislocation cells and stacking faults were the main cyclic deformation microstructures on the fractured sample surface in LCF and HCF, which manifested that fatigue failure behavior of Hadfield manganese steel was induced by plastic deformation during strain-controlled or stress-controlled testing.

  13. Cyclic peptides as potential therapeutic agents for skin disorders.

    Science.gov (United States)

    Namjoshi, Sarika; Benson, Heather A E

    2010-01-01

    There is an increasing understanding of the role of peptides in normal skin function and skin disease. With this knowledge, there is significant interest in the application of peptides as therapeutics in skin disease or as cosmeceuticals to enhance skin appearance. In particular, antimicrobial peptides and those involved in inflammatory processes provide options for the development of new therapeutic directions in chronic skin conditions such as psoriasis and dermatitis. To exploit their potential, it is essential that these peptides are delivered to their site of action in active form and in sufficient quantity to provide the desired effect. Many polymers permeate the skin poorly and are vulnerable to enzymatic degradation. Synthesis of cyclic peptide derivatives can substantially alter the physicochemical characteristics of the peptide with the potential to improve its skin permeation. In addition, cyclization can stabilize the peptide structure and thereby increase its stability. This review describes the role of cyclic peptides in the skin, examples of current cyclic peptide therapeutic products, and the potential for cyclic peptides as dermatological therapeutics and cosmeceuticals.

  14. Towards Green Cyclic Carbonate Synthesis : Heterogeneous and Homogeneous Catalyst Development

    NARCIS (Netherlands)

    Stewart, J.A.

    2015-01-01

    This PhD research serves to implement both known and novel catalytic systems for the purpose of cyclic carbonate synthesis from biomass-derived substrates. Such products have been earmarked as potential monomers for non-isocyanate polyurethanes (NIPUs), amongst other uses. Particular attention has

  15. Laboratory experiments of bucket foundations under cyclic loading

    DEFF Research Database (Denmark)

    Foglia, Aligi; Ibsen, Lars Bo

    This report collects information on the experimental campaign concerning bucket foundations under lateral cyclic loading conducted by the authors between 2011 and 2014. The report includes a step by step manual on the test procedures and a number of information and graphs for each experiment...

  16. Cyclic machine scheduling with tool transportation - additional calculations

    NARCIS (Netherlands)

    Kuijpers, C.M.H.

    2001-01-01

    In the PhD Thesis of Kuijpers a cyclic machine scheduling problem with tool transportation is considered. For the problem with two machines, it is shown that there always exists an optimal schedule with a certain structure. This is done by means of an elaborate case study. For a number of cases some

  17. Intermittent, Non Cyclic Severe Mechanical Aortic Valve Regurgitation

    Science.gov (United States)

    Choi, Jong Hyun; Song, Seunghwan; Lee, Myung-Yong

    2013-01-01

    Mechanical aortic prosthesis dysfunction can result from thrombosis or pannus formation. We describe an unusual case of intermittent, non cyclic mechanical aortic prosthesis dysfunction due to pannus formation with thrombus in the absence of systolic restriction of disk excursion, that presented with intermittent severe aortic regurgitation. PMID:24459568

  18. Topology and symmetry of surface Majorana arcs in cyclic superconductors

    Science.gov (United States)

    Mizushima, Takeshi; Nitta, Muneto

    2018-01-01

    We study the topology and symmetry of surface Majorana arcs in superconductors with nonunitary "cyclic" pairing. Cyclic p -wave pairing may be realized in a cubic or tetrahedral crystal, while it is a candidate for the interior P32 superfluids of neutron stars. The cyclic state is an admixture of full gap and nodal gap with eight Weyl points and the low-energy physics is governed by itinerant Majorana fermions. We here show the evolution of surface states from Majorana cone to Majorana arcs under rotation of surface orientation. The Majorana cone is protected solely by an accidental spin rotation symmetry and fragile against spin-orbit coupling, while the arcs are attributed to two topological invariants: the first Chern number and one-dimensional winding number. Lastly, we discuss how topologically protected surface states inherent to the nonunitary cyclic pairing can be captured from surface probes in candidate compounds, such as U1 -xThxBe13 . We examine tunneling conductance spectra for two competitive scenarios in U1 -xThxBe13 —the degenerate Eu scenario and the accidental scenario.

  19. Optimal codes as Tanner codes with cyclic component codes

    DEFF Research Database (Denmark)

    Høholdt, Tom; Pinero, Fernando; Zeng, Peng

    2014-01-01

    In this article we study a class of graph codes with cyclic code component codes as affine variety codes. Within this class of Tanner codes we find some optimal binary codes. We use a particular subgraph of the point-line incidence plane of A(2,q) as the Tanner graph, and we are able to describe ...

  20. Cyclic Voltammetry of Biopolymer Heparin at PVC Plasticized Liquid Membrane

    Czech Academy of Sciences Publication Activity Database

    Samec, Zdeněk; Trojánek, Antonín; Langmaier, Jan; Samcová, E.

    2003-01-01

    Roč. 5, - (2003), s. 867-870 ISSN 1388-2481 R&D Projects: GA ČR GA203/04/0424 Institutional research plan: CEZ:AV0Z4040901 Keywords : cyclic voltammetry * PVC plasticized liquit membrane * heparin Subject RIV: CG - Electrochemistry Impact factor: 2.300, year: 2003

  1. Biosynthesis and regulation of cyclic lipopeptides in Pseudomonas fluorescens

    NARCIS (Netherlands)

    Bruijn, de I.

    2009-01-01

    Cyclic lipopeptides (CLPs) are surfactant and antibiotic metabolites produced by a variety of bacterial
    genera. For the genus Pseudomonas, many structurally different CLPs have been identified. CLPs play an
    important role in surface motility of Pseudomonas strains, but also in virulence

  2. Cup products in Hopf cyclic cohomology with coefficients in contramodules

    OpenAIRE

    Rangipour, Bahram

    2010-01-01

    We use stable anti Yetter-Drinfeld contramodules to improve the cup products in Hopf cyclic cohomology. The improvement fixes the lack of functoriality of the cup products previously defined and show that the cup products are sensitive to the coefficients.

  3. Cyclic viscoelasticity and viscoplasticity of polypropylene/clay nanocomposites

    DEFF Research Database (Denmark)

    Drozdov, Aleksey; Christiansen, Jesper de Claville; Hog Lejre, Anne-Lise

    2012-01-01

    Observations are reported in tensile relaxation tests under stretching and retraction on poly-propylene/clay nanocomposites with various contents of filler. A two-phase constitutive model is developed in cyclic viscoelasticity and viscoplasticity of hybrid nanocomposites. Adjustable parameters in...

  4. METHODOLOGICAL ASPECTS OF ECONOMIC EVENTS CYCLICITY METHOD CONSIDERATION

    Directory of Open Access Journals (Sweden)

    Yaskova Natalia Yur'ievna

    2017-07-01

    Full Text Available The cyclicity of economic phenomena is not only their immanent property but also the subject of economic analysis. The modern way of making managerial decisions requires analysis of a number of cycles that fill any kind of activity. Accounting and reconciliation of construction, design, investment, purchasing, reproduction, leasing and other cycles is important for the investment and construction sector, both from the point of view of the need for their synchronization and from the position of determining trends in sectoral development. The analysis has showed that three main types of development are characteristic for investment and construction activity. Increasing intensity is inherent in a high level of cyclic synchronization. The degradation trend arises as a result of mismatched cycles. The stabilization character is inherent in the regular modes of maintaining the established proportions and cyclical inter-conformity. The study of the cyclical nature of investment and building processes is impossible without understanding their co-ordination. The principles of synchronization and subordination of the cycles should be used not only for the construction of cost-effective systems but also for the development of management tools.

  5. Cyclic flow shop scheduling problem with two-machine cells

    Directory of Open Access Journals (Sweden)

    Bożejko Wojciech

    2017-06-01

    Full Text Available In the paper a variant of cyclic production with setups and two-machine cell is considered. One of the stages of the problem solving consists of assigning each operation to the machine on which it will be carried out. The total number of such assignments is exponential. We propose a polynomial time algorithm finding the optimal operations to machines assignment.

  6. Emergence of traveling density waves in cyclic multiparticle transport

    NARCIS (Netherlands)

    Kannellopoulos, G.; van der Meer, Roger M.; van der Weele, J.P.

    2015-01-01

    Multiparticle flow through a cyclic array of connected compartments with a preferential direction is found to be able to organize itself in traveling waves. This behavior is connected with the transition between uniform flow and cluster formation. When the bias in the system is large, the particles

  7. Evolutions of Yang Phase Under Cyclic Condition and Adiabatic Condition

    International Nuclear Information System (INIS)

    Qian Shangwu; Gu Zhiyu

    2005-01-01

    There are three non-integrable phases in literatures: Berry phase, Aharonov-Anandan phase, and Yang phase. This article discusses the evolutions of Yang phase under the cyclic condition and the adiabatic condition for the general time-dependent harmonic oscillator, thus reveals the intimate relations between these three non-integrable phases.

  8. Retinal Cyclic Nucleotide-Gated Channels: From Pathophysiology to Therapy

    Directory of Open Access Journals (Sweden)

    Stylianos Michalakis

    2018-03-01

    Full Text Available The first step in vision is the absorption of photons by the photopigments in cone and rod photoreceptors. After initial amplification within the phototransduction cascade the signal is translated into an electrical signal by the action of cyclic nucleotide-gated (CNG channels. CNG channels are ligand-gated ion channels that are activated by the binding of cyclic guanosine monophosphate (cGMP or cyclic adenosine monophosphate (cAMP. Retinal CNG channels transduce changes in intracellular concentrations of cGMP into changes of the membrane potential and the Ca2+ concentration. Structurally, the CNG channels belong to the superfamily of pore-loop cation channels and share a common gross structure with hyperpolarization-activated cyclic nucleotide-gated (HCN channels and voltage-gated potassium channels (KCN. In this review, we provide an overview on the molecular properties of CNG channels and describe their physiological role in the phototransduction pathways. We also discuss insights into the pathophysiological role of CNG channel proteins that have emerged from the analysis of CNG channel-deficient animal models and human CNG channelopathies. Finally, we summarize recent gene therapy activities and provide an outlook for future clinical application.

  9. The comparison of cyclic deformation curve determination for ADI

    Czech Academy of Sciences Publication Activity Database

    Zapletal, J.; Obrtlík, Karel; Věchet, S.

    308 2005, - (2005), s. 305-309 ISSN 1429-6055. [Miedzynarodowe sympozjum /20./. Ustroň-Jaszowiec, 07.12.2005-09.12.2005] R&D Projects: GA ČR(CZ) GA106/03/1265 Institutional research plan: CEZ:AV0Z20410507 Keywords : cyclic stress-strain curve * austempered ductile iron Subject RIV: JG - Metallurgy

  10. Cyclic Nucleotide Monophosphates and Their Cyclases in Plant Signaling

    KAUST Repository

    Gehring, Christoph A.

    2017-10-04

    The cyclic nucleotide monophosphates (cNMPs), and notably 3′,5′-cyclic guanosine monophosphate (cGMP) and 3′,5′-cyclic adenosine monophosphate (cAMP) are now accepted as key signaling molecules in many processes in plants including growth and differentiation, photosynthesis, and biotic and abiotic defense. At the single molecule level, we are now beginning to understand how cNMPs modify specific target molecules such as cyclic nucleotide-gated channels, while at the systems level, a recent study of the Arabidopsis cNMP interactome has identified novel target molecules with specific cNMP-binding domains. A major advance came with the discovery and characterization of a steadily increasing number of guanylate cyclases (GCs) and adenylate cyclases (ACs). Several of the GCs are receptor kinases and include the brassinosteroid receptor, the phytosulfokine receptor, the Pep receptor, the plant natriuretic peptide receptor as well as a nitric oxide sensor. We foresee that in the near future many more molecular mechanisms and biological roles of GCs and ACs and their catalytic products will be discovered and further establish cNMPs as a key component of plant responses to the environment.

  11. Cyclic Nucleotide Monophosphates and Their Cyclases in Plant Signaling

    KAUST Repository

    Gehring, Christoph A; Turek, Ilona S.

    2017-01-01

    The cyclic nucleotide monophosphates (cNMPs), and notably 3′,5′-cyclic guanosine monophosphate (cGMP) and 3′,5′-cyclic adenosine monophosphate (cAMP) are now accepted as key signaling molecules in many processes in plants including growth and differentiation, photosynthesis, and biotic and abiotic defense. At the single molecule level, we are now beginning to understand how cNMPs modify specific target molecules such as cyclic nucleotide-gated channels, while at the systems level, a recent study of the Arabidopsis cNMP interactome has identified novel target molecules with specific cNMP-binding domains. A major advance came with the discovery and characterization of a steadily increasing number of guanylate cyclases (GCs) and adenylate cyclases (ACs). Several of the GCs are receptor kinases and include the brassinosteroid receptor, the phytosulfokine receptor, the Pep receptor, the plant natriuretic peptide receptor as well as a nitric oxide sensor. We foresee that in the near future many more molecular mechanisms and biological roles of GCs and ACs and their catalytic products will be discovered and further establish cNMPs as a key component of plant responses to the environment.

  12. Cyclic antibiotic therapy for diverticular disease: a critical reappraisal.

    Science.gov (United States)

    Zullo, Angelo; Hassan, Cesare; Maconi, Giovanni; Manes, Gianpiero; Tammaro, Gianfranco; De Francesco, Vincenzo; Annibale, Bruno; Ficano, Leonardo; Buri, Luigi; Gatto, Giovanni; Lorenzetti, Roberto; Campo, Salvatore M; Ierardi, Enzo; Pace, Fabio; Morini, Sergio

    2010-09-01

    Different symptoms have been attributed to uncomplicated diverticular disease (DD). Poor absorbable antibiotics are largely used for uncomplicated DD, mainly for symptom treatment and prevention of diverticulitis onset. Controlled trials on cyclic administration of rifaximin in DD patients were evaluated. Four controlled, including 1 double-blind and 3 open-label, randomized studies were available. Following a long-term cyclic therapy, a significant difference emerged in the global symptoms score (range: 0-18) between rifaximin plus fibers (from 6-6.5 to 1-2) and fibers alone (from 6.7 to 2-3.8), although the actual clinically relevance of such a very small difference remains to be ascertained. Moreover, a similar global symptom score reduction (from 6 to 2.4) can be achieved by simply recommending an inexpensive high-fiber diet. Current data suggest that cyclic rifaximin plus fibers significantly reduce the incidence of the first episode of acute diverticulitis as compared to fibers alone (1.03% vs 2.75%), but a cost-efficacy analysis is needed before this treatment can be routinely recommended. The available studies have been hampered by some limitations, and definite conclusions could not be drawn. The cost of a long-life, cyclic rifaximin therapy administered to all symptomatic DD patients would appear prohibitive.

  13. Structure and stability of spiro-cyclic water clusters

    Indian Academy of Sciences (India)

    Administrator

    Abstract. The structure and stability of spiro-cyclic water clusters containing up to 32 water molecules have been ... due to its importance in various real life systems. 1–8. High level ... It is well-known from the crystal structure data- base that the ...

  14. Optimum Design and Operation of Cyclic Storage Systems; Lumped Approach

    Directory of Open Access Journals (Sweden)

    Leila Ostadrahimi

    2007-01-01

    Full Text Available Conjunctive use of surface and groundwater resources is a preferred approach in water resources management. Compared to dam construction, groundwater has certain advantages, among which are less costs, less sedimentation and evaporation, fewer water quality problems, and less social and cultural problems. To reduce the major problems associated with the development of large-scale surface impoundment systems, cyclic storage systems can be used as an alternative. A cyclic storage system (CYCS is an integrated interactive system consisting of two subsystems of surface water storage (reservoir and groundwater; this system together with artificial recharge is able to satisfy the predefined demands with rather high reliability. In order to optimize these systems, one must consider the hydraulic interactions between all the components, but unfortunately it has been neglected in many studies. In this article, a nonlinear optimization model for design and operation of cyclic storage systems has been developed using the lumped approach. In order to evaluate the model, its results have been compared with the results of a model in which distributed approach had been deployed, and so the efficiency of lumped models to solve the problems of cyclic storage systems has been investigated.

  15. Finite element analysis of the cyclic indentation of bilayer enamel

    International Nuclear Information System (INIS)

    Jia, Yunfei; Xuan, Fu-zhen; Chen, Xiaoping; Yang, Fuqian

    2014-01-01

    Tooth enamel is often subjected to repeated contact and often experiences contact deformation in daily life. The mechanical strength of the enamel determines the biofunctionality of the tooth. Considering the variation of the rod arrangement in outer and inner enamel, we approximate enamel as a bilayer structure and perform finite element analysis of the cyclic indentation of the bilayer structure, to mimic the repeated contact of enamel during mastication. The dynamic deformation behaviour of both the inner enamel and the bilayer enamel is examined. The material parameters of the inner and outer enamel used in the analysis are obtained by fitting the finite element results with the experimental nanoindentation results. The penetration depth per cycle at the quasi-steady state is used to describe the depth propagation speed, which exhibits a two-stage power-law dependence on the maximum indentation load and the amplitude of the cyclic load, respectively. The continuous penetration of the indenter reflects the propagation of the plastic zone during cyclic indentation, which is related to the energy dissipation. The outer enamel serves as a protective layer due to its great resistance to contact deformation in comparison to the inner enamel. The larger equivalent plastic strain and lower stresses in the inner enamel during cyclic indentation, as calculated from the finite element analysis, indicate better crack/fracture resistance of the inner enamel. (paper)

  16. Finite element analysis of the cyclic indentation of bilayer enamel

    Science.gov (United States)

    Jia, Yunfei; Xuan, Fu-zhen; Chen, Xiaoping; Yang, Fuqian

    2014-04-01

    Tooth enamel is often subjected to repeated contact and often experiences contact deformation in daily life. The mechanical strength of the enamel determines the biofunctionality of the tooth. Considering the variation of the rod arrangement in outer and inner enamel, we approximate enamel as a bilayer structure and perform finite element analysis of the cyclic indentation of the bilayer structure, to mimic the repeated contact of enamel during mastication. The dynamic deformation behaviour of both the inner enamel and the bilayer enamel is examined. The material parameters of the inner and outer enamel used in the analysis are obtained by fitting the finite element results with the experimental nanoindentation results. The penetration depth per cycle at the quasi-steady state is used to describe the depth propagation speed, which exhibits a two-stage power-law dependence on the maximum indentation load and the amplitude of the cyclic load, respectively. The continuous penetration of the indenter reflects the propagation of the plastic zone during cyclic indentation, which is related to the energy dissipation. The outer enamel serves as a protective layer due to its great resistance to contact deformation in comparison to the inner enamel. The larger equivalent plastic strain and lower stresses in the inner enamel during cyclic indentation, as calculated from the finite element analysis, indicate better crack/fracture resistance of the inner enamel.

  17. Are international fund flows pro- or counter-cyclical?

    NARCIS (Netherlands)

    Li, Suxiao; de Haan, Jakob; Scholtens, Bert; Yang, Haizhen

    2015-01-01

    We investigate whether international fund flows are pro-or counter-cyclical by employing a concordance index. International fund flows are investments in bond and equity markets by institutional investors, such as mutual funds, exchange traded funds, closed-end funds and hedge funds. We find that

  18. Optical fibre Bragg grating recorded in TOPAS cyclic olefin copolymer

    DEFF Research Database (Denmark)

    Johnson, I.P.; Yuan, Scott Wu; Stefani, Alessio

    2011-01-01

    A report is presented on the inscription of a fibre Bragg grating into a microstructured polymer optical fibre fabricated from TOPAS cyclic olefin copolymer. This material offers two important advantages over poly (methyl methacrylate), which up to now has formed the basis for polymer fibre Bragg...

  19. A theoretical model for predicting neutron fluxes for cyclic Neutron ...

    African Journals Online (AJOL)

    A theoretical model has been developed for prediction of thermal neutron fluxes required for cyclic irradiations of a sample to obtain the same activity previously used for the detection of any radionuclide of interest. The model is suitable for radiotracer production or for long-lived neutron activation products where the ...

  20. Random matrix theory for pseudo-Hermitian systems: Cyclic blocks

    Indian Academy of Sciences (India)

    We discuss the relevance of random matrix theory for pseudo-Hermitian systems, and, for Hamiltonians that break parity and time-reversal invariance . In an attempt to understand the random Ising model, we present the treatment of cyclic asymmetric matrices with blocks and show that the nearest-neighbour spacing ...