Two fast and accurate heuristic RBF learning rules for data classification.
Rouhani, Modjtaba; Javan, Dawood S
2016-03-01
This paper presents new Radial Basis Function (RBF) learning methods for classification problems. The proposed methods use some heuristics to determine the spreads, the centers and the number of hidden neurons of network in such a way that the higher efficiency is achieved by fewer numbers of neurons, while the learning algorithm remains fast and simple. To retain network size limited, neurons are added to network recursively until termination condition is met. Each neuron covers some of train data. The termination condition is to cover all training data or to reach the maximum number of neurons. In each step, the center and spread of the new neuron are selected based on maximization of its coverage. Maximization of coverage of the neurons leads to a network with fewer neurons and indeed lower VC dimension and better generalization property. Using power exponential distribution function as the activation function of hidden neurons, and in the light of new learning approaches, it is proved that all data became linearly separable in the space of hidden layer outputs which implies that there exist linear output layer weights with zero training error. The proposed methods are applied to some well-known datasets and the simulation results, compared with SVM and some other leading RBF learning methods, show their satisfactory and comparable performance. Copyright © 2015 Elsevier Ltd. All rights reserved.
The Hidden Costs of Part-Time Faculty.
ERIC Educational Resources Information Center
Nance, Guinevera; Culverhouse, Renee
1992-01-01
As colleges face budget reductions, they must consider the substantial hidden costs of unemployment benefits for terminated part-time faculty. Planning a sound program of benefits management that includes cost containment requires the cooperation of personnel director, chief financial officer, and chief academic officer. (MSE)
NASA Astrophysics Data System (ADS)
Leonov, G. A.; Kuznetsov, N. V.
From a computational point of view, in nonlinear dynamical systems, attractors can be regarded as self-excited and hidden attractors. Self-excited attractors can be localized numerically by a standard computational procedure, in which after a transient process a trajectory, starting from a point of unstable manifold in a neighborhood of equilibrium, reaches a state of oscillation, therefore one can easily identify it. In contrast, for a hidden attractor, a basin of attraction does not intersect with small neighborhoods of equilibria. While classical attractors are self-excited, attractors can therefore be obtained numerically by the standard computational procedure. For localization of hidden attractors it is necessary to develop special procedures, since there are no similar transient processes leading to such attractors. At first, the problem of investigating hidden oscillations arose in the second part of Hilbert's 16th problem (1900). The first nontrivial results were obtained in Bautin's works, which were devoted to constructing nested limit cycles in quadratic systems, that showed the necessity of studying hidden oscillations for solving this problem. Later, the problem of analyzing hidden oscillations arose from engineering problems in automatic control. In the 50-60s of the last century, the investigations of widely known Markus-Yamabe's, Aizerman's, and Kalman's conjectures on absolute stability have led to the finding of hidden oscillations in automatic control systems with a unique stable stationary point. In 1961, Gubar revealed a gap in Kapranov's work on phase locked-loops (PLL) and showed the possibility of the existence of hidden oscillations in PLL. At the end of the last century, the difficulties in analyzing hidden oscillations arose in simulations of drilling systems and aircraft's control systems (anti-windup) which caused crashes. Further investigations on hidden oscillations were greatly encouraged by the present authors' discovery, in 2010 (for the first time), of chaotic hidden attractor in Chua's circuit. This survey is dedicated to efficient analytical-numerical methods for the study of hidden oscillations. Here, an attempt is made to reflect the current trends in the synthesis of analytical and numerical methods.
2016-01-01
Identifying the hidden state is important for solving problems with hidden state. We prove any deterministic partially observable Markov decision processes (POMDP) can be represented by a minimal, looping hidden state transition model and propose a heuristic state transition model constructing algorithm. A new spatiotemporal associative memory network (STAMN) is proposed to realize the minimal, looping hidden state transition model. STAMN utilizes the neuroactivity decay to realize the short-term memory, connection weights between different nodes to represent long-term memory, presynaptic potentials, and synchronized activation mechanism to complete identifying and recalling simultaneously. Finally, we give the empirical illustrations of the STAMN and compare the performance of the STAMN model with that of other methods. PMID:27891146
Quantum mechanics and hidden superconformal symmetry
NASA Astrophysics Data System (ADS)
Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.
2017-12-01
Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).
Hidden symmetry in the confined hydrogen atom problem
NASA Astrophysics Data System (ADS)
Pupyshev, Vladimir I.; Scherbinin, Andrei V.
2002-07-01
The classical counterpart of the well-known quantum mechanical model of a spherically confined hydrogen atom is examined in terms of the Lenz vector, a dynamic variable featuring the conventional Kepler problem. It is shown that a conditional conservation law associated with the Lenz vector is true, in fair agreement with the corresponding quantum problem previously found to exhibit a hidden symmetry as well.
Hidden algebra method (quasi-exact-solvability in quantum mechanics)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Turbiner, Alexander; Instituto de Ciencias Nucleares, Universidad Nacional Autonoma de Mexico, Apartado, Postal 70-543, 04510 Mexico, D. F.
1996-02-20
A general introduction to quasi-exactly-solvable problems of quantum mechanics is presented. Main attention is given to multidimensional quasi-exactly-solvable and exactly-solvable Schroedinger operators. Exact-solvability of the Calogero and Sutherland N-body problems ass ociated with an existence of the hidden algebra slN is discussed extensively.
Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.
ERIC Educational Resources Information Center
Krokoff, Lowell J.
1990-01-01
Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)
Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin
2017-06-07
The IEEE 802.15.4e standard proposes Medium Access Control (MAC) to support collision-free wireless channel access mechanisms for industrial, commercial and healthcare applications. However, unnecessary wastage of energy and bandwidth consumption occur due to inefficient backoff management and collisions. In this paper, a new channel access mechanism is designed for the buffer constraint sensor devices to reduce the packet drop rate, energy consumption and collisions. In order to avoid collision due to the hidden terminal problem, a new frame structure is designed for the data transmission. A new superframe structure is proposed to mitigate the problems due to WiFi and ZigBee interference. A modified superframe structure with a new retransmission opportunity for failure devices is proposed to reduce the collisions and retransmission delay with high reliability. Performance evaluation and validation of our scheme indicate that the packet drop rate, throughput, reliability, energy consumption and average delay of the nodes can be improved significantly.
Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin
2017-01-01
The IEEE 802.15.4e standard proposes Medium Access Control (MAC) to support collision-free wireless channel access mechanisms for industrial, commercial and healthcare applications. However, unnecessary wastage of energy and bandwidth consumption occur due to inefficient backoff management and collisions. In this paper, a new channel access mechanism is designed for the buffer constraint sensor devices to reduce the packet drop rate, energy consumption and collisions. In order to avoid collision due to the hidden terminal problem, a new frame structure is designed for the data transmission. A new superframe structure is proposed to mitigate the problems due to WiFi and ZigBee interference. A modified superframe structure with a new retransmission opportunity for failure devices is proposed to reduce the collisions and retransmission delay with high reliability. Performance evaluation and validation of our scheme indicate that the packet drop rate, throughput, reliability, energy consumption and average delay of the nodes can be improved significantly. PMID:28590434
Tracking Problem Solving by Multivariate Pattern Analysis and Hidden Markov Model Algorithms
ERIC Educational Resources Information Center
Anderson, John R.
2012-01-01
Multivariate pattern analysis can be combined with Hidden Markov Model algorithms to track the second-by-second thinking as people solve complex problems. Two applications of this methodology are illustrated with a data set taken from children as they interacted with an intelligent tutoring system for algebra. The first "mind reading" application…
Inference for dynamics of continuous variables: the extended Plefka expansion with hidden nodes
NASA Astrophysics Data System (ADS)
Bravi, B.; Sollich, P.
2017-06-01
We consider the problem of a subnetwork of observed nodes embedded into a larger bulk of unknown (i.e. hidden) nodes, where the aim is to infer these hidden states given information about the subnetwork dynamics. The biochemical networks underlying many cellular and metabolic processes are important realizations of such a scenario as typically one is interested in reconstructing the time evolution of unobserved chemical concentrations starting from the experimentally more accessible ones. We present an application to this problem of a novel dynamical mean field approximation, the extended Plefka expansion, which is based on a path integral description of the stochastic dynamics. As a paradigmatic model we study the stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings. The resulting joint distribution is known to be Gaussian and this allows us to fully characterize the posterior statistics of the hidden nodes. In particular the equal-time hidden-to-hidden variance—conditioned on observations—gives the expected error at each node when the hidden time courses are predicted based on the observations. We assess the accuracy of the extended Plefka expansion in predicting these single node variances as well as error correlations over time, focussing on the role of the system size and the number of observed nodes.
Hidden algebra method (quasi-exact-solvability in quantum mechanics)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Turbiner, A.
1996-02-01
A general introduction to quasi-exactly-solvable problems of quantum mechanics is presented. Main attention is given to multidimensional quasi-exactly-solvable and exactly-solvable Schroedinger operators. Exact-solvability of the Calogero and Sutherland {ital N}-body problems ass ociated with an existence of the hidden algebra {ital sl}{sub {ital N}} is discussed extensively. {copyright} {ital 1996 American Institute of Physics.}
Hidden Markov models for character recognition.
Vlontzos, J A; Kung, S Y
1992-01-01
A hierarchical system for character recognition with hidden Markov model knowledge sources which solve both the context sensitivity problem and the character instantiation problem is presented. The system achieves 97-99% accuracy using a two-level architecture and has been implemented using a systolic array, thus permitting real-time (1 ms per character) multifont and multisize printed character recognition as well as handwriting recognition.
Hidden Markov models for evolution and comparative genomics analysis.
Bykova, Nadezda A; Favorov, Alexander V; Mironov, Andrey A
2013-01-01
The problem of reconstruction of ancestral states given a phylogeny and data from extant species arises in a wide range of biological studies. The continuous-time Markov model for the discrete states evolution is generally used for the reconstruction of ancestral states. We modify this model to account for a case when the states of the extant species are uncertain. This situation appears, for example, if the states for extant species are predicted by some program and thus are known only with some level of reliability; it is common for bioinformatics field. The main idea is formulation of the problem as a hidden Markov model on a tree (tree HMM, tHMM), where the basic continuous-time Markov model is expanded with the introduction of emission probabilities of observed data (e.g. prediction scores) for each underlying discrete state. Our tHMM decoding algorithm allows us to predict states at the ancestral nodes as well as to refine states at the leaves on the basis of quantitative comparative genomics. The test on the simulated data shows that the tHMM approach applied to the continuous variable reflecting the probabilities of the states (i.e. prediction score) appears to be more accurate then the reconstruction from the discrete states assignment defined by the best score threshold. We provide examples of applying our model to the evolutionary analysis of N-terminal signal peptides and transcription factor binding sites in bacteria. The program is freely available at http://bioinf.fbb.msu.ru/~nadya/tHMM and via web-service at http://bioinf.fbb.msu.ru/treehmmweb.
A Finite Element Analysis of a Class of Problems in Elasto-Plasticity with Hidden Variables.
1985-09-01
RD-R761 642 A FINITE ELEMENT ANALYSIS OF A CLASS OF PROBLEMS IN 1/2 ELASTO-PLASTICITY MIlT (U) TEXAS INST FOR COMPUTATIONAL MECHANICS AUSTIN J T ODEN...end Subtitle) S. TYPE OF REPORT & PERIOD COVERED A FINITE ELEMENT ANALYSIS OF A CLASS OF PROBLEMS Final Report IN ELASTO-PLASTICITY WITH HIDDEN...aieeoc ede It neceeeary nd Identify by block number) ;"Elastoplasticity, finite deformations; non-convex analysis ; finite element methods, metal forming
Zhao, Zhibiao
2011-06-01
We address the nonparametric model validation problem for hidden Markov models with partially observable variables and hidden states. We achieve this goal by constructing a nonparametric simultaneous confidence envelope for transition density function of the observable variables and checking whether the parametric density estimate is contained within such an envelope. Our specification test procedure is motivated by a functional connection between the transition density of the observable variables and the Markov transition kernel of the hidden states. Our approach is applicable for continuous time diffusion models, stochastic volatility models, nonlinear time series models, and models with market microstructure noise.
NASA Astrophysics Data System (ADS)
O'Leary, M.
2014-12-01
Any model of an ocean-terminating ice mass requires a frontal boundary condition, often referred to as a "calving law". The choice of this boundary condition can have complex and poorly-understood effects on the behaviour of the system. Despite this, calving laws are often chosen based on numerical convenience or fashions in the literature. This can often lead to predictions which have "hidden dependencies" on the particular choice of calving law. As an attempt to alleviate this problem, I will show results from a wide variety of calving laws, applied to tidewater glacier scenarios. I will demonstrate how the decadal-scale stability of a tidewater system can put constraints on possible calving laws, and how certain observational phenomena, such as the presence of "pinning points" are largely independent of the choice of calving law. These results can be used by practitioners to decide on appropriate calving laws for the specific problems at hand. They should also be useful to help direct research into new calving laws, and to guide our conception of what an ideal calving law should look like.
Scalable learning method for feedforward neural networks using minimal-enclosing-ball approximation.
Wang, Jun; Deng, Zhaohong; Luo, Xiaoqing; Jiang, Yizhang; Wang, Shitong
2016-06-01
Training feedforward neural networks (FNNs) is one of the most critical issues in FNNs studies. However, most FNNs training methods cannot be directly applied for very large datasets because they have high computational and space complexity. In order to tackle this problem, the CCMEB (Center-Constrained Minimum Enclosing Ball) problem in hidden feature space of FNN is discussed and a novel learning algorithm called HFSR-GCVM (hidden-feature-space regression using generalized core vector machine) is developed accordingly. In HFSR-GCVM, a novel learning criterion using L2-norm penalty-based ε-insensitive function is formulated and the parameters in the hidden nodes are generated randomly independent of the training sets. Moreover, the learning of parameters in its output layer is proved equivalent to a special CCMEB problem in FNN hidden feature space. As most CCMEB approximation based machine learning algorithms, the proposed HFSR-GCVM training algorithm has the following merits: The maximal training time of the HFSR-GCVM training is linear with the size of training datasets and the maximal space consumption is independent of the size of training datasets. The experiments on regression tasks confirm the above conclusions. Copyright © 2016 Elsevier Ltd. All rights reserved.
A new optimized GA-RBF neural network algorithm.
Jia, Weikuan; Zhao, Dean; Shen, Tian; Su, Chunyang; Hu, Chanli; Zhao, Yuyan
2014-01-01
When confronting the complex problems, radial basis function (RBF) neural network has the advantages of adaptive and self-learning ability, but it is difficult to determine the number of hidden layer neurons, and the weights learning ability from hidden layer to the output layer is low; these deficiencies easily lead to decreasing learning ability and recognition precision. Aiming at this problem, we propose a new optimized RBF neural network algorithm based on genetic algorithm (GA-RBF algorithm), which uses genetic algorithm to optimize the weights and structure of RBF neural network; it chooses new ways of hybrid encoding and optimizing simultaneously. Using the binary encoding encodes the number of the hidden layer's neurons and using real encoding encodes the connection weights. Hidden layer neurons number and connection weights are optimized simultaneously in the new algorithm. However, the connection weights optimization is not complete; we need to use least mean square (LMS) algorithm for further leaning, and finally get a new algorithm model. Using two UCI standard data sets to test the new algorithm, the results show that the new algorithm improves the operating efficiency in dealing with complex problems and also improves the recognition precision, which proves that the new algorithm is valid.
Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance
Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos
2016-01-01
In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results. PMID:26861352
Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.
Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos
2016-02-06
In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.
Fizil, Ádám; Gáspári, Zoltán; Barna, Terézia; Marx, Florentine; Batta, Gyula
2015-01-01
Transition between conformational states in proteins is being recognized as a possible key factor of function. In support of this, hidden dynamic NMR structures were detected in several cases up to populations of a few percent. Here, we show by two- and three-state analysis of thermal unfolding, that the population of hidden states may weight 20–40 % at 298 K in a disulfide-rich protein. In addition, sensitive 15N-CEST NMR experiments identified a low populated (0.15 %) state that was in slow exchange with the folded PAF protein. Remarkably, other techniques failed to identify the rest of the NMR “dark matter”. Comparison of the temperature dependence of chemical shifts from experiments and molecular dynamics calculations suggests that hidden conformers of PAF differ in the loop and terminal regions and are most similar in the evolutionary conserved core. Our observations point to the existence of a complex conformational landscape with multiple conformational states in dynamic equilibrium, with diverse exchange rates presumably responsible for the completely hidden nature of a considerable fraction. PMID:25676351
Detecting targets hidden in random forests
NASA Astrophysics Data System (ADS)
Kouritzin, Michael A.; Luo, Dandan; Newton, Fraser; Wu, Biao
2009-05-01
Military tanks, cargo or troop carriers, missile carriers or rocket launchers often hide themselves from detection in the forests. This plagues the detection problem of locating these hidden targets. An electro-optic camera mounted on a surveillance aircraft or unmanned aerial vehicle is used to capture the images of the forests with possible hidden targets, e.g., rocket launchers. We consider random forests of longitudinal and latitudinal correlations. Specifically, foliage coverage is encoded with a binary representation (i.e., foliage or no foliage), and is correlated in adjacent regions. We address the detection problem of camouflaged targets hidden in random forests by building memory into the observations. In particular, we propose an efficient algorithm to generate random forests, ground, and camouflage of hidden targets with two dimensional correlations. The observations are a sequence of snapshots consisting of foliage-obscured ground or target. Theoretically, detection is possible because there are subtle differences in the correlations of the ground and camouflage of the rocket launcher. However, these differences are well beyond human perception. To detect the presence of hidden targets automatically, we develop a Markov representation for these sequences and modify the classical filtering equations to allow the Markov chain observation. Particle filters are used to estimate the position of the targets in combination with a novel random weighting technique. Furthermore, we give positive proof-of-concept simulations.
Nonparametric model validations for hidden Markov models with applications in financial econometrics
Zhao, Zhibiao
2011-01-01
We address the nonparametric model validation problem for hidden Markov models with partially observable variables and hidden states. We achieve this goal by constructing a nonparametric simultaneous confidence envelope for transition density function of the observable variables and checking whether the parametric density estimate is contained within such an envelope. Our specification test procedure is motivated by a functional connection between the transition density of the observable variables and the Markov transition kernel of the hidden states. Our approach is applicable for continuous time diffusion models, stochastic volatility models, nonlinear time series models, and models with market microstructure noise. PMID:21750601
García-Pedrajas, Nicolás; Ortiz-Boyer, Domingo; Hervás-Martínez, César
2006-05-01
In this work we present a new approach to crossover operator in the genetic evolution of neural networks. The most widely used evolutionary computation paradigm for neural network evolution is evolutionary programming. This paradigm is usually preferred due to the problems caused by the application of crossover to neural network evolution. However, crossover is the most innovative operator within the field of evolutionary computation. One of the most notorious problems with the application of crossover to neural networks is known as the permutation problem. This problem occurs due to the fact that the same network can be represented in a genetic coding by many different codifications. Our approach modifies the standard crossover operator taking into account the special features of the individuals to be mated. We present a new model for mating individuals that considers the structure of the hidden layer and redefines the crossover operator. As each hidden node represents a non-linear projection of the input variables, we approach the crossover as a problem on combinatorial optimization. We can formulate the problem as the extraction of a subset of near-optimal projections to create the hidden layer of the new network. This new approach is compared to a classical crossover in 25 real-world problems with an excellent performance. Moreover, the networks obtained are much smaller than those obtained with classical crossover operator.
Measurement problem and local hidden variables with entangled photons
NASA Astrophysics Data System (ADS)
Muchowski, Eugen
2017-12-01
It is shown that there is no remote action with polarization measurements of photons in singlet state. A model is presented introducing a hidden parameter which determines the polarizer output. This model is able to explain the polarization measurement results with entangled photons. It is not ruled out by Bell's Theorem.
Hidden Markov models and other machine learning approaches in computational molecular biology
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baldi, P.
1995-12-31
This tutorial was one of eight tutorials selected to be presented at the Third International Conference on Intelligent Systems for Molecular Biology which was held in the United Kingdom from July 16 to 19, 1995. Computational tools are increasingly needed to process the massive amounts of data, to organize and classify sequences, to detect weak similarities, to separate coding from non-coding regions, and reconstruct the underlying evolutionary history. The fundamental problem in machine learning is the same as in scientific reasoning in general, as well as statistical modeling: to come up with a good model for the data. In thismore » tutorial four classes of models are reviewed. They are: Hidden Markov models; artificial Neural Networks; Belief Networks; and Stochastic Grammars. When dealing with DNA and protein primary sequences, Hidden Markov models are one of the most flexible and powerful alignments and data base searches. In this tutorial, attention is focused on the theory of Hidden Markov Models, and how to apply them to problems in molecular biology.« less
Image segmentation using hidden Markov Gauss mixture models.
Pyun, Kyungsuk; Lim, Johan; Won, Chee Sun; Gray, Robert M
2007-07-01
Image segmentation is an important tool in image processing and can serve as an efficient front end to sophisticated algorithms and thereby simplify subsequent processing. We develop a multiclass image segmentation method using hidden Markov Gauss mixture models (HMGMMs) and provide examples of segmentation of aerial images and textures. HMGMMs incorporate supervised learning, fitting the observation probability distribution given each class by a Gauss mixture estimated using vector quantization with a minimum discrimination information (MDI) distortion. We formulate the image segmentation problem using a maximum a posteriori criteria and find the hidden states that maximize the posterior density given the observation. We estimate both the hidden Markov parameter and hidden states using a stochastic expectation-maximization algorithm. Our results demonstrate that HMGMM provides better classification in terms of Bayes risk and spatial homogeneity of the classified objects than do several popular methods, including classification and regression trees, learning vector quantization, causal hidden Markov models (HMMs), and multiresolution HMMs. The computational load of HMGMM is similar to that of the causal HMM.
Infinite hidden conditional random fields for human behavior analysis.
Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja
2013-01-01
Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time.
Tracking problem solving by multivariate pattern analysis and Hidden Markov Model algorithms.
Anderson, John R
2012-03-01
Multivariate pattern analysis can be combined with Hidden Markov Model algorithms to track the second-by-second thinking as people solve complex problems. Two applications of this methodology are illustrated with a data set taken from children as they interacted with an intelligent tutoring system for algebra. The first "mind reading" application involves using fMRI activity to track what students are doing as they solve a sequence of algebra problems. The methodology achieves considerable accuracy at determining both what problem-solving step the students are taking and whether they are performing that step correctly. The second "model discovery" application involves using statistical model evaluation to determine how many substates are involved in performing a step of algebraic problem solving. This research indicates that different steps involve different numbers of substates and these substates are associated with different fluency in algebra problem solving. Copyright © 2011 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Beck, Bernard
2017-01-01
Four recent movies, "Hidden Figures," "The Zookeeper's Wife," "Their Finest," and "Colossal" exemplify a new cultural version of the movie heroine. This version combines feminism with commitment to solving an overwhelming problem. These heroines, thus, display the character virtues of Wonder Woman and Mrs.…
Early Prediction of Students' Grade Point Averages at Graduation: A Data Mining Approach
ERIC Educational Resources Information Center
Tekin, Ahmet
2014-01-01
Problem Statement: There has recently been interest in educational databases containing a variety of valuable but sometimes hidden data that can be used to help less successful students to improve their academic performance. The extraction of hidden information from these databases often implements aspects of the educational data mining (EDM)…
Dramatising the Hidden Hurt: Acting against Covert Bullying by Adolescent Girls
ERIC Educational Resources Information Center
Burton, Bruce
2010-01-01
This paper, delivered at the International Drama in Education Research Institute (IDIERI) conference in Sydney in July 2009, explores the outcomes of a project designed to apply the applied theatre techniques developed for the Acting Against Bullying programme to the specific problem of covert or hidden bullying by adolescent girls. Conducted in a…
Dynamic extreme learning machine and its approximation capability.
Zhang, Rui; Lan, Yuan; Huang, Guang-Bin; Xu, Zong-Ben; Soh, Yeng Chai
2013-12-01
Extreme learning machines (ELMs) have been proposed for generalized single-hidden-layer feedforward networks which need not be neuron alike and perform well in both regression and classification applications. The problem of determining the suitable network architectures is recognized to be crucial in the successful application of ELMs. This paper first proposes a dynamic ELM (D-ELM) where the hidden nodes can be recruited or deleted dynamically according to their significance to network performance, so that not only the parameters can be adjusted but also the architecture can be self-adapted simultaneously. Then, this paper proves in theory that such D-ELM using Lebesgue p-integrable hidden activation functions can approximate any Lebesgue p-integrable function on a compact input set. Simulation results obtained over various test problems demonstrate and verify that the proposed D-ELM does a good job reducing the network size while preserving good generalization performance.
Reputation and Competition in a Hidden Action Model
Fedele, Alessandro; Tedeschi, Piero
2014-01-01
The economics models of reputation and quality in markets can be classified in three categories. (i) Pure hidden action, where only one type of seller is present who can provide goods of different quality. (ii) Pure hidden information, where sellers of different types have no control over product quality. (iii) Mixed frameworks, which include both hidden action and hidden information. In this paper we develop a pure hidden action model of reputation and Bertrand competition, where consumers and firms interact repeatedly in a market with free entry. The price of the good produced by the firms is contractible, whilst the quality is noncontractible, hence it is promised by the firms when a contract is signed. Consumers infer future quality from all available information, i.e., both from what they know about past quality and from current prices. According to early contributions, competition should make reputation unable to induce the production of high-quality goods. We provide a simple solution to this problem by showing that high quality levels are sustained as an outcome of a stationary symmetric equilibrium. PMID:25329387
Reputation and competition in a hidden action model.
Fedele, Alessandro; Tedeschi, Piero
2014-01-01
The economics models of reputation and quality in markets can be classified in three categories. (i) Pure hidden action, where only one type of seller is present who can provide goods of different quality. (ii) Pure hidden information, where sellers of different types have no control over product quality. (iii) Mixed frameworks, which include both hidden action and hidden information. In this paper we develop a pure hidden action model of reputation and Bertrand competition, where consumers and firms interact repeatedly in a market with free entry. The price of the good produced by the firms is contractible, whilst the quality is noncontractible, hence it is promised by the firms when a contract is signed. Consumers infer future quality from all available information, i.e., both from what they know about past quality and from current prices. According to early contributions, competition should make reputation unable to induce the production of high-quality goods. We provide a simple solution to this problem by showing that high quality levels are sustained as an outcome of a stationary symmetric equilibrium.
I-MAC: an incorporation MAC for wireless sensor networks
NASA Astrophysics Data System (ADS)
Zhao, Jumin; Li, Yikun; Li, Dengao; Lin, Xiaojie
2017-11-01
This paper proposes an innovative MAC protocol called I-MAC. Protocol for wireless sensor networks, which combines the advantages of collision tolerance and collision cancellation. The protocol increases the number of antenna in wireless sensor nodes. The purpose is to monitor the occurrence of packet collisions by increasing the number of antenna in real time. The built-in identity structure is used in the frame structure in order to help the sending node to identify the location of the receiving node after a data packet collision is detected. Packets can be recovered from where the conflict occurred. In this way, we can monitor the conflict for a fixed period of time. It can improve the channel utilisation through changing the transmission probability of collision nodes and solve the problem of hidden terminal through collision feedback mechanism. We have evaluated our protocol. Our results show that the throughput of I-MAC is 5 percentage points higher than that of carrier sense multiple access/collision notification. The network utilisation of I-MAC is more than 92%.
Fizil, Ádám; Gáspári, Zoltán; Barna, Terézia; Marx, Florentine; Batta, Gyula
2015-03-23
Transition between conformational states in proteins is being recognized as a possible key factor of function. In support of this, hidden dynamic NMR structures were detected in several cases up to populations of a few percent. Here, we show by two- and three-state analysis of thermal unfolding, that the population of hidden states may weight 20-40 % at 298 K in a disulfide-rich protein. In addition, sensitive (15) N-CEST NMR experiments identified a low populated (0.15 %) state that was in slow exchange with the folded PAF protein. Remarkably, other techniques failed to identify the rest of the NMR "dark matter". Comparison of the temperature dependence of chemical shifts from experiments and molecular dynamics calculations suggests that hidden conformers of PAF differ in the loop and terminal regions and are most similar in the evolutionary conserved core. Our observations point to the existence of a complex conformational landscape with multiple conformational states in dynamic equilibrium, with diverse exchange rates presumably responsible for the completely hidden nature of a considerable fraction. © 2015 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.
Where-Fi: a dynamic energy-efficient multimedia distribution framework for MANETs
NASA Astrophysics Data System (ADS)
Mohapatra, Shivajit; Carbunar, Bogdan; Pearce, Michael; Chaudhri, Rohit; Vasudevan, Venu
2008-01-01
Next generation mobile ad-hoc applications will revolve around users' need for sharing content/presence information with co-located devices. However, keeping such information fresh requires frequent meta-data exchanges, which could result in significant energy overheads. To address this issue, we propose distributed algorithms for energy efficient dissemination of presence and content usage information between nodes in mobile ad-hoc networks. First, we introduce a content dissemination protocol (called CPMP) for effectively distributing frequent small meta-data updates between co-located devices using multicast. We then develop two distributed algorithms that use the CPMP protocol to achieve "phase locked" wake up cycles for all the participating nodes in the network. The first algorithm is designed for fully-connected networks and then extended in the second to handle hidden terminals. The "phase locked" schedules are then exploited to adaptively transition the network interface to a deep sleep state for energy savings. We have implemented a prototype system (called "Where-Fi") on several Motorola Linux-based cell phone models. Our experimental results show that for all network topologies our algorithms were able to achieve "phase locking" between nodes even in the presence of hidden terminals. Moreover, we achieved battery lifetime extensions of as much as 28% for fully connected networks and about 20% for partially connected networks.
ERIC Educational Resources Information Center
Kuhlmeier, Valerie
2005-01-01
Many recent studies have explored young children's ability to use information from physical representations of space to guide search within the real world. In one commonly used procedure, children are asked to find a hidden toy in a room after observing a smaller toy being hidden in the analogous location in a scale model of the room.…
Passing from Mesoscopy to Macroscopy. The Mesoscopic Parameter \\bar k
NASA Astrophysics Data System (ADS)
Maslov, V. P.
2018-01-01
In previous papers of the author it was shown that, depending on the hidden parameter, purely quantum problems behave like classical ones. In the present paper, it is shown that the Bose-Einstein and the Fermi-Dirac distributions, which until now were regarded as dealing with quantum particles, describe, for the appropriate values of the hidden parameter, the macroscopic thermodynamics of classical molecules.
ERIC Educational Resources Information Center
Holmes, Cheryl L.; Harris, Ilene B.; Schwartz, Alan J.; Regehr, Glenn
2015-01-01
Changing the culture of medicine through the education of medical students has been proposed as a solution to the intractable problems of our profession. Yet few have explored the issues associated with making students partners in this change. There is a powerful hidden curriculum that perpetuates not only desired attitudes and behaviors but also…
The use of neutrons for the detection of explosives in Civil Security Applications
NASA Astrophysics Data System (ADS)
Pesente, S.; Fabris, D.; Lunardon, M.; Moretto, S.; Nebbia, G.; Viesti, G.
2007-02-01
The search for hidden explosives has been simulated in laboratory conditions by using our Tagged Neutron Inspection System (TNIS). Applications of the TNIS concept to Civil Security problems are discussed in the light of our projects for cargo container inspections. Moreover, neutron attenuation and scattering can be used to search in real time for large quantity of explosive hidden in vehicles.
Efficient Learning of Continuous-Time Hidden Markov Models for Disease Progression
Liu, Yu-Ying; Li, Shuang; Li, Fuxin; Song, Le; Rehg, James M.
2016-01-01
The Continuous-Time Hidden Markov Model (CT-HMM) is an attractive approach to modeling disease progression due to its ability to describe noisy observations arriving irregularly in time. However, the lack of an efficient parameter learning algorithm for CT-HMM restricts its use to very small models or requires unrealistic constraints on the state transitions. In this paper, we present the first complete characterization of efficient EM-based learning methods for CT-HMM models. We demonstrate that the learning problem consists of two challenges: the estimation of posterior state probabilities and the computation of end-state conditioned statistics. We solve the first challenge by reformulating the estimation problem in terms of an equivalent discrete time-inhomogeneous hidden Markov model. The second challenge is addressed by adapting three approaches from the continuous time Markov chain literature to the CT-HMM domain. We demonstrate the use of CT-HMMs with more than 100 states to visualize and predict disease progression using a glaucoma dataset and an Alzheimer’s disease dataset. PMID:27019571
Intelligent classifier for dynamic fault patterns based on hidden Markov model
NASA Astrophysics Data System (ADS)
Xu, Bo; Feng, Yuguang; Yu, Jinsong
2006-11-01
It's difficult to build precise mathematical models for complex engineering systems because of the complexity of the structure and dynamics characteristics. Intelligent fault diagnosis introduces artificial intelligence and works in a different way without building the analytical mathematical model of a diagnostic object, so it's a practical approach to solve diagnostic problems of complex systems. This paper presents an intelligent fault diagnosis method, an integrated fault-pattern classifier based on Hidden Markov Model (HMM). This classifier consists of dynamic time warping (DTW) algorithm, self-organizing feature mapping (SOFM) network and Hidden Markov Model. First, after dynamic observation vector in measuring space is processed by DTW, the error vector including the fault feature of being tested system is obtained. Then a SOFM network is used as a feature extractor and vector quantization processor. Finally, fault diagnosis is realized by fault patterns classifying with the Hidden Markov Model classifier. The importing of dynamic time warping solves the problem of feature extracting from dynamic process vectors of complex system such as aeroengine, and makes it come true to diagnose complex system by utilizing dynamic process information. Simulating experiments show that the diagnosis model is easy to extend, and the fault pattern classifier is efficient and is convenient to the detecting and diagnosing of new faults.
Bell's theorem and the problem of decidability between the views of Einstein and Bohr.
Hess, K; Philipp, W
2001-12-04
Einstein, Podolsky, and Rosen (EPR) have designed a gedanken experiment that suggested a theory that was more complete than quantum mechanics. The EPR design was later realized in various forms, with experimental results close to the quantum mechanical prediction. The experimental results by themselves have no bearing on the EPR claim that quantum mechanics must be incomplete nor on the existence of hidden parameters. However, the well known inequalities of Bell are based on the assumption that local hidden parameters exist and, when combined with conflicting experimental results, do appear to prove that local hidden parameters cannot exist. This fact leaves only instantaneous actions at a distance (called "spooky" by Einstein) to explain the experiments. The Bell inequalities are based on a mathematical model of the EPR experiments. They have no experimental confirmation, because they contradict the results of all EPR experiments. In addition to the assumption that hidden parameters exist, Bell tacitly makes a variety of other assumptions; for instance, he assumes that the hidden parameters are governed by a single probability measure independent of the analyzer settings. We argue that the mathematical model of Bell excludes a large set of local hidden variables and a large variety of probability densities. Our set of local hidden variables includes time-like correlated parameters and a generalized probability density. We prove that our extended space of local hidden variables does permit derivation of the quantum result and is consistent with all known experiments.
Phenomenology of pure-gauge hidden valleys at hadron colliders
NASA Astrophysics Data System (ADS)
Juknevich, Jose E.
Expectations for new physics at the LHC have been greatly influenced by the Hierarchy problem of electroweak symmetry breaking. However, there are reasons to believe that the LHC may still discover new physics, but not directly related to the resolution of the Hierarchy problem. To ensure that such a physics does not go undiscovered requires precise understanding of how new phenomena will reveal themselves in the current and future generation of particle-physics experiments. Given this fact it seems sensible to explore other approaches to this problem; we study three alternatives here. In this thesis I argue for the plausibility that the standard model is coupled, through new massive charged or colored particles, to a hidden sector whose low energy dynamics is controlled by a pure Yang-Mills theory, with no light matter. Such a sector would have numerous metastable "hidden glueballs" built from the hidden gluons. These states would decay to particles of the standard model. I consider the phenomenology of this scenario, and find formulas for the lifetimes and branching ratios of the most important of these states. The dominant decays are to two standard model gauge bosons or to fermion-antifermion pairs, or by radiative decays with photon or Higgs emission, leading to jet- and photon-rich signals, and some occasional leptons. The presence of effective operators of different mass dimensions, often competing with each other, together with a great diversity of states, leads to a great variability in the lifetimes and decay modes of the hidden glueballs. I find that most of the operators considered in this work are not heavily constrained by precision electroweak physics, therefore leaving plenty of room in the parameter space to be explored by the future experiments at the LHC. Finally, I discuss several issues on the phenomenology of the new massive particles as well as an outlook for experimental searches.
Difficulties in Balint groups: a qualitative study of leaders' experiences.
Kjeldmand, Dorte; Holmström, Inger
2010-11-01
Balint groups (BGs) are a means of enhancing competence in the physician-patient relationship and are also regarded as beneficial for GPs' mental health. However, voluntary BGs are still few, some members terminate their participation, and problems are reported in obligatory groups in residency programmes. This raises questions about possible negative aspects of BGs. To examine difficulties in BGs as experienced by BG leaders. Qualitative study using interviews. Eight BG leaders from five countries were interviewed. The interviews focused on the informants' experiences of difficulties in their groups and were analysed with a systematic text-condensation method. Three categories of difficulties emerged from the analysis: 1) the individual physician having needs, vulnerabilities, and defences; 2) the group (including the leader) having problems of hidden agendas, rivalries, and frames; and 3) the surrounding environment defining the conditions of the group. BGs were found to fit into modern theories of small groups as complex systems. They are submitted to group dynamics that are sometimes malicious, and are exposed to often tough environmental conditions. Professionally conducted BGs seem to be a gentle, efficient method to train physicians, but with limitations. Participation of a member demands psychological stability and an open mind. BGs need support from the leadership of healthcare organisations in order to exist.
Computer-generated imagery for 4-D meteorological data
NASA Technical Reports Server (NTRS)
Hibbard, William L.
1986-01-01
The University of Wisconsin-Madison Space Science and Engineering Center is developing animated stereo display terminals for use with McIDAS (Man-computer Interactive Data Access System). This paper describes image-generation techniques which have been developed to take maximum advantage of these terminals, integrating large quantities of four-dimensional meteorological data from balloon and satellite soundings, satellite images, Doppler and volumetric radar, and conventional surface observations. The images have been designed to use perspective, shading, hidden-surface removal, and transparency to augment the animation and stereo-display geometry. They create an illusion of a moving three-dimensional model of the atmosphere. This paper describes the design of these images and a number of rules of thumb for generating four-dimensional meteorological displays.
Short-term memory in networks of dissociated cortical neurons.
Dranias, Mark R; Ju, Han; Rajaram, Ezhilarasan; VanDongen, Antonius M J
2013-01-30
Short-term memory refers to the ability to store small amounts of stimulus-specific information for a short period of time. It is supported by both fading and hidden memory processes. Fading memory relies on recurrent activity patterns in a neuronal network, whereas hidden memory is encoded using synaptic mechanisms, such as facilitation, which persist even when neurons fall silent. We have used a novel computational and optogenetic approach to investigate whether these same memory processes hypothesized to support pattern recognition and short-term memory in vivo, exist in vitro. Electrophysiological activity was recorded from primary cultures of dissociated rat cortical neurons plated on multielectrode arrays. Cultures were transfected with ChannelRhodopsin-2 and optically stimulated using random dot stimuli. The pattern of neuronal activity resulting from this stimulation was analyzed using classification algorithms that enabled the identification of stimulus-specific memories. Fading memories for different stimuli, encoded in ongoing neural activity, persisted and could be distinguished from each other for as long as 1 s after stimulation was terminated. Hidden memories were detected by altered responses of neurons to additional stimulation, and this effect persisted longer than 1 s. Interestingly, network bursts seem to eliminate hidden memories. These results are similar to those that have been reported from similar experiments in vivo and demonstrate that mechanisms of information processing and short-term memory can be studied using cultured neuronal networks, thereby setting the stage for therapeutic applications using this platform.
Synchronization behaviors of coupled systems composed of hidden attractors
NASA Astrophysics Data System (ADS)
Zhang, Ge; Wu, Fuqiang; Wang, Chunni; Ma, Jun
2017-10-01
Based on a class of chaotic system composed of hidden attractors, in which the equilibrium points are described by a circular function, complete synchronization between two identical systems, pattern formation and synchronization of network is investigated, respectively. A statistical factor of synchronization is defined and calculated by using the mean field theory, the dependence of synchronization on bifurcation parameters discussed in numerical way. By setting a chain network, which local kinetic is described by hidden attractors, synchronization approach is investigated. It is found that the synchronization and pattern formation are dependent on the coupling intensity and also the selection of coupling variables. In the end, open problems are proposed for readers’ extensive guidance and investigation.
StegoWall: blind statistical detection of hidden data
NASA Astrophysics Data System (ADS)
Voloshynovskiy, Sviatoslav V.; Herrigel, Alexander; Rytsar, Yuri B.; Pun, Thierry
2002-04-01
Novel functional possibilities, provided by recent data hiding technologies, carry out the danger of uncontrolled (unauthorized) and unlimited information exchange that might be used by people with unfriendly interests. The multimedia industry as well as the research community recognize the urgent necessity for network security and copyright protection, or rather the lack of adequate law for digital multimedia protection. This paper advocates the need for detecting hidden data in digital and analog media as well as in electronic transmissions, and for attempting to identify the underlying hidden data. Solving this problem calls for the development of an architecture for blind stochastic hidden data detection in order to prevent unauthorized data exchange. The proposed architecture is called StegoWall; its key aspects are the solid investigation, the deep understanding, and the prediction of possible tendencies in the development of advanced data hiding technologies. The basic idea of our complex approach is to exploit all information about hidden data statistics to perform its detection based on a stochastic framework. The StegoWall system will be used for four main applications: robust watermarking, secret communications, integrity control and tamper proofing, and internet/network security.
ARPA surveillance technology for detection of targets hidden in foliage
NASA Astrophysics Data System (ADS)
Hoff, Lawrence E.; Stotts, Larry B.
1994-02-01
The processing of large quantities of synthetic aperture radar data in real time is a complex problem. Even the image formation process taxes today's most advanced computers. The use of complex algorithms with multiple channels adds another dimension to the computational problem. Advanced Research Projects Agency (ARPA) is currently planning on using the Paragon parallel processor for this task. The Paragon is small enough to allow its use in a sensor aircraft. Candidate algorithms will be implemented on the Paragon for evaluation for real time processing. In this paper ARPA technology developments for detecting targets hidden in foliage are reviewed and examples of signal processing techniques on field collected data are presented.
Hidden Hazards of Radon: Scanning the Country for Problem Locations.
ERIC Educational Resources Information Center
Gundersen, Linda C. S.
1992-01-01
Describes the geology of the radon problem in the United States and suggests how homeowners can cope with the radio active gas. Vignettes illustrate how and where radon is produced beneath the earth's surface, testing sites and procedures for radon in houses, and locations for potential radon problems across the United States. (MCO)
[A nursing experience of holistic care on total suffering of a patient with terminal illness].
Yang, Wan-Ping; Lai, Wei-Shu; Chao, Co-Shi Chantal
2008-12-01
The purpose of this article was to describe a nursing experience using holistic care to relieve total suffering resulting from complex interactions amongst physical, psychological, social and spiritual aspects in a patient with terminal illness. Each aspect of problems was identified by means of direct participant care, observation, empathetic communication and holistic assessment. Such included: (1) physical aspect: distress caused by pain, nausea, vomiting and poor intake, infection and hypercalcaemia; (2) psychosocial aspect: caregiver's overwhelming burdens and financial concerns; (3) spiritual aspect: yearn for being with a higher-being and receiving unconditional love, pursuit of the meaning of suffering, proceed to the next stage to develop a unique care plan and nursing intervention program. Nursing goals were set up based on the patient's "life expectancy" represented by the hope for a painless and peaceful death. The author helped to provide unique, holistic and continued care for the purpose of humanity. The main nursing interventions included active control of symptoms, encouraging the expression of emotional distress, caring and emotional resonance with caregiver's overwhelming burdens, reconciling with a higher being through art therapy, pursuit of the meaning of suffering and sharing the darkness. This nursing experience of holistic care may be shared with other healthcare professionals and has been recorded as a positive response to the following quote from Dame Cicely Saunders: "The way care is given can reach the most hidden places and give space for unexpected development."
A Regularized Linear Dynamical System Framework for Multivariate Time Series Analysis.
Liu, Zitao; Hauskrecht, Milos
2015-01-01
Linear Dynamical System (LDS) is an elegant mathematical framework for modeling and learning Multivariate Time Series (MTS). However, in general, it is difficult to set the dimension of an LDS's hidden state space. A small number of hidden states may not be able to model the complexities of a MTS, while a large number of hidden states can lead to overfitting. In this paper, we study learning methods that impose various regularization penalties on the transition matrix of the LDS model and propose a regularized LDS learning framework (rLDS) which aims to (1) automatically shut down LDSs' spurious and unnecessary dimensions, and consequently, address the problem of choosing the optimal number of hidden states; (2) prevent the overfitting problem given a small amount of MTS data; and (3) support accurate MTS forecasting. To learn the regularized LDS from data we incorporate a second order cone program and a generalized gradient descent method into the Maximum a Posteriori framework and use Expectation Maximization to obtain a low-rank transition matrix of the LDS model. We propose two priors for modeling the matrix which lead to two instances of our rLDS. We show that our rLDS is able to recover well the intrinsic dimensionality of the time series dynamics and it improves the predictive performance when compared to baselines on both synthetic and real-world MTS datasets.
Automatic Hidden-Web Table Interpretation by Sibling Page Comparison
NASA Astrophysics Data System (ADS)
Tao, Cui; Embley, David W.
The longstanding problem of automatic table interpretation still illudes us. Its solution would not only be an aid to table processing applications such as large volume table conversion, but would also be an aid in solving related problems such as information extraction and semi-structured data management. In this paper, we offer a conceptual modeling solution for the common special case in which so-called sibling pages are available. The sibling pages we consider are pages on the hidden web, commonly generated from underlying databases. We compare them to identify and connect nonvarying components (category labels) and varying components (data values). We tested our solution using more than 2,000 tables in source pages from three different domains—car advertisements, molecular biology, and geopolitical information. Experimental results show that the system can successfully identify sibling tables, generate structure patterns, interpret tables using the generated patterns, and automatically adjust the structure patterns, if necessary, as it processes a sequence of hidden-web pages. For these activities, the system was able to achieve an overall F-measure of 94.5%.
Single-molecule FRET reveals the energy landscape of the full-length SAM-I riboswitch.
Manz, Christoph; Kobitski, Andrei Yu; Samanta, Ayan; Keller, Bettina G; Jäschke, Andres; Nienhaus, G Ulrich
2017-11-01
S-adenosyl-L-methionine (SAM) ligand binding induces major structural changes in SAM-I riboswitches, through which gene expression is regulated via transcription termination. Little is known about the conformations and motions governing the function of the full-length Bacillus subtilis yitJ SAM-I riboswitch. Therefore, we have explored its conformational energy landscape as a function of Mg 2+ and SAM ligand concentrations using single-molecule Förster resonance energy transfer (smFRET) microscopy and hidden Markov modeling analysis. We resolved four conformational states both in the presence and the absence of SAM and determined their Mg 2+ -dependent fractional populations and conformational dynamics, including state lifetimes, interconversion rate coefficients and equilibration timescales. Riboswitches with terminator and antiterminator folds coexist, and SAM binding only gradually shifts the populations toward terminator states. We observed a pronounced acceleration of conformational transitions upon SAM binding, which may be crucial for off-switching during the brief decision window before expression of the downstream gene.
Optimal matching for prostate brachytherapy seed localization with dimension reduction.
Lee, Junghoon; Labat, Christian; Jain, Ameet K; Song, Danny Y; Burdette, Everette C; Fichtinger, Gabor; Prince, Jerry L
2009-01-01
In prostate brachytherapy, x-ray fluoroscopy has been used for intra-operative dosimetry to provide qualitative assessment of implant quality. More recent developments have made possible 3D localization of the implanted radioactive seeds. This is usually modeled as an assignment problem and solved by resolving the correspondence of seeds. It is, however, NP-hard, and the problem is even harder in practice due to the significant number of hidden seeds. In this paper, we propose an algorithm that can find an optimal solution from multiple projection images with hidden seeds. It solves an equivalent problem with reduced dimensional complexity, thus allowing us to find an optimal solution in polynomial time. Simulation results show the robustness of the algorithm. It was validated on 5 phantom and 18 patient datasets, successfully localizing the seeds with detection rate of > or = 97.6% and reconstruction error of < or = 1.2 mm. This is considered to be clinically excellent performance.
Object permanence in domestic dogs (Canis lupus familiaris) and gray wolves (Canis lupus).
Fiset, Sylvain; Plourde, Vickie
2013-05-01
Recent evidence suggests that phylogenetic constraints exerted on dogs by the process of domestication have altered the ability of dogs to represent the physical world and the displacement of objects. In this study, invisible (Experiment 1) and visible (Experiment 2) displacement problems were administered to determine whether domestic dogs' and gray wolves' cognitive capacities to infer the position of a hidden object differ. The results revealed that adult dogs and wolves performed similarly in searching for disappearing objects: Both species succeeded the visible displacement tasks but failed the invisible displacement problems. We conclude that physical cognition for finding hidden objects in domestic dogs and gray wolves is alike and unrelated to the process of domestication.
Quasifixed points from scalar sequestering and the little hierarchy problem in supersymmetry
NASA Astrophysics Data System (ADS)
Martin, Stephen P.
2018-02-01
In supersymmetric models with scalar sequestering, superconformal strong dynamics in the hidden sector suppresses the low-energy couplings of mass dimension 2, compared to the squares of the dimension-1 parameters. Taking into account restrictions on the anomalous dimensions in superconformal theories, I point out that the interplay between the hidden and visible sector renormalizations gives rise to quasifixed point running for the supersymmetric Standard Model squared mass parameters, rather than driving them to 0. The extent to which this dynamics can ameliorate the little hierarchy problem in supersymmetry is studied. Models of this type in which the gaugino masses do not unify are arguably more natural, and are certainly more likely to be accessible, eventually, to the Large Hadron Collider.
Parametric inference for biological sequence analysis.
Pachter, Lior; Sturmfels, Bernd
2004-11-16
One of the major successes in computational biology has been the unification, by using the graphical model formalism, of a multitude of algorithms for annotating and comparing biological sequences. Graphical models that have been applied to these problems include hidden Markov models for annotation, tree models for phylogenetics, and pair hidden Markov models for alignment. A single algorithm, the sum-product algorithm, solves many of the inference problems that are associated with different statistical models. This article introduces the polytope propagation algorithm for computing the Newton polytope of an observation from a graphical model. This algorithm is a geometric version of the sum-product algorithm and is used to analyze the parametric behavior of maximum a posteriori inference calculations for graphical models.
2016-08-29
ammunition. (FOUO) Figure 1. XM25 Weapon System and Air Bursting Ammunition 3 Hidden refers to the enemy seeking cover in trenches; behind walls, rocks ...system that fires 25mm high-explosive, air- bursting ammunition to allow soldiers to fire at hidden enemy targets. Findings Army officials could...XM25 Weapon System The XM25 is a semiautomatic, shoulder-fired weapon system that fires 25mm high-explosive, air- bursting ammunition to allow soldiers
Solving the "Hidden Line" Problem
NASA Technical Reports Server (NTRS)
1984-01-01
David Hedgley Jr., a mathematician at Dryden Flight Research Center, has developed an accurate computer program that considers whether a line in a graphic model of a three dimensional object should or should not be visible. The Hidden Line Computer Code, program automatically removes superfluous lines and permits the computer to display an object from specific viewpoints, just as the human eye would see it. Users include Rowland Institute for Science in Cambridge, MA, several departments of Lockheed Georgia Co., and Nebraska Public Power District (NPPD).
Extracting hidden messages in steganographic images
Quach, Tu-Thach
2014-07-17
The eventual goal of steganalytic forensic is to extract the hidden messages embedded in steganographic images. A promising technique that addresses this problem partially is steganographic payload location, an approach to reveal the message bits, but not their logical order. It works by finding modified pixels, or residuals, as an artifact of the embedding process. This technique is successful against simple least-significant bit steganography and group-parity steganography. The actual messages, however, remain hidden as no logical order can be inferred from the located payload. This paper establishes an important result addressing this shortcoming: we show that the expected mean residualsmore » contain enough information to logically order the located payload provided that the size of the payload in each stego image is not fixed. The located payload can be ordered as prescribed by the mean residuals to obtain the hidden messages without knowledge of the embedding key, exposing the vulnerability of these embedding algorithms. We provide experimental results to support our analysis.« less
Holden, Richard J; Rivera-Rodriguez, A Joy; Faye, Héléne; Scanlon, Matthew C; Karsh, Ben-Tzion
2013-08-01
The most common change facing nurses today is new technology, particularly bar coded medication administration technology (BCMA). However, there is a dearth of knowledge on how BCMA alters nursing work. This study investigated how BCMA technology affected nursing work, particularly nurses' operational problem-solving behavior. Cognitive systems engineering observations and interviews were conducted after the implementation of BCMA in three nursing units of a freestanding pediatric hospital. Problem-solving behavior, associated problems, and goals, were specifically defined and extracted from observed episodes of care. Three broad themes regarding BCMA's impact on problem solving were identified. First, BCMA allowed nurses to invent new problem-solving behavior to deal with pre-existing problems. Second, BCMA made it difficult or impossible to apply some problem-solving behaviors that were commonly used pre-BCMA, often requiring nurses to use potentially risky workarounds to achieve their goals. Third, BCMA created new problems that nurses were either able to solve using familiar or novel problem-solving behaviors, or unable to solve effectively. Results from this study shed light on hidden hazards and suggest three critical design needs: (1) ecologically valid design; (2) anticipatory control; and (3) basic usability. Principled studies of the actual nature of clinicians' work, including problem solving, are necessary to uncover hidden hazards and to inform health information technology design and redesign.
Holden, Richard J.; Rivera-Rodriguez, A. Joy; Faye, Héléne; Scanlon, Matthew C.; Karsh, Ben-Tzion
2012-01-01
The most common change facing nurses today is new technology, particularly bar coded medication administration technology (BCMA). However, there is a dearth of knowledge on how BCMA alters nursing work. This study investigated how BCMA technology affected nursing work, particularly nurses’ operational problem-solving behavior. Cognitive systems engineering observations and interviews were conducted after the implementation of BCMA in three nursing units of a freestanding pediatric hospital. Problem-solving behavior, associated problems, and goals, were specifically defined and extracted from observed episodes of care. Three broad themes regarding BCMA’s impact on problem solving were identified. First, BCMA allowed nurses to invent new problem-solving behavior to deal with pre-existing problems. Second, BCMA made it difficult or impossible to apply some problem-solving behaviors that were commonly used pre-BCMA, often requiring nurses to use potentially risky workarounds to achieve their goals. Third, BCMA created new problems that nurses were either able to solve using familiar or novel problem-solving behaviors, or unable to solve effectively. Results from this study shed light on hidden hazards and suggest three critical design needs: (1) ecologically valid design; (2) anticipatory control; and (3) basic usability. Principled studies of the actual nature of clinicians’ work, including problem solving, are necessary to uncover hidden hazards and to inform health information technology design and redesign. PMID:24443642
ERIC Educational Resources Information Center
Angeli, Charoula; Valanides, Nicos
2013-01-01
The present study investigated the problem-solving performance of 101 university students and their interactions with a computer modeling tool in order to solve a complex problem. Based on their performance on the hidden figures test, students were assigned to three groups of field-dependent (FD), field-mixed (FM), and field-independent (FI)…
Zheng, Lianqing; Chen, Mengen; Yang, Wei
2009-06-21
To overcome the pseudoergodicity problem, conformational sampling can be accelerated via generalized ensemble methods, e.g., through the realization of random walks along prechosen collective variables, such as spatial order parameters, energy scaling parameters, or even system temperatures or pressures, etc. As usually observed, in generalized ensemble simulations, hidden barriers are likely to exist in the space perpendicular to the collective variable direction and these residual free energy barriers could greatly abolish the sampling efficiency. This sampling issue is particularly severe when the collective variable is defined in a low-dimension subset of the target system; then the "Hamiltonian lagging" problem, which reveals the fact that necessary structural relaxation falls behind the move of the collective variable, may be likely to occur. To overcome this problem in equilibrium conformational sampling, we adopted the orthogonal space random walk (OSRW) strategy, which was originally developed in the context of free energy simulation [L. Zheng, M. Chen, and W. Yang, Proc. Natl. Acad. Sci. U.S.A. 105, 20227 (2008)]. Thereby, generalized ensemble simulations can simultaneously escape both the explicit barriers along the collective variable direction and the hidden barriers that are strongly coupled with the collective variable move. As demonstrated in our model studies, the present OSRW based generalized ensemble treatments show improved sampling capability over the corresponding classical generalized ensemble treatments.
An Intelligent Ensemble Neural Network Model for Wind Speed Prediction in Renewable Energy Systems.
Ranganayaki, V; Deepa, S N
2016-01-01
Various criteria are proposed to select the number of hidden neurons in artificial neural network (ANN) models and based on the criterion evolved an intelligent ensemble neural network model is proposed to predict wind speed in renewable energy applications. The intelligent ensemble neural model based wind speed forecasting is designed by averaging the forecasted values from multiple neural network models which includes multilayer perceptron (MLP), multilayer adaptive linear neuron (Madaline), back propagation neural network (BPN), and probabilistic neural network (PNN) so as to obtain better accuracy in wind speed prediction with minimum error. The random selection of hidden neurons numbers in artificial neural network results in overfitting or underfitting problem. This paper aims to avoid the occurrence of overfitting and underfitting problems. The selection of number of hidden neurons is done in this paper employing 102 criteria; these evolved criteria are verified by the computed various error values. The proposed criteria for fixing hidden neurons are validated employing the convergence theorem. The proposed intelligent ensemble neural model is applied for wind speed prediction application considering the real time wind data collected from the nearby locations. The obtained simulation results substantiate that the proposed ensemble model reduces the error value to minimum and enhances the accuracy. The computed results prove the effectiveness of the proposed ensemble neural network (ENN) model with respect to the considered error factors in comparison with that of the earlier models available in the literature.
May Stakeholders be Involved in Design Without Informed Consent? The Case of Hidden Design.
Pols, A J K
2017-06-01
Stakeholder involvement in design is desirable from both a practical and an ethical point of view. It is difficult to do well, however, and some problems recur again and again, both of a practical nature, e.g. stakeholders acting strategically rather than openly, and of an ethical nature, e.g. power imbalances unduly affecting the outcome of the process. Hidden Design has been proposed as a method to deal with the practical problems of stakeholder involvement. It aims to do so by taking the observation of stakeholder actions, rather than the outcomes of a deliberative process, as its input. Furthermore, it hides from stakeholders the fact that a design process is taking place so that they will not behave differently than they otherwise would. Both aspects of Hidden Design have raised ethical worries. In this paper I make an ethical analysis of what it means for a design process to leave participants uninformed or deceived rather than acquiring their informed consent beforehand, and to use observation of actions rather than deliberation as input for design, using Hidden Design as a case study. This analysis is based on two sets of normative guidelines: the ethical guidelines for psychological research involving deception or uninformed participants from two professional psychological organisations, and Habermasian norms for a fair and just (deliberative) process. It supports the conclusion that stakeholder involvement in design organised in this way can be ethically acceptable, though under a number of conditions and constraints.
An Intelligent Ensemble Neural Network Model for Wind Speed Prediction in Renewable Energy Systems
Ranganayaki, V.; Deepa, S. N.
2016-01-01
Various criteria are proposed to select the number of hidden neurons in artificial neural network (ANN) models and based on the criterion evolved an intelligent ensemble neural network model is proposed to predict wind speed in renewable energy applications. The intelligent ensemble neural model based wind speed forecasting is designed by averaging the forecasted values from multiple neural network models which includes multilayer perceptron (MLP), multilayer adaptive linear neuron (Madaline), back propagation neural network (BPN), and probabilistic neural network (PNN) so as to obtain better accuracy in wind speed prediction with minimum error. The random selection of hidden neurons numbers in artificial neural network results in overfitting or underfitting problem. This paper aims to avoid the occurrence of overfitting and underfitting problems. The selection of number of hidden neurons is done in this paper employing 102 criteria; these evolved criteria are verified by the computed various error values. The proposed criteria for fixing hidden neurons are validated employing the convergence theorem. The proposed intelligent ensemble neural model is applied for wind speed prediction application considering the real time wind data collected from the nearby locations. The obtained simulation results substantiate that the proposed ensemble model reduces the error value to minimum and enhances the accuracy. The computed results prove the effectiveness of the proposed ensemble neural network (ENN) model with respect to the considered error factors in comparison with that of the earlier models available in the literature. PMID:27034973
Difficulties in Balint groups: a qualitative study of leaders' experiences
Kjeldmand, Dorte; Holmström, Inger
2010-01-01
Background Balint groups (BGs) are a means of enhancing competence in the physician–patient relationship and are also regarded as beneficial for GPs' mental health. However, voluntary BGs are still few, some members terminate their participation, and problems are reported in obligatory groups in residency programmes. This raises questions about possible negative aspects of BGs. Aim To examine difficulties in BGs as experienced by BG leaders. Design of study Qualitative study using interviews. Setting Eight BG leaders from five countries were interviewed. Method The interviews focused on the informants' experiences of difficulties in their groups and were analysed with a systematic text-condensation method. Results Three categories of difficulties emerged from the analysis: 1) the individual physician having needs, vulnerabilities, and defences; 2) the group (including the leader) having problems of hidden agendas, rivalries, and frames; and 3) the surrounding environment defining the conditions of the group. BGs were found to fit into modern theories of small groups as complex systems. They are submitted to group dynamics that are sometimes malicious, and are exposed to often tough environmental conditions. Conclusion Professionally conducted BGs seem to be a gentle, efficient method to train physicians, but with limitations. Participation of a member demands psychological stability and an open mind. BGs need support from the leadership of healthcare organisations in order to exist. PMID:21062547
Reservoir computing on the hypersphere
NASA Astrophysics Data System (ADS)
Andrecut, M.
Reservoir Computing (RC) refers to a Recurrent Neural Network (RNNs) framework, frequently used for sequence learning and time series prediction. The RC system consists of a random fixed-weight RNN (the input-hidden reservoir layer) and a classifier (the hidden-output readout layer). Here, we focus on the sequence learning problem, and we explore a different approach to RC. More specifically, we remove the nonlinear neural activation function, and we consider an orthogonal reservoir acting on normalized states on the unit hypersphere. Surprisingly, our numerical results show that the system’s memory capacity exceeds the dimensionality of the reservoir, which is the upper bound for the typical RC approach based on Echo State Networks (ESNs). We also show how the proposed system can be applied to symmetric cryptography problems, and we include a numerical implementation.
NASA Astrophysics Data System (ADS)
Salido, Miguel A.; Rodriguez-Molins, Mario; Barber, Federico
The Container Stacking Problem and the Berth Allocation Problem are two important problems in maritime container terminal's management which are clearly related. Terminal operators normally demand all containers to be loaded into an incoming vessel should be ready and easily accessible in the terminal before vessel's arrival. Similarly, customers (i.e., vessel owners) expect prompt berthing of their vessels upon arrival. In this paper, we present an artificial intelligence based-integrated system to relate these problems. Firstly, we develop a metaheuristic algorithm for berth allocation which generates an optimized order of vessel to be served according to existing berth constraints. Secondly, we develop a domain-oriented heuristic planner for calculating the number of reshuffles needed to allocate containers in the appropriate place for a given berth ordering of vessels. By combining these optimized solutions, terminal operators can be assisted to decide the most appropriated solution in each particular case.
ERIC Educational Resources Information Center
Grayson, Jennifer
2011-01-01
In today's high-pressure IT world, almost every opportunity comes hidden inside a problem. And when it comes to "greening" a data center, the problems can be especially daunting, given institutional inertia, budgetary concerns, politics, and more. For CIOs looking to notch up a win with a leaner, greener data center, the key to success often lies…
The Hidden Health Toll: A Cost of Work to the American Woman
ERIC Educational Resources Information Center
Stellman, Jeanne M.
1977-01-01
Large numbers of women work at jobs that present serious health hazards, although most people associate workplace hazards with traditionally "male" jobs. Physical dangers, stress, and fatigue lead to manifold health problems among working women. These problems should be investigated and conditions improved for workers of both sexes. (Author/GC)
Reverse engineering a social agent-based hidden markov model--visage.
Chen, Hung-Ching Justin; Goldberg, Mark; Magdon-Ismail, Malik; Wallace, William A
2008-12-01
We present a machine learning approach to discover the agent dynamics that drives the evolution of the social groups in a community. We set up the problem by introducing an agent-based hidden Markov model for the agent dynamics: an agent's actions are determined by micro-laws. Nonetheless, We learn the agent dynamics from the observed communications without knowing state transitions. Our approach is to identify the appropriate micro-laws corresponding to an identification of the appropriate parameters in the model. The model identification problem is then formulated as a mixed optimization problem. To solve the problem, we develop a multistage learning process for determining the group structure, the group evolution, and the micro-laws of a community based on the observed set of communications among actors, without knowing the semantic contents. Finally, to test the quality of our approximations and the feasibility of the approach, we present the results of extensive experiments on synthetic data as well as the results on real communities, such as Enron email and Movie newsgroups. Insight into agent dynamics helps us understand the driving forces behind social evolution.
Bounds on the number of hidden neurons in three-layer binary neural networks.
Zhang, Zhaozhi; Ma, Xiaomin; Yang, Yixian
2003-09-01
This paper investigates an important problem concerning the complexity of three-layer binary neural networks (BNNs) with one hidden layer. The neuron in the studied BNNs employs a hard limiter activation function with only integer weights and an integer threshold. The studies are focused on implementations of arbitrary Boolean functions which map from [0, 1]n into [0, 1]. A deterministic algorithm called set covering algorithm (SCA) is proposed for the construction of a three-layer BNN to implement an arbitrary Boolean function. The SCA is based on a unit sphere covering (USC) of the Hamming space (HS) which is chosen in advance. It is proved that for the implementation of an arbitrary Boolean function of n-variables (n > or = 3) by using SCA, [3L/2] hidden neurons are necessary and sufficient, where L is the number of unit spheres contained in the chosen USC of the n-dimensional HS. It is shown that by using SCA, the number of hidden neurons required is much less than that by using a two-parallel hyperplane method. In order to indicate the potential ability of three-layer BNNs, a lower bound on the required number of hidden neurons which is derived by using the method of estimating the Vapnik-Chervonenkis (VC) dimension is also given.
Smart sensor for terminal homing
NASA Astrophysics Data System (ADS)
Panda, D.; Aggarwal, R.; Hummel, R.
1980-01-01
The practical scene matching problem is considered to present certain complications which must extend classical image processing capabilities. Certain aspects of the scene matching problem which must be addressed by a smart sensor for terminal homing are discussed. First a philosophy for treating the matching problem for the terminal homing scenario is outlined. Then certain aspects of the feature extraction process and symbolic pattern matching are considered. It is thought that in the future general ideas from artificial intelligence will be more useful for terminal homing requirements of fast scene recognition and pattern matching.
Analysing the hidden curriculum: use of a cultural web
Mossop, Liz; Dennick, Reg; Hammond, Richard; Robbé, Iain
2013-01-01
CONTEXT Major influences on learning about medical professionalism come from the hidden curriculum. These influences can contribute positively or negatively towards the professional enculturation of clinical students. The fact that there is no validated method for identifying the components of the hidden curriculum poses problems for educators considering professionalism. The aim of this study was to analyse whether a cultural web, adapted from a business context, might assist in the identification of elements of the hidden curriculum at a UK veterinary school. METHODS A qualitative approach was used. Seven focus groups consisting of three staff groups and four student groups were organised. Questioning was framed using the cultural web, which is a model used by business owners to assess their environment and consider how it affects their employees and customers. The focus group discussions were recorded, transcribed and analysed thematically using a combination of a priori and emergent themes. RESULTS The cultural web identified elements of the hidden curriculum for both students and staff. These included: core assumptions; routines; rituals; control systems; organisational factors; power structures, and symbols. Discussions occurred about how and where these issues may affect students’ professional identity development. CONCLUSIONS The cultural web framework functioned well to help participants identify elements of the hidden curriculum. These aspects aligned broadly with previously described factors such as role models and institutional slang. The influence of these issues on a student’s development of a professional identity requires discussion amongst faculty staff, and could be used to develop learning opportunities for students. The framework is promising for the analysis of the hidden curriculum and could be developed as an instrument for implementation in other clinical teaching environments. PMID:23323652
Diagnosis and Management of Hidden Caries in a Primary Molar Tooth.
Gera, Arwa; Zilberman, Uri
2017-01-01
Hidden caries is a dentinal lesion beneath the dentinoenamel junction, visible on radiographs. A single report described this lesion in primary dentition. This case report describes a case of hidden caries in a mandibular second primary molar, misdiagnosed as malignant swelling. A 3-year-old white girl was referred to the Department of Pediatric Dentistry with a chief complaint of pain and extraoral swelling on the right side of the mandible for the last 3 months. She was earlier referred to the surgical department for biopsy of the lesion. Radiographic and computed tomography scan examination showed a periapical lesion with buccal plate resorption and radiolucency beneath the enamel on the mesial part of tooth 85. The tooth was extracted, and follow-up of 2 years showed normal development of tooth 45. The main problem is early detection and treatment, since the outer surface of enamel may appear intact on tactile examination. Gera A, Zilberman U. Diagnosis and Management of Hidden Caries in a Primary Molar Tooth. Int J Clin Pediatr Dent 2017;10(1):99-102.
Mining Bug Databases for Unidentified Software Vulnerabilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dumidu Wijayasekara; Milos Manic; Jason Wright
2012-06-01
Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, amore » significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.« less
Koch-Straube, U
1982-01-01
The prevailing attitudes towards sexuality in old age are described in a rather phenomenological analysis: sexuality ends corresponding to the termination of reproductiveness; sexual needs in old age appear to be pathological; the elderly's sexual acts are disgusting. Empirical findings corroborate those conclusions. The situation is explained by societal circumstances, by the learning histories, and by the living conditions in old age. Examples of agreement with sexuality in old age demonstrate the often idle potentialities which are hidden in this sector of life.
Vien, Benjamin Steven; Rose, Louis Raymond Francis; Chiu, Wing Kong
2017-07-01
Reliable and quantitative non-destructive evaluation for small fatigue cracks, in particular those in hard-to-inspect locations, is a challenging problem. Guided waves are advantageous for structural health monitoring due to their slow geometrical decay of amplitude with propagating distance, which is ideal for rapid wide-area inspection. This paper presents a 3D laser vibrometry experimental and finite element analysis of the interaction between an edge-guided wave and a small through-thickness hidden edge crack on a racecourse shaped hole that occurs, in practice, as a fuel vent hole. A piezoelectric transducer is bonded on the straight edge of the hole to generate the incident wave. The excitation signal consists of a 5.5 cycle Hann-windowed tone burst of centre frequency 220 kHz, which is below the cut-off frequency for the first order Lamb wave modes (SH1). Two-dimensional fast Fourier transformation (2D FFT) is applied to the incident and scattered wave field along radial lines emanating from the crack mouth, so as to identify the wave modes and determine their angular variation and amplitude. It is shown experimentally and computationally that mid-plane symmetric edge waves can travel around the hole's edge to detect a hidden crack. Furthermore, the scattered wave field due to a small crack length, a , (compared to the wavelength λ of the incident wave) is shown to be equivalent to a point source consisting of a particular combination of body-force doublets. It is found that the amplitude of the scattered field increases quadratically as a function of a/λ , whereas the scattered wave pattern is independent of crack length for small cracks a < λ . This study of the forward scattering problem from a known crack size provides a useful guide for the inverse problem of hidden crack detection and sizing.
Digital autonomous terminal access communications
NASA Technical Reports Server (NTRS)
Novacki, S.
1987-01-01
A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.
Liu, Mengting; Amey, Rachel C; Forbes, Chad E
2017-12-01
When individuals are placed in stressful situations, they are likely to exhibit deficits in cognitive capacity over and above situational demands. Despite this, individuals may still persevere and ultimately succeed in these situations. Little is known, however, about neural network properties that instantiate success or failure in both neutral and stressful situations, particularly with respect to regions integral for problem-solving processes that are necessary for optimal performance on more complex tasks. In this study, we outline how hidden Markov modeling based on multivoxel pattern analysis can be used to quantify unique brain states underlying complex network interactions that yield either successful or unsuccessful problem solving in more neutral or stressful situations. We provide evidence that brain network stability and states underlying synchronous interactions in regions integral for problem-solving processes are key predictors of whether individuals succeed or fail in stressful situations. Findings also suggested that individuals utilize discriminate neural patterns in successfully solving problems in stressful or neutral situations. Findings overall highlight how hidden Markov modeling can provide myriad possibilities for quantifying and better understanding the role of global network interactions in the problem-solving process and how the said interactions predict success or failure in different contexts.
A Hidden Surface Algorithm for Computer Generated Halftone Pictures
converting data describing three-dimensional objects into data that can be used to generate two-dimensional halftone images. It deals with some problems that arise in black and white, and color shading.
Proximal versus distal cue utilization in spatial navigation: the role of visual acuity?
Carman, Heidi M; Mactutus, Charles F
2002-09-01
Proximal versus distal cue use in the Morris water maze is a widely accepted strategy for the dissociation of various problems affecting spatial navigation in rats such as aging, head trauma, lesions, and pharmacological or hormonal agents. Of the limited number of ontogenetic rat studies conducted, the majority have approached the problem of preweanling spatial navigation through a similar proximal-distal dissociation. An implicit assumption among all of these studies has been that the animal's visual system is sufficient to permit robust spatial navigation. We challenged this assumption and have addressed the role of visual acuity in spatial navigation in the preweanling Fischer 344-N rat by training animals to locate a visible (proximal) or hidden (distal) platform using double or null extramaze cues within the testing environment. All pups demonstrated improved performance across training, but animals presented with a visible platform, regardless of extramaze cues, simultaneously reached asymptotic performance levels; animals presented with a hidden platform, dependent upon location of extramaze cues, differentially reached asymptotic performance levels. Probe trial performance, defined by quadrant time and platform crossings, revealed that distal-double-cue pups demonstrated spatial navigational ability superior to that of the remaining groups. These results suggest that a pup's ability to spatially navigate a hidden platform is dependent on not only its response repertoire and task parameters, but also its visual acuity, as determined by the extramaze cue location within the testing environment. The standard hidden versus visible platform dissociation may not be a satisfactory strategy for the control of potential sensory deficits.
NASA Technical Reports Server (NTRS)
Hedgley, D. R., Jr.
1982-01-01
The requirements for computer-generated perspective projections of three dimensional objects has escalated. A general solution was developed. The theoretical solution to this problem is presented. The method is very efficient as it minimizes the selection of points and comparison of line segments and hence avoids the devastation of square-law growth.
Termination Proofs for String Rewriting Systems via Inverse Match-Bounds
NASA Technical Reports Server (NTRS)
Butler, Ricky (Technical Monitor); Geser, Alfons; Hofbauer, Dieter; Waldmann, Johannes
2004-01-01
Annotating a letter by a number, one can record information about its history during a reduction. A string rewriting system is called match-bounded if there is a global upper bound to these numbers. In earlier papers we established match-boundedness as a strong sufficient criterion for both termination and preservation of regular languages. We show now that the string rewriting system whose inverse (left and right hand sides exchanged) is match-bounded, also have exceptional properties, but slightly different ones. Inverse match-bounded systems effectively preserve context-free languages; their sets of normalized strings and their sets of immortal strings are effectively regular. These sets of strings can be used to decide the normalization, the termination and the uniform termination problems of inverse match-bounded systems. We also show that the termination problem is decidable in linear time, and that a certain strong reachability problem is deciable, thus solving two open problems of McNaughton's.
Sibutramine, a serotonin-norepinephrine reuptake inhibitor, causes fibrosis in rats.
Oberholzer, Hester Magdalena; van der Schoor, Ciska; Bester, Megan Jean
2015-07-01
Sibutramine hydrochloride monohydrate is a weight loss agent indicated for the treatment of obesity. Although it has been banned from most markets, studies are still relevant as it is often a hidden ingredient in herbal and over the counter slimming products. Sibutramine induces liver fibrosis with steatosis in female Sprague-Dawley rats fed a high-energy diet without significant weight gain. In this study, using the same animal model, the effect of Sibutramine on lung morphology was investigated using histological evaluation of the terminal bronchiole and transmission electron microscopy evaluation of the respiratory tissue. From these results Sibutramine was found to induce lung fibrosis in Sprague-Dawley rats as increased collagen synthesis, mast cell accumulation and aggregates of Bronchus Associated Lymphoid Tissue (BALT) in the terminal bronchiole as well as increased collagen deposition in the respiratory tissue was seen. Copyright © 2015 Elsevier B.V. All rights reserved.
Effectiveness of AODV Protocol under Hidden Node Environment
NASA Astrophysics Data System (ADS)
Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit
IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.
2013-01-01
Background Fungal pathogens cause devastating losses in economically important cereal crops by utilising pathogen proteins to infect host plants. Secreted pathogen proteins are referred to as effectors and have thus far been identified by selecting small, cysteine-rich peptides from the secretome despite increasing evidence that not all effectors share these attributes. Results We take advantage of the availability of sequenced fungal genomes and present an unbiased method for finding putative pathogen proteins and secreted effectors in a query genome via comparative hidden Markov model analyses followed by unsupervised protein clustering. Our method returns experimentally validated fungal effectors in Stagonospora nodorum and Fusarium oxysporum as well as the N-terminal Y/F/WxC-motif from the barley powdery mildew pathogen. Application to the cereal pathogen Fusarium graminearum reveals a secreted phosphorylcholine phosphatase that is characteristic of hemibiotrophic and necrotrophic cereal pathogens and shares an ancient selection process with bacterial plant pathogens. Three F. graminearum protein clusters are found with an enriched secretion signal. One of these putative effector clusters contains proteins that share a [SG]-P-C-[KR]-P sequence motif in the N-terminal and show features not commonly associated with fungal effectors. This motif is conserved in secreted pathogenic Fusarium proteins and a prime candidate for functional testing. Conclusions Our pipeline has successfully uncovered conservation patterns, putative effectors and motifs of fungal pathogens that would have been overlooked by existing approaches that identify effectors as small, secreted, cysteine-rich peptides. It can be applied to any pathogenic proteome data, such as microbial pathogen data of plants and other organisms. PMID:24252298
Conformal mapping for multiple terminals
Wang, Weimin; Ma, Wenying; Wang, Qiang; Ren, Hao
2016-01-01
Conformal mapping is an important mathematical tool that can be used to solve various physical and engineering problems in many fields, including electrostatics, fluid mechanics, classical mechanics, and transformation optics. It is an accurate and convenient way to solve problems involving two terminals. However, when faced with problems involving three or more terminals, which are more common in practical applications, existing conformal mapping methods apply assumptions or approximations. A general exact method does not exist for a structure with an arbitrary number of terminals. This study presents a conformal mapping method for multiple terminals. Through an accurate analysis of boundary conditions, additional terminals or boundaries are folded into the inner part of a mapped region. The method is applied to several typical situations, and the calculation process is described for two examples of an electrostatic actuator with three electrodes and of a light beam splitter with three ports. Compared with previously reported results, the solutions for the two examples based on our method are more precise and general. The proposed method is helpful in promoting the application of conformal mapping in analysis of practical problems. PMID:27830746
ERIC Educational Resources Information Center
Soh, Kaycheng
2014-01-01
World university rankings (WUR) use the weight-and-sum approach to arrive at an overall measure which is then used to rank the participating universities of the world. Although the weight-and-sum procedure seems straightforward and accords with common sense, it has hidden methodological or statistical problems which render the meaning of the…
Disconnected Youth in the Research Triangle Region: An Ominous Problem Hidden in Plain Sight
ERIC Educational Resources Information Center
Dodson, David; Guillory, Ferrel; Lipsitz, Joan; Raper, Noah; Rausch, Christina
2008-01-01
In September 2006, the North Carolina GlaxoSmithKline Foundation commissioned MDC, Inc. of Chapel Hill to analyze the problem of "disconnected youth" in the Research Triangle region, determine the current state of the region's responses to the challenge, and recommend steps to deepen and accelerate action on the issue. The research process was…
A Short-Term Population Model of the Suicide Risk: The Case of Spain.
De la Poza, Elena; Jódar, Lucas
2018-06-14
A relevant proportion of deaths by suicide have been attributed to other causes that produce the number of suicides remains hidden. The existence of a hidden number of cases is explained by the nature of the problem. Problems like this involve violence, and produce fear and social shame in victims' families. The existence of violence, fear and social shame experienced by victims favours a considerable number of suicides, identified as accidents or natural deaths. This paper proposes a short time discrete compartmental mathematical model to measure the suicidal risk for the case of Spain. The compartment model classifies and quantifies the amount of the Spanish population within the age intervals (16, 78) by their degree of suicide risk and their changes over time. Intercompartmental transits are due to the combination of quantitative and qualitative factors. Results are computed and simulations are performed to analyze the sensitivity of the model under uncertain coefficients.
A Hybrid Lifetime Extended Directional Approach for WBANs
Li, Changle; Yuan, Xiaoming; Yang, Li; Song, Yueyang
2015-01-01
Wireless Body Area Networks (WBANs) can provide real-time and reliable health monitoring, attributing to the human-centered and sensor interoperability properties. WBANs have become a key component of the ubiquitous eHealth (electronic health) revolution that prospers on the basis of information and communication technologies. The prime consideration in WBAN is how to maximize the network lifetime with battery-powered sensor nodes in energy constraint. Novel solutions in Medium Access Control (MAC) protocols are imperative to satisfy the particular BAN scenario and the need of excellent energy efficiency in healthcare applications. In this paper, we propose a hybrid Lifetime Extended Directional Approach (LEDA) MAC protocol based on IEEE 802.15.6 to reduce energy consumption and prolong network lifetime. The LEDA MAC protocol takes full advantages of directional superiority in energy saving that employs multi-beam directional mode in Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) and single-beam directional mode in Time Division Multiple Access (TDMA) for alternative in data reservation and transmission according to the traffic varieties. Moreover, the impacts of some inherent problems of directional antennas such as deafness and hidden terminal problem can be decreased owing to that all nodes generate individual beam according to user priorities designated. Furthermore, LEDA MAC employs a Dynamic Polled Allocation Period (DPAP) for burst data transmissions to increase the network reliability and adaptability. Extensive analysis and simulation results show that the proposed LEDA MAC protocol achieves extended network lifetime with improved performance compared with IEEE 802.15.6. PMID:26556357
NASA Astrophysics Data System (ADS)
O, Hyong-Chol; Jo, Jong-Jun; Kim, Ji-Sok
2016-02-01
We provide representations of solutions to terminal value problems of inhomogeneous Black-Scholes equations and study such general properties as min-max estimates, gradient estimates, monotonicity and convexity of the solutions with respect to the stock price variable, which are important for financial security pricing. In particular, we focus on finding representation of the gradient (with respect to the stock price variable) of solutions to the terminal value problems with discontinuous terminal payoffs or inhomogeneous terms. Such terminal value problems are often encountered in pricing problems of compound-like options such as Bermudan options or defaultable bonds with discrete default barrier, default intensity and endogenous default recovery. Our results can be used in pricing real defaultable bonds under consideration of existence of discrete coupons or taxes on coupons.
"Dark matter" worlds of unstable RNA and protein.
Baboo, Sabyasachi; Cook, Peter R
2014-01-01
Astrophysicists use the term "dark matter" to describe the majority of the matter and/or energy in the universe that is hidden from view, and biologists now apply it to the new families of RNA they are uncovering. We review evidence for an analogous hidden world containing peptides. The critical experiments involved pulse-labeling human cells with tagged amino acids for periods as short as five seconds. Results are extraordinary in two respects: both nucleus and cytoplasm become labeled, and most signals disappear with a half-life of less than one minute. Just as the synthesis of each mature mRNA is regulated by the abortive production of hundreds of shorter transcripts that are quickly degraded, it seems that the synthesis of each full-length protein in the stable proteome is regulated by an apparently wasteful production and degradation of shorter peptides. Some of the nuclear synthesis is probably a byproduct of nuclear ribosomes proofreading newly-made RNA for inappropriately-placed termination codons (a process that triggers "nonsense-mediated decay"). We speculate that some "dark-matter" peptides will play other important roles in the cell.
“Dark matter” worlds of unstable RNA and protein
Baboo, Sabyasachi; Cook, Peter R
2014-01-01
Astrophysicists use the term “dark matter” to describe the majority of the matter and/or energy in the universe that is hidden from view, and biologists now apply it to the new families of RNA they are uncovering. We review evidence for an analogous hidden world containing peptides. The critical experiments involved pulse-labeling human cells with tagged amino acids for periods as short as five seconds. Results are extraordinary in two respects: both nucleus and cytoplasm become labeled, and most signals disappear with a half-life of less than one minute. Just as the synthesis of each mature mRNA is regulated by the abortive production of hundreds of shorter transcripts that are quickly degraded, it seems that the synthesis of each full-length protein in the stable proteome is regulated by an apparently wasteful production and degradation of shorter peptides. Some of the nuclear synthesis is probably a byproduct of nuclear ribosomes proofreading newly-made RNA for inappropriately-placed termination codons (a process that triggers “nonsense-mediated decay”). We speculate that some “dark-matter” peptides will play other important roles in the cell. PMID:25482115
Behavior of supercooled aqueous solutions stemming from hidden liquid-liquid transition in water.
Biddle, John W; Holten, Vincent; Anisimov, Mikhail A
2014-08-21
A popular hypothesis that explains the anomalies of supercooled water is the existence of a metastable liquid-liquid transition hidden below the line of homogeneous nucleation. If this transition exists and if it is terminated by a critical point, the addition of a solute should generate a line of liquid-liquid critical points emanating from the critical point of pure metastable water. We have analyzed thermodynamic consequences of this scenario. In particular, we consider the behavior of two systems, H2O-NaCl and H2O-glycerol. We find the behavior of the heat capacity in supercooled aqueous solutions of NaCl, as reported by Archer and Carter [J. Phys. Chem. B 104, 8563 (2000)], to be consistent with the presence of the metastable liquid-liquid transition. We elucidate the non-conserved nature of the order parameter (extent of "reaction" between two alternative structures of water) and the consequences of its coupling with conserved properties (density and concentration). We also show how the shape of the critical line in a solution controls the difference in concentration of the coexisting liquid phases.
Hypovigilance Detection for UCAV Operators Based on a Hidden Markov Model
Kwon, Namyeon; Shin, Yongwook; Ryo, Chuh Yeop; Park, Jonghun
2014-01-01
With the advance of military technology, the number of unmanned combat aerial vehicles (UCAVs) has rapidly increased. However, it has been reported that the accident rate of UCAVs is much higher than that of manned combat aerial vehicles. One of the main reasons for the high accident rate of UCAVs is the hypovigilance problem which refers to the decrease in vigilance levels of UCAV operators while maneuvering. In this paper, we propose hypovigilance detection models for UCAV operators based on EEG signal to minimize the number of occurrences of hypovigilance. To enable detection, we have applied hidden Markov models (HMMs), two of which are used to indicate the operators' dual states, normal vigilance and hypovigilance, and, for each operator, the HMMs are trained as a detection model. To evaluate the efficacy and effectiveness of the proposed models, we conducted two experiments on the real-world data obtained by using EEG-signal acquisition devices, and they yielded satisfactory results. By utilizing the proposed detection models, the problem of hypovigilance of UCAV operators and the problem of high accident rate of UCAVs can be addressed. PMID:24963338
Adult-acquired hidden penis in obese patients: a critical survey of the literature.
Cavayero, Chase T; Cooper, Meghan A; Harlin, Stephen L
2015-03-01
Hidden penis is anatomically defined by a lack of firm attachments of the skin and dartos fascia to the underlying Buck fascia. To critically appraise the research evidence that could support the most effective surgical techniques for adult-acquired hidden penis in obese patients. Studies investigating patients with a diagnosis of hidden penis were identified. Of these studies, only those with adult patients classified as overweight or obese (body mass index >25) were included in the review. Three reviewers examined the abstracts of the studies identified in the initial Medline search, and abstracts considered potentially relevant underwent full-text review. Studies that included patients with congenital, iatrogenic (eg, circumcision issues or aesthetic genital surgery), or traumatic causes of hidden penis were excluded. Studies that did not define the diagnostic criteria for hidden penis were excluded to minimize the risk of definition bias. The quality of evidence for each study was determined after considering the following sources of bias: method of allocation to study groups, data analysis, presence of baseline differences between groups, objectivity of outcome, and completeness of follow-up. Using these criteria, studies were then graded as high, moderate, or low in quality. Seven studies with a total of 119 patients met the inclusion criteria. All but 1 of the studies were nonrandomized. One study provided a clear presentation of results and appropriate statistical analysis. Six studies accounted for individual-based differences, and 1 study failed to account for baseline differences altogether. Four studies addressed follow-up. One study was of high quality, 2 were of moderate quality, and 4 were of low quality. Building a clinical practice guideline for the surgical management of hidden penis has proven difficult because of a lack of high-quality, statistically significant data in the research synthesis. The authors elucidate the challenges and epitomize the collective wisdom of surgeons who have investigated this problem and emphasize the need for rigorous evaluative studies. © 2015 The American Osteopathic Association.
Robotham, Scott A.; Horton, Andrew P.; Cannon, Joe R.; Cotham, Victoria C.; Marcotte, Edward M.; Brodbelt, Jennifer S.
2016-01-01
De novo peptide sequencing by mass spectrometry represents an important strategy for characterizing novel peptides and proteins, in which a peptide’s amino acid sequence is inferred directly from the precursor peptide mass and tandem mass spectrum (MS/MS or MS3) fragment ions, without comparison to a reference proteome. This method is ideal for organisms or samples lacking a complete or well-annotated reference sequence set. One of the major barriers to de novo spectral interpretation arises from confusion of N- and C-terminal ion series due to the symmetry between b and y ion pairs created by collisional activation methods (or c, z ions for electron-based activation methods). This is known as the ‘antisymmetric path problem’ and leads to inverted amino acid subsequences within a de novo reconstruction. Here, we combine several key strategies for de novo peptide sequencing into a single high-throughput pipeline: high efficiency carbamylation blocks lysine side chains, and subsequent tryptic digestion and N-terminal peptide derivatization with the ultraviolet chromophore AMCA yields peptides susceptible to 351 nm ultraviolet photodissociation (UVPD). UVPD-MS/MS of the AMCA-modified peptides then predominantly produces y ions in the MS/MS spectra, specifically addressing the antisymmetric path problem. Finally, the program UVnovo applies a random forest algorithm to automatically learn from and then interpret UVPD mass spectra, passing results to a hidden Markov model for de novo sequence prediction and scoring. We show this combined strategy provides high performance de novo peptide sequencing, enabling the de novo sequencing of thousands of peptides from an E. coli lysate at high confidence. PMID:26938041
Flight experiments to improve terminal area operations
NASA Technical Reports Server (NTRS)
Salmirs, S.; Morello, S. A.
1978-01-01
A brief description is given of the objectives and activities of the terminal configured vehicle (TCV) program and of some of the airborne facilities. A short analysis of some particular problems in CTOL operations in the terminal area is also presented to show how the program's technical objectives are related to the defined problems. The test aircraft was flown both manually and automatically with manual monitoring over paths including 130 deg intercepts and 2.0 km and 0.8 km finals. Some statistical data are presented from these and other flight profiles designed to address specific terminal area problems. An overview is presented of research studies receiving emphasis in the next biennium and their application to the terminal area. A description of work undertaken to study the addition of adjacent traffic information to present map displays is also given.
Self-growing neural network architecture using crisp and fuzzy entropy
NASA Technical Reports Server (NTRS)
Cios, Krzysztof J.
1992-01-01
The paper briefly describes the self-growing neural network algorithm, CID2, which makes decision trees equivalent to hidden layers of a neural network. The algorithm generates a feedforward architecture using crisp and fuzzy entropy measures. The results of a real-life recognition problem of distinguishing defects in a glass ribbon and of a benchmark problem of differentiating two spirals are shown and discussed.
ERIC Educational Resources Information Center
Bruner, Charles; Discher, Anne; Chang, Hedy
2011-01-01
Chronic absenteeism--or missing 10 percent or more of school days for any reason--is a proven early warning sign of academic risk and school dropout. Too often, though, this problem is overlooked, especially among elementary students, because of the way attendance data are tracked. This study confirms the premise that districts and schools may…
Fundamental Study on Quantum Nanojets
2004-08-01
Pergamon Press. Bell , J. S . 1966 On the problem of hidden variables in quantum mechanics. Rev. of Modern Phys., 38, 447. Berndl, K., Daumer, M...fluid dynamics based on two quantum mechanical perspectives; Schrödinger’s wave mechanics and quantum fluid dynamics based on Hamilton-Jacoby...References 8 2). Direct Problems a). Quantum fluid dynamics formalism based on Hamilton-Jacoby equation are adapted for the numerical
Unsupervised Learning Through Randomized Algorithms for High-Volume High-Velocity Data (ULTRA-HV).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pinar, Ali; Kolda, Tamara G.; Carlberg, Kevin Thomas
Through long-term investments in computing, algorithms, facilities, and instrumentation, DOE is an established leader in massive-scale, high-fidelity simulations, as well as science-leading experimentation. In both cases, DOE is generating more data than it can analyze and the problem is intensifying quickly. The need for advanced algorithms that can automatically convert the abundance of data into a wealth of useful information by discovering hidden structures is well recognized. Such efforts however, are hindered by the massive volume of the data and its high velocity. Here, the challenge is developing unsupervised learning methods to discover hidden structure in high-volume, high-velocity data.
Problem-Solving Test: The Mechanism of Transcription Termination by the Rho Factor
ERIC Educational Resources Information Center
Szeberenyi, Jozsef
2012-01-01
Transcription termination comes in two forms in "E. coli" cells. Rho-dependent termination requires the binding of a termination protein called Rho factor to the transcriptional machinery at the terminator region, whereas Rho-independent termination is achieved by conformational changes in the transcript itself. This article presents a test…
HIPPI: highly accurate protein family classification with ensembles of HMMs.
Nguyen, Nam-Phuong; Nute, Michael; Mirarab, Siavash; Warnow, Tandy
2016-11-11
Given a new biological sequence, detecting membership in a known family is a basic step in many bioinformatics analyses, with applications to protein structure and function prediction and metagenomic taxon identification and abundance profiling, among others. Yet family identification of sequences that are distantly related to sequences in public databases or that are fragmentary remains one of the more difficult analytical problems in bioinformatics. We present a new technique for family identification called HIPPI (Hierarchical Profile Hidden Markov Models for Protein family Identification). HIPPI uses a novel technique to represent a multiple sequence alignment for a given protein family or superfamily by an ensemble of profile hidden Markov models computed using HMMER. An evaluation of HIPPI on the Pfam database shows that HIPPI has better overall precision and recall than blastp, HMMER, and pipelines based on HHsearch, and maintains good accuracy even for fragmentary query sequences and for protein families with low average pairwise sequence identity, both conditions where other methods degrade in accuracy. HIPPI provides accurate protein family identification and is robust to difficult model conditions. Our results, combined with observations from previous studies, show that ensembles of profile Hidden Markov models can better represent multiple sequence alignments than a single profile Hidden Markov model, and thus can improve downstream analyses for various bioinformatic tasks. Further research is needed to determine the best practices for building the ensemble of profile Hidden Markov models. HIPPI is available on GitHub at https://github.com/smirarab/sepp .
Nonlinear dynamical modes of climate variability: from curves to manifolds
NASA Astrophysics Data System (ADS)
Gavrilov, Andrey; Mukhin, Dmitry; Loskutov, Evgeny; Feigin, Alexander
2016-04-01
The necessity of efficient dimensionality reduction methods capturing dynamical properties of the system from observed data is evident. Recent study shows that nonlinear dynamical mode (NDM) expansion is able to solve this problem and provide adequate phase variables in climate data analysis [1]. A single NDM is logical extension of linear spatio-temporal structure (like empirical orthogonal function pattern): it is constructed as nonlinear transformation of hidden scalar time series to the space of observed variables, i. e. projection of observed dataset onto a nonlinear curve. Both the hidden time series and the parameters of the curve are learned simultaneously using Bayesian approach. The only prior information about the hidden signal is the assumption of its smoothness. The optimal nonlinearity degree and smoothness are found using Bayesian evidence technique. In this work we do further extension and look for vector hidden signals instead of scalar with the same smoothness restriction. As a result we resolve multidimensional manifolds instead of sum of curves. The dimension of the hidden manifold is optimized using also Bayesian evidence. The efficiency of the extension is demonstrated on model examples. Results of application to climate data are demonstrated and discussed. The study is supported by Government of Russian Federation (agreement #14.Z50.31.0033 with the Institute of Applied Physics of RAS). 1. Mukhin, D., Gavrilov, A., Feigin, A., Loskutov, E., & Kurths, J. (2015). Principal nonlinear dynamical modes of climate variability. Scientific Reports, 5, 15510. http://doi.org/10.1038/srep15510
A survey of methods of feasible directions for the solution of optimal control problems
NASA Technical Reports Server (NTRS)
Polak, E.
1972-01-01
Three methods of feasible directions for optimal control are reviewed. These methods are an extension of the Frank-Wolfe method, a dual method devised by Pironneau and Polack, and a Zontendijk method. The categories of continuous optimal control problems are shown as: (1) fixed time problems with fixed initial state, free terminal state, and simple constraints on the control; (2) fixed time problems with inequality constraints on both the initial and the terminal state and no control constraints; (3) free time problems with inequality constraints on the initial and terminal states and simple constraints on the control; and (4) fixed time problems with inequality state space contraints and constraints on the control. The nonlinear programming algorithms are derived for each of the methods in its associated category.
Naturalness of Electroweak Symmetry Breaking
NASA Astrophysics Data System (ADS)
Espinosa, J. R.
2007-02-01
After revisiting the hierarchy problem of the Standard Model and its implications for the scale of New Physics, I consider the fine tuning problem of electroweak symmetry breaking in two main scenarios beyond the Standard Model: SUSY and Little Higgs models. The main conclusions are that New Physics should appear on the reach of the LHC; that some SUSY models can solve the hierarchy problem with acceptable residual fine tuning and, finally, that Little Higgs models generically suffer from large tunings, many times hidden.
Confocal non-line-of-sight imaging based on the light-cone transform
NASA Astrophysics Data System (ADS)
O’Toole, Matthew; Lindell, David B.; Wetzstein, Gordon
2018-03-01
How to image objects that are hidden from a camera’s view is a problem of fundamental importance to many fields of research, with applications in robotic vision, defence, remote sensing, medical imaging and autonomous vehicles. Non-line-of-sight (NLOS) imaging at macroscopic scales has been demonstrated by scanning a visible surface with a pulsed laser and a time-resolved detector. Whereas light detection and ranging (LIDAR) systems use such measurements to recover the shape of visible objects from direct reflections, NLOS imaging reconstructs the shape and albedo of hidden objects from multiply scattered light. Despite recent advances, NLOS imaging has remained impractical owing to the prohibitive memory and processing requirements of existing reconstruction algorithms, and the extremely weak signal of multiply scattered light. Here we show that a confocal scanning procedure can address these challenges by facilitating the derivation of the light-cone transform to solve the NLOS reconstruction problem. This method requires much smaller computational and memory resources than previous reconstruction methods do and images hidden objects at unprecedented resolution. Confocal scanning also provides a sizeable increase in signal and range when imaging retroreflective objects. We quantify the resolution bounds of NLOS imaging, demonstrate its potential for real-time tracking and derive efficient algorithms that incorporate image priors and a physically accurate noise model. Additionally, we describe successful outdoor experiments of NLOS imaging under indirect sunlight.
Confocal non-line-of-sight imaging based on the light-cone transform.
O'Toole, Matthew; Lindell, David B; Wetzstein, Gordon
2018-03-15
How to image objects that are hidden from a camera's view is a problem of fundamental importance to many fields of research, with applications in robotic vision, defence, remote sensing, medical imaging and autonomous vehicles. Non-line-of-sight (NLOS) imaging at macroscopic scales has been demonstrated by scanning a visible surface with a pulsed laser and a time-resolved detector. Whereas light detection and ranging (LIDAR) systems use such measurements to recover the shape of visible objects from direct reflections, NLOS imaging reconstructs the shape and albedo of hidden objects from multiply scattered light. Despite recent advances, NLOS imaging has remained impractical owing to the prohibitive memory and processing requirements of existing reconstruction algorithms, and the extremely weak signal of multiply scattered light. Here we show that a confocal scanning procedure can address these challenges by facilitating the derivation of the light-cone transform to solve the NLOS reconstruction problem. This method requires much smaller computational and memory resources than previous reconstruction methods do and images hidden objects at unprecedented resolution. Confocal scanning also provides a sizeable increase in signal and range when imaging retroreflective objects. We quantify the resolution bounds of NLOS imaging, demonstrate its potential for real-time tracking and derive efficient algorithms that incorporate image priors and a physically accurate noise model. Additionally, we describe successful outdoor experiments of NLOS imaging under indirect sunlight.
El Yazid Boudaren, Mohamed; Monfrini, Emmanuel; Pieczynski, Wojciech; Aïssani, Amar
2014-11-01
Hidden Markov chains have been shown to be inadequate for data modeling under some complex conditions. In this work, we address the problem of statistical modeling of phenomena involving two heterogeneous system states. Such phenomena may arise in biology or communications, among other fields. Namely, we consider that a sequence of meaningful words is to be searched within a whole observation that also contains arbitrary one-by-one symbols. Moreover, a word may be interrupted at some site to be carried on later. Applying plain hidden Markov chains to such data, while ignoring their specificity, yields unsatisfactory results. The Phasic triplet Markov chain, proposed in this paper, overcomes this difficulty by means of an auxiliary underlying process in accordance with the triplet Markov chains theory. Related Bayesian restoration techniques and parameters estimation procedures according to the new model are then described. Finally, to assess the performance of the proposed model against the conventional hidden Markov chain model, experiments are conducted on synthetic and real data.
Nondestructive detection of infested chestnuts based on NIR spectroscopy
USDA-ARS?s Scientific Manuscript database
Insect feeding is a significant postharvest problem for processors of Chestnuts (Castanea sativa, Miller). In most cases, damage from insects is 'hidden', i.e. not visually detectable on the fruit surface. Consequently, traditional sorting techniques, including manual sorting, are generally inadequa...
A First Course in Intercultural Communication.
ERIC Educational Resources Information Center
Goodyear, F. H.; Williams, Patrick L.
The Texas Christian University course description, outline, and supporting bibliography deal with the problems of intercultural, interracial communication. The course plan begins with the thesis that racism is institutionalized and that the eradication of racism requires changes in individuals' awareness of their own hidden discriminatory…
Normal Science Education and Its Dangers: The Case of School Chemistry.
ERIC Educational Resources Information Center
Van Berkel, Berry; De Vos, Wobbe; Verdonk, Adri H.; Pilot, Albert
2000-01-01
Attempts to solve the problem of hidden structure in school chemistry. Argues that normal chemistry education is isolated from common sense, everyday life and society, the history and philosophy of science, technology, school physics, and chemical research. (Author/CCM)
National Security Policy and Security Challenges of Maldives
2014-06-13
creates the true problems the Maldivians are currently facing. Hidden agendas, unprofessionalism, and low ethical standards of politicians and...based on sharia law. The theories of cultural relativism and democracy strongly advocate the freedoms of societies, thus the Maldivian decision as a
ERIC Educational Resources Information Center
Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.
2009-01-01
The Monitoring the Future study has provided the nation with a window into the important, but largely hidden, problem behaviors of illicit drug use, alcohol use, and tobacco use. It has provided a clearer view of the changing topography of these problems among adolescents and adults, a better understanding of the dynamics of factors that drive…
ERIC Educational Resources Information Center
Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.
2008-01-01
The Monitoring the Future study has provided the nation with a window into the important, but largely hidden, problem behaviors of illicit drug use, alcohol use, and tobacco use. It has provided a clearer view of the changing topography of these problems among adolescents and adults, a better understanding of the dynamics of factors that drive…
ERIC Educational Resources Information Center
Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.
2007-01-01
The Monitoring the Future study has provided the nation with a window into the important, but largely hidden, problem behaviors of illicit drug use, alcohol use, and tobacco use. It has provided a clearer view of the changing topography of these problems among adolescents and adults, a better understanding of the dynamics of factors that drive…
Marhounová, Lucie; Frynta, Daniel; Fuchs, Roman; Landová, Eva
2017-05-01
Object permanence is a cognitive ability that enables animals to mentally represent the continuous existence of temporarily hidden objects. Generally, it develops gradually through six qualitative stages, the evolution of which may be connected with some specific ecological and behavioral factors. In birds, the advanced object permanence skills were reported in several storing species of the Corvidae family. In order to test the association between food-storing and achieved performance within the stages, we compared food-storing coal tits (Periparus ater) and nonstoring great tits (Parus major) using an adapted version of Uzgiris & Hunt's Scale 1 tasks. The coal tits significantly outperformed the great tits in searching for completely hidden objects. Most of the great tits could not solve the task when the object disappeared completely. However, the upper limit for both species is likely to be Stage 4. The coal tits could solve problems with simply hidden objects, but they used alternative strategies rather than mental representation when searching for completely hidden objects, especially if choosing between two locations. Our results also suggest that neophobia did not affect the overall performance in the object permanence tasks. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Roberts, Sarah C. M.; Delucchi, Kevin; Wilsnack, Sharon C.; Foster, Diana Greene
2015-01-01
Aim Research finds women who terminate pregnancies are at risk of subsequent problematic alcohol use, but methodological and conceptual problems are common. This study examines the relationship between receiving versus being denied termination and subsequent alcohol use. Methods Data are from a prospective, longitudinal study of US women seeking pregnancy terminations. Participants presented just before a facility's gestational limit and received terminations (Near Limits, n = 452) or just beyond the limit and were denied terminations (Turnaways, n = 231). Results Groups did not differ in alcohol use before pregnancy recognition. One week after termination-seeking (Turnaways still pregnant, Near Limits not), Turnaways had lower odds of any and binge alcohol use, but did not differ on 1+ problem symptoms. Over 2.5 years, both Near Limits and Turnaways increased any and binge alcohol use, with Turnaways increasing more rapidly. The groups did not converge again on any or binge use. For Near Limits, any alcohol use surpassed the pre-pregnancy recognition level, but binge use did not. Changes in problem symptoms over time were not evident for either group. Conclusion While women who had a termination were more likely to report any and binge alcohol use than women who had a child, this difference was due to a reduction in consumption among women having the child rather than an increase in consumption among women having a termination. Thus, assertions that having a termination leads women to increase alcohol use to cope with having had a termination are not supported. PMID:25787011
NASA Astrophysics Data System (ADS)
Yang, Yunlei; Hou, Muzhou; Luo, Jianshu; Liu, Taohua
2018-06-01
With the increasing demands for vast amounts of data and high-speed signal transmission, the use of multi-conductor transmission lines is becoming more common. The impact of transmission lines on signal transmission is thus a key issue affecting the performance of high-speed digital systems. To solve the problem of lossless two-conductor transmission line equations (LTTLEs), a neural network model and algorithm are explored in this paper. By selecting the product of two triangular basis functions as the activation function of hidden layer neurons, we can guarantee the separation of time, space, and phase orthogonality. By adding the initial condition to the neural network, an improved extreme learning machine (IELM) algorithm for solving the network weight is obtained. This is different to the traditional method for converting the initial condition into the iterative constraint condition. Calculation software for solving the LTTLEs based on the IELM algorithm is developed. Numerical experiments show that the results are consistent with those of the traditional method. The proposed neural network algorithm can find the terminal voltage of the transmission line and also the voltage of any observation point. It is possible to calculate the value at any given point by using the neural network model to solve the transmission line equation.
ERIC Educational Resources Information Center
Reclaiming Children and Youth, 2013
2013-01-01
Sometimes children are stressed about seemingly small events that escalate into problem behavior. In this article, an insightful teacher discusses restoration of emotional balance by mobilizing positive support from both school and family using A Response Ability Pathways (RAP) intervention. The RAP techniques and how they can be used are…
ERIC Educational Resources Information Center
Dyson, Freeman J.
1975-01-01
Four problems of the regulation of technological development are reviewed: Djerassi's study of the regulation of chemical birth control agents; the downfall of the American supersonic airliner; climate modification; and genetic engineering. The author examines technology and the nature of bureaucratic institutions with respect to the political…
NASA Astrophysics Data System (ADS)
Fang, Shin-Yi; Smith, Garrett; Tabor, Whitney
2018-04-01
This paper analyses a three-layer connectionist network that solves a translation-invariance problem, offering a novel explanation for transposed letter effects in word reading. Analysis of the hidden unit encodings provides insight into two central issues in cognitive science: (1) What is the novelty of claims of "modality-specific" encodings? and (2) How can a learning system establish a complex internal structure needed to solve a problem? Although these topics (embodied cognition and learnability) are often treated separately, we find a close relationship between them: modality-specific features help the network discover an abstract encoding by causing it to break the initial symmetries of the hidden units in an effective way. While this neural model is extremely simple compared to the human brain, our results suggest that neural networks need not be black boxes and that carefully examining their encoding behaviours may reveal how they differ from classical ideas about the mind-world relationship.
NASA Astrophysics Data System (ADS)
Guerrout, EL-Hachemi; Ait-Aoudia, Samy; Michelucci, Dominique; Mahiou, Ramdane
2018-05-01
Many routine medical examinations produce images of patients suffering from various pathologies. With the huge number of medical images, the manual analysis and interpretation became a tedious task. Thus, automatic image segmentation became essential for diagnosis assistance. Segmentation consists in dividing the image into homogeneous and significant regions. We focus on hidden Markov random fields referred to as HMRF to model the problem of segmentation. This modelisation leads to a classical function minimisation problem. Broyden-Fletcher-Goldfarb-Shanno algorithm referred to as BFGS is one of the most powerful methods to solve unconstrained optimisation problem. In this paper, we investigate the combination of HMRF and BFGS algorithm to perform the segmentation operation. The proposed method shows very good segmentation results comparing with well-known approaches. The tests are conducted on brain magnetic resonance image databases (BrainWeb and IBSR) largely used to objectively confront the results obtained. The well-known Dice coefficient (DC) was used as similarity metric. The experimental results show that, in many cases, our proposed method approaches the perfect segmentation with a Dice Coefficient above .9. Moreover, it generally outperforms other methods in the tests conducted.
Linking Simulation with Formal Verification and Modeling of Wireless Sensor Network in TLA+
NASA Astrophysics Data System (ADS)
Martyna, Jerzy
In this paper, we present the results of the simulation of a wireless sensor network based on the flooding technique and SPIN protocols. The wireless sensor network was specified and verified by means of the TLA+ specification language [1]. For a model of wireless sensor network built this way simulation was carried with the help of specially constructed software tools. The obtained results allow us to predict the behaviour of the wireless sensor network in various topologies and spatial densities. Visualization of the output data enable precise examination of some phenomenas in wireless sensor networks, such as a hidden terminal, etc.
1985-01-01
One, a cable termination pull out and two, leakage. It is felt that both of these problems have been solved. The cable termiration pullout problem...nm selctroicse~I -. V~- 30.3 Z? Ul.T Casio Ca" inOS Allow waer to tam. feai Mone 11 l i"f MM Goali (30.321) -= 9to75 % col roo NMI V023 ’..ca...t-he third typ. of failure, an SD cable pulled out of termination. This was obviously not caused by a Morrison seal or an 0-ring. it appears
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Select Committee on Aging.
This briefing by the Congressional Select Committee on Aging was designed to gather information on the physical and psychological abuse of the elderly. A number of witness reports are included, testifying to the seriousness and extent of the problem of elder abuse. It is pointed out that many victims refuse to admit abuse; public discussions of…
Curricula Equity in Required Ninth-Grade Physical Education.
ERIC Educational Resources Information Center
Napper-Owen, Gloria E.; Kovar, Susan K.; Ermler, Kathy L.; Mehrhof, Joella H.
1999-01-01
Surveyed high school physical educators regarding required physical education programs, examining hidden curriculum about gender equity and culture. Team sports dominated the instructional units. Teachers had problems involving all students in coeducational activities. Female teachers were more apt to teach outside their socially accepted area of…
ERIC Educational Resources Information Center
Rapp, Doris J.
1990-01-01
Children can suffer from allergies that can markedly affect their behavior and school performance. Once an allergy is suspected, teachers and principals can consider allergens inside the school, outside the school, and related to problem foods or chemicals. A sidebar lists some allergy clues to watch for. Includes nine references. (MLH)
The Camp Caretaker: A Hidden Treasure.
ERIC Educational Resources Information Center
Ezersky, Eugene M.
1996-01-01
At a round-table discussion, five camp caretakers identified common camp maintenance problems. Snow loads, wooden floors, storage of lake equipment, removal of grass cuttings and leaves, local suppliers, vandalism and trespassing, swimming pools, assigning work, use of outside contractors, decisions to replace or repair, job satisfaction, and…
Computer Intelligence: Unlimited and Untapped.
ERIC Educational Resources Information Center
Staples, Betsy
1983-01-01
Herbert Simon (Nobel prize-winning economist/professor) expresses his views on human and artificial intelligence, problem solving, inventing concepts, and the future. Includes comments on expert systems, state of the art in artificial intelligence, robotics, and "Bacon," a computer program that finds scientific laws hidden in raw data.…
Two states or not two states: Single-molecule folding studies of protein L
NASA Astrophysics Data System (ADS)
Aviram, Haim Yuval; Pirchi, Menahem; Barak, Yoav; Riven, Inbal; Haran, Gilad
2018-03-01
Experimental tools of increasing sophistication have been employed in recent years to study protein folding and misfolding. Folding is considered a complex process, and one way to address it is by studying small proteins, which seemingly possess a simple energy landscape with essentially only two stable states, either folded or unfolded. The B1-IgG binding domain of protein L (PL) is considered a model two-state folder, based on measurements using a wide range of experimental techniques. We applied single-molecule fluorescence resonance energy transfer (FRET) spectroscopy in conjunction with a hidden Markov model analysis to fully characterize the energy landscape of PL and to extract the kinetic properties of individual molecules of the protein. Surprisingly, our studies revealed the existence of a third state, hidden under the two-state behavior of PL due to its small population, ˜7%. We propose that this minority intermediate involves partial unfolding of the two C-terminal β strands of PL. Our work demonstrates that single-molecule FRET spectroscopy can be a powerful tool for a comprehensive description of the folding dynamics of proteins, capable of detecting and characterizing relatively rare metastable states that are difficult to observe in ensemble studies.
Hofhuis, Julia; Schueren, Fabian; Nötzel, Christopher; Lingner, Thomas; Gärtner, Jutta; Jahn, Olaf
2016-01-01
Translational readthrough gives rise to C-terminally extended proteins, thereby providing the cell with new protein isoforms. These may have different properties from the parental proteins if the extensions contain functional domains. While for most genes amino acid incorporation at the stop codon is far lower than 0.1%, about 4% of malate dehydrogenase (MDH1) is physiologically extended by translational readthrough and the actual ratio of MDH1x (extended protein) to ‘normal' MDH1 is dependent on the cell type. In human cells, arginine and tryptophan are co-encoded by the MDH1x UGA stop codon. Readthrough is controlled by the 7-nucleotide high-readthrough stop codon context without contribution of the subsequent 50 nucleotides encoding the extension. All vertebrate MDH1x is directed to peroxisomes via a hidden peroxisomal targeting signal (PTS) in the readthrough extension, which is more highly conserved than the extension of lactate dehydrogenase B. The hidden PTS of non-mammalian MDH1x evolved to be more efficient than the PTS of mammalian MDH1x. These results provide insight into the genetic and functional co-evolution of these dually localized dehydrogenases. PMID:27881739
McEwan, Thomas E.
1998-01-01
A radar range finder and hidden object locator is based on ultra-wide band radar with a high resolution swept range gate. The device generates an equivalent time amplitude scan with atypical range of 4 inches to 20 feet, and an analog range resolution as limited by a jitter of on the order of 0.01 inches. A differential sampling receiver is employed to effectively eliminate ringing and other aberrations induced in the receiver by the near proximity of the transmit antenna, so a background subtraction is not needed, simplifying the circuitry while improving performance. Uses of the invention include a replacement of ultrasound devices for fluid level sensing, automotive radar, such as cruise control and parking assistance, hidden object location, such as stud and rebar finding. Also, this technology can be used when positioned over a highway lane to collect vehicle count and speed data for traffic control. Techniques are used to reduce clutter in the receive signal, such as decoupling the receive and transmit cavities by placing a space between them, using conductive or radiative damping elements on the cavities, and using terminating plates on the sides of the openings.
McEwan, T.E.
1998-06-30
A radar range finder and hidden object locator is based on ultra-wide band radar with a high resolution swept range gate. The device generates an equivalent time amplitude scan with atypical range of 4 inches to 20 feet, and an analog range resolution as limited by a jitter of on the order of 0.01 inches. A differential sampling receiver is employed to effectively eliminate ringing and other aberrations induced in the receiver by the near proximity of the transmit antenna, so a background subtraction is not needed, simplifying the circuitry while improving performance. Uses of the invention include a replacement of ultrasound devices for fluid level sensing, automotive radar, such as cruise control and parking assistance, hidden object location, such as stud and rebar finding. Also, this technology can be used when positioned over a highway lane to collect vehicle count and speed data for traffic control. Techniques are used to reduce clutter in the receive signal, such as decoupling the receive and transmit cavities by placing a space between them, using conductive or radiative damping elements on the cavities, and using terminating plates on the sides of the openings. 20 figs.
Behavior of supercooled aqueous solutions stemming from hidden liquid–liquid transition in water
DOE Office of Scientific and Technical Information (OSTI.GOV)
Biddle, John W.; Holten, Vincent; Anisimov, Mikhail A., E-mail: anisimov@umd.edu
2014-08-21
A popular hypothesis that explains the anomalies of supercooled water is the existence of a metastable liquid–liquid transition hidden below the line of homogeneous nucleation. If this transition exists and if it is terminated by a critical point, the addition of a solute should generate a line of liquid–liquid critical points emanating from the critical point of pure metastable water. We have analyzed thermodynamic consequences of this scenario. In particular, we consider the behavior of two systems, H{sub 2}O-NaCl and H{sub 2}O-glycerol. We find the behavior of the heat capacity in supercooled aqueous solutions of NaCl, as reported by Archermore » and Carter [J. Phys. Chem. B 104, 8563 (2000)], to be consistent with the presence of the metastable liquid–liquid transition. We elucidate the non-conserved nature of the order parameter (extent of “reaction” between two alternative structures of water) and the consequences of its coupling with conserved properties (density and concentration). We also show how the shape of the critical line in a solution controls the difference in concentration of the coexisting liquid phases.« less
Hidden Structural Codes in Protein Intrinsic Disorder.
Borkosky, Silvia S; Camporeale, Gabriela; Chemes, Lucía B; Risso, Marikena; Noval, María Gabriela; Sánchez, Ignacio E; Alonso, Leonardo G; de Prat Gay, Gonzalo
2017-10-17
Intrinsic disorder is a major structural category in biology, accounting for more than 30% of coding regions across the domains of life, yet consists of conformational ensembles in equilibrium, a major challenge in protein chemistry. Anciently evolved papillomavirus genomes constitute an unparalleled case for sequence to structure-function correlation in cases in which there are no folded structures. E7, the major transforming oncoprotein of human papillomaviruses, is a paradigmatic example among the intrinsically disordered proteins. Analysis of a large number of sequences of the same viral protein allowed for the identification of a handful of residues with absolute conservation, scattered along the sequence of its N-terminal intrinsically disordered domain, which intriguingly are mostly leucine residues. Mutation of these led to a pronounced increase in both α-helix and β-sheet structural content, reflected by drastic effects on equilibrium propensities and oligomerization kinetics, and uncovers the existence of local structural elements that oppose canonical folding. These folding relays suggest the existence of yet undefined hidden structural codes behind intrinsic disorder in this model protein. Thus, evolution pinpoints conformational hot spots that could have not been identified by direct experimental methods for analyzing or perturbing the equilibrium of an intrinsically disordered protein ensemble.
Closed-form solutions for a class of optimal quadratic regulator problems with terminal constraints
NASA Technical Reports Server (NTRS)
Juang, J.-N.; Turner, J. D.; Chun, H. M.
1984-01-01
Closed-form solutions are derived for coupled Riccati-like matrix differential equations describing the solution of a class of optimal finite time quadratic regulator problems with terminal constraints. Analytical solutions are obtained for the feedback gains and the closed-loop response trajectory. A computational procedure is presented which introduces new variables for efficient computation of the terminal control law. Two examples are given to illustrate the validity and usefulness of the theory.
A meta-cognitive learning algorithm for a Fully Complex-valued Relaxation Network.
Savitha, R; Suresh, S; Sundararajan, N
2012-08-01
This paper presents a meta-cognitive learning algorithm for a single hidden layer complex-valued neural network called "Meta-cognitive Fully Complex-valued Relaxation Network (McFCRN)". McFCRN has two components: a cognitive component and a meta-cognitive component. A Fully Complex-valued Relaxation Network (FCRN) with a fully complex-valued Gaussian like activation function (sech) in the hidden layer and an exponential activation function in the output layer forms the cognitive component. The meta-cognitive component contains a self-regulatory learning mechanism which controls the learning ability of FCRN by deciding what-to-learn, when-to-learn and how-to-learn from a sequence of training data. The input parameters of cognitive components are chosen randomly and the output parameters are estimated by minimizing a logarithmic error function. The problem of explicit minimization of magnitude and phase errors in the logarithmic error function is converted to system of linear equations and output parameters of FCRN are computed analytically. McFCRN starts with zero hidden neuron and builds the number of neurons required to approximate the target function. The meta-cognitive component selects the best learning strategy for FCRN to acquire the knowledge from training data and also adapts the learning strategies to implement best human learning components. Performance studies on a function approximation and real-valued classification problems show that proposed McFCRN performs better than the existing results reported in the literature. Copyright © 2012 Elsevier Ltd. All rights reserved.
Tu, Junchao; Zhang, Liyan
2018-01-12
A new solution to the problem of galvanometric laser scanning (GLS) system calibration is presented. Under the machine learning framework, we build a single-hidden layer feedforward neural network (SLFN)to represent the GLS system, which takes the digital control signal at the drives of the GLS system as input and the space vector of the corresponding outgoing laser beam as output. The training data set is obtained with the aid of a moving mechanism and a binocular stereo system. The parameters of the SLFN are efficiently solved in a closed form by using extreme learning machine (ELM). By quantitatively analyzing the regression precision with respective to the number of hidden neurons in the SLFN, we demonstrate that the proper number of hidden neurons can be safely chosen from a broad interval to guarantee good generalization performance. Compared to the traditional model-driven calibration, the proposed calibration method does not need a complex modeling process and is more accurate and stable. As the output of the network is the space vectors of the outgoing laser beams, it costs much less training time and can provide a uniform solution to both laser projection and 3D-reconstruction, in contrast with the existing data-driven calibration method which only works for the laser triangulation problem. Calibration experiment, projection experiment and 3D reconstruction experiment are respectively conducted to test the proposed method, and good results are obtained.
NASA Astrophysics Data System (ADS)
Rusgiyarto, Ferry; Sjafruddin, Ade; Frazila, Russ Bona; Suprayogi
2017-06-01
Increasing container traffic and land acquisition problem for terminal expansion leads to usage of external yard in a port buffer area. This condition influenced the terminal performance because a road which connects the terminal and the external yard was also used by non-container traffic. Location choice problem considered to solve this condition, but the previous research has not taken account a stochastic condition of container arrival rate and service time yet. Bi-level programming framework was used to find optimum location configuration. In the lower-level, there was a problem to construct the equation, which correlated the terminal operation and the road due to different time cycle equilibrium. Container moves from the quay to a terminal gate in a daily unit of time, meanwhile, it moves from the terminal gate to the external yard through the road in a minute unit of time. If the equation formulated in hourly unit equilibrium, it cannot catch up the container movement characteristics in the terminal. Meanwhile, if the equation formulated in daily unit equilibrium, it cannot catch up the road traffic movement characteristics in the road. This problem can be addressed using simulation model. Discrete Event Simulation Model was used to simulate import container flow processes in the container terminal and external yard. Optimum location configuration in the upper-level was the combinatorial problem, which was solved by Full Enumeration approach. The objective function of the external yard location model was to minimize user transport cost (or time) and to maximize operator benefit. Numerical experiment was run for the scenario assumption of two container handling ways, three external yards, and thirty-day simulation periods. Jakarta International Container Terminal (JICT) container characteristics data was referred for the simulation. Based on five runs which were 5, 10, 15, 20, and 30 repetitions, operation one of three available external yards (external yard - 3) was the optimum result. Apparently, the model confirmed the hypothesis that there was an optimum configuration of the external yard. Nevertheless, the model needs detail elaboration related to the objective function and the optimization constraint. It requires detail validation, in term of service time value, distribution pattern, and arrival rate in each unit server modeled in the next step of the research. The model gave unique and relatively consistent value of each run. It was indicated that the method has a chance to solve the research problem.
Deciphering the Hidden Informational Content of Protein Sequences
Liu, Ming; Hua, Qing-xin; Hu, Shi-Quan; Jia, Wenhua; Yang, Yanwu; Saith, Sunil Evan; Whittaker, Jonathan; Arvan, Peter; Weiss, Michael A.
2010-01-01
Protein sequences encode both structure and foldability. Whereas the interrelationship of sequence and structure has been extensively investigated, the origins of folding efficiency are enigmatic. We demonstrate that the folding of proinsulin requires a flexible N-terminal hydrophobic residue that is dispensable for the structure, activity, and stability of the mature hormone. This residue (PheB1 in placental mammals) is variably positioned within crystal structures and exhibits 1H NMR motional narrowing in solution. Despite such flexibility, its deletion impaired insulin chain combination and led in cell culture to formation of non-native disulfide isomers with impaired secretion of the variant proinsulin. Cellular folding and secretion were maintained by hydrophobic substitutions at B1 but markedly perturbed by polar or charged side chains. We propose that, during folding, a hydrophobic side chain at B1 anchors transient long-range interactions by a flexible N-terminal arm (residues B1–B8) to mediate kinetic or thermodynamic partitioning among disulfide intermediates. Evidence for the overall contribution of the arm to folding was obtained by alanine scanning mutagenesis. Together, our findings demonstrate that efficient folding of proinsulin requires N-terminal sequences that are dispensable in the native state. Such arm-dependent folding can be abrogated by mutations associated with β-cell dysfunction and neonatal diabetes mellitus. PMID:20663888
Selecting a Learning Management System (LMS) in Developing Countries: Instructors' Evaluation
ERIC Educational Resources Information Center
Cavus, Nadire
2013-01-01
Learning management systems (LMSs) contain hidden costs, unclear user environments, bulky developer and administration manuals, and limitations with regard to interoperability, integration, localization, and bandwidth requirements. Careful evaluation is required in selecting the most appropriate LMS for use, and this is a general problem in…
Aging and Alcohol Abuse: Increasing Counselor Awareness
ERIC Educational Resources Information Center
Williams, June M.; Ballard, Mary B.; Alessi, Hunter
2005-01-01
Alcohol abuse in older adulthood is a rapidly growing but often hidden problem. The authors provide an overview of the issues related to older adult alcohol abuse through a discussion of physiological, psychological, and social risk factors; an examination of appropriate assessment procedures; and an overview of factors related to treatment.
Sniffing out the Secret Poison: Selection Bias in Educational Research
ERIC Educational Resources Information Center
Showalter, Daniel A.; Mullet, Luke B.
2017-01-01
Selection bias is a persistent, and often hidden, problem in educational research. It is the primary obstacle standing in between increasingly available large education datasets and the ability to make valid causal inferences to inform policymaking, research, and practice (Stuart, 2010). This article provides an accessible discussion on the…
Hidden in the Middle: Culture, Value and Reward in Bioinformatics
ERIC Educational Resources Information Center
Lewis, Jamie; Bartlett, Andrew; Atkinson, Paul
2016-01-01
Bioinformatics--the so-called shotgun marriage between biology and computer science--is an interdiscipline. Despite interdisciplinarity being seen as a virtue, for having the capacity to solve complex problems and foster innovation, it has the potential to place projects and people in anomalous categories. For example, valorised…
Administrative Law: The Hidden Comparative Law Course.
ERIC Educational Resources Information Center
Strauss, Peter L.
1996-01-01
Argues that the main contribution of the Administrative Law course to law students is that it presents problems which contrast with those of the standard court-centered curriculum and can illuminate other areas of law, repeatedly confronting students with doctrinal differences. Offers several examples from civil procedure, constitutional law, and…
Influence of enzymatic hydrolysis on the allergenic reactivity of processed cashew and pistachio
USDA-ARS?s Scientific Manuscript database
Tree nuts constitute one of the main cause of fatal anaphylactic reactions due to food allergy upon direct ingestion and as ingredients (hidden allergens), and cashew and pistachio allergies are considered a serious health problem. Several previous studies have shown that thermal processing may modi...
Hispanics in the Criminal Justice System--the "Nonexistent" Problem.
ERIC Educational Resources Information Center
Mandel, Jerry
1979-01-01
Though hidden from view by being considered "non-existent", the meager evidence indicates that Hispanics have an unusually high arrest and incarceration rate. Hispanic background is rarely asked on the six major sources of criminal justice statistics--statistics of arrests, courts, prisoners, juvenile delinquency, crime victimization, and public…
Evaluating Presentation Skills of Volunteer Trainers.
ERIC Educational Resources Information Center
Mohan, Donna K.
A systematic method for evaluating the presentation skills of volunteer trainers would enable the discovery of hidden problems. It would also increase individual trainer skills and satisfaction and improve the overall effectiveness of the training program. A first step is to determine the general presentation skills a successful volunteer trainer…
Managing Food Allergies in School.
ERIC Educational Resources Information Center
Munoz-Furlong, Anne
1997-01-01
The number of students with food allergies is increasing, with peanuts the leading culprit. Peer pressure and allergens hidden in baked goods can pose problems for school staff. Children with documented life-threatening allergies are covered by the Americans with Disabilities Act. Principals should reassure parents and use Section 504 guidelines…
ERIC Educational Resources Information Center
Rittner-Heir, Robbin
2003-01-01
Vandalism is the main problem in maintaining school washrooms. Ways to help schools meet this challenge include designing washrooms with hidden moving parts to cut down on vandalism and making toilet partitions of solid polyethylene plastic which is virtually indestructible, hard to deface, and easy to clean. The article suggests it is worth…
Innovations in the Teaching of Behavioral Sciences in the Preclinical Curriculum
ERIC Educational Resources Information Center
Mack, Kevin
2005-01-01
Objective: In problem-based learning curricula, cases are usually clustered into identified themes or organ systems. While this method of aggregating cases presents clear advantages in terms of resource alignment and student focus, an alternative "hidden cluster" approach provides rich opportunities for content integration. Method: The author…
ERIC Educational Resources Information Center
Sears, James T., Ed.
This book of essays explores the explicit and hidden curriculum of sexuality from kindergarten through college. The 15 interrelated essays challenge conventional assumptions regarding sexuality and the curriculum by applying non-traditional perspectives to traditionally unresolved problems while proposing specific curricular strategies and…
ERIC Educational Resources Information Center
McGrady, Lisa
2010-01-01
This article reports on a study designed to explore whether and in what ways individual students' technological literacies might impact collaborative teams. For the collaborative team discussed in this article, technological literacy--specifically, limited repertoires for solving technical problems, clashes between document management strategies,…
A fast and accurate online sequential learning algorithm for feedforward networks.
Liang, Nan-Ying; Huang, Guang-Bin; Saratchandran, P; Sundararajan, N
2006-11-01
In this paper, we develop an online sequential learning algorithm for single hidden layer feedforward networks (SLFNs) with additive or radial basis function (RBF) hidden nodes in a unified framework. The algorithm is referred to as online sequential extreme learning machine (OS-ELM) and can learn data one-by-one or chunk-by-chunk (a block of data) with fixed or varying chunk size. The activation functions for additive nodes in OS-ELM can be any bounded nonconstant piecewise continuous functions and the activation functions for RBF nodes can be any integrable piecewise continuous functions. In OS-ELM, the parameters of hidden nodes (the input weights and biases of additive nodes or the centers and impact factors of RBF nodes) are randomly selected and the output weights are analytically determined based on the sequentially arriving data. The algorithm uses the ideas of ELM of Huang et al. developed for batch learning which has been shown to be extremely fast with generalization performance better than other batch training methods. Apart from selecting the number of hidden nodes, no other control parameters have to be manually chosen. Detailed performance comparison of OS-ELM is done with other popular sequential learning algorithms on benchmark problems drawn from the regression, classification and time series prediction areas. The results show that the OS-ELM is faster than the other sequential algorithms and produces better generalization performance.
Jung, Minsoo
2015-01-01
When there is no sampling frame within a certain group or the group is concerned that making its population public would bring social stigma, we say the population is hidden. It is difficult to approach this kind of population survey-methodologically because the response rate is low and its members are not quite honest with their responses when probability sampling is used. The only alternative known to address the problems caused by previous methods such as snowball sampling is respondent-driven sampling (RDS), which was developed by Heckathorn and his colleagues. RDS is based on a Markov chain, and uses the social network information of the respondent. This characteristic allows for probability sampling when we survey a hidden population. We verified through computer simulation whether RDS can be used on a hidden population of cancer survivors. According to the simulation results of this thesis, the chain-referral sampling of RDS tends to minimize as the sample gets bigger, and it becomes stabilized as the wave progresses. Therefore, it shows that the final sample information can be completely independent from the initial seeds if a certain level of sample size is secured even if the initial seeds were selected through convenient sampling. Thus, RDS can be considered as an alternative which can improve upon both key informant sampling and ethnographic surveys, and it needs to be utilized for various cases domestically as well.
20 CFR 632.23 - Termination and corrective action of a CAP and/or Master Plan.
Code of Federal Regulations, 2010 CFR
2010-04-01
... substantiates serious management, fiscal and/or performance problems, information from the Inspector General or gained through incident reports of poor performance, serious administrative problems and/or inability to... termination: (1) Poor performance and inability to meet Federal standards related to such debt collection...
Learning to classify in large committee machines
NASA Astrophysics Data System (ADS)
O'kane, Dominic; Winther, Ole
1994-10-01
The ability of a two-layer neural network to learn a specific non-linearly-separable classification task, the proximity problem, is investigated using a statistical mechanics approach. Both the tree and fully connected architectures are investigated in the limit where the number K of hidden units is large, but still much smaller than the number N of inputs. Both have continuous weights. Within the replica symmetric ansatz, we find that for zero temperature training, the tree architecture exhibits a strong overtraining effect. For nonzero temperature the asymptotic error is lowered, but it is still higher than the corresponding value for the simple perceptron. The fully connected architecture is considered for two regimes. First, for a finite number of examples we find a symmetry among the hidden units as each performs equally well. The asymptotic generalization error is finite, and minimal for T-->∞ where it goes to the same value as for the simple perceptron. For a large number of examples we find a continuous transition to a phase with broken hidden-unit symmetry, which has an asymptotic generalization error equal to zero.
Reinforcement learning state estimator.
Morimoto, Jun; Doya, Kenji
2007-03-01
In this study, we propose a novel use of reinforcement learning for estimating hidden variables and parameters of nonlinear dynamical systems. A critical issue in hidden-state estimation is that we cannot directly observe estimation errors. However, by defining errors of observable variables as a delayed penalty, we can apply a reinforcement learning frame-work to state estimation problems. Specifically, we derive a method to construct a nonlinear state estimator by finding an appropriate feedback input gain using the policy gradient method. We tested the proposed method on single pendulum dynamics and show that the joint angle variable could be successfully estimated by observing only the angular velocity, and vice versa. In addition, we show that we could acquire a state estimator for the pendulum swing-up task in which a swing-up controller is also acquired by reinforcement learning simultaneously. Furthermore, we demonstrate that it is possible to estimate the dynamics of the pendulum itself while the hidden variables are estimated in the pendulum swing-up task. Application of the proposed method to a two-linked biped model is also presented.
Analysis of single ion channel data incorporating time-interval omission and sampling
The, Yu-Kai; Timmer, Jens
2005-01-01
Hidden Markov models are widely used to describe single channel currents from patch-clamp experiments. The inevitable anti-aliasing filter limits the time resolution of the measurements and therefore the standard hidden Markov model is not adequate anymore. The notion of time-interval omission has been introduced where brief events are not detected. The developed, exact solutions to this problem do not take into account that the measured intervals are limited by the sampling time. In this case the dead-time that specifies the minimal detectable interval length is not defined unambiguously. We show that a wrong choice of the dead-time leads to considerably biased estimates and present the appropriate equations to describe sampled data. PMID:16849220
A simple method to derive bounds on the size and to train multilayer neural networks
NASA Technical Reports Server (NTRS)
Sartori, Michael A.; Antsaklis, Panos J.
1991-01-01
A new derivation is presented for the bounds on the size of a multilayer neural network to exactly implement an arbitrary training set; namely, the training set can be implemented with zero error with two layers and with the number of the hidden-layer neurons equal to no.1 is greater than p - 1. The derivation does not require the separation of the input space by particular hyperplanes, as in previous derivations. The weights for the hidden layer can be chosen almost arbitrarily, and the weights for the output layer can be found by solving no.1 + 1 linear equations. The method presented exactly solves (M), the multilayer neural network training problem, for any arbitrary training set.
The terminal area automated path generation problem
NASA Technical Reports Server (NTRS)
Hsin, C.-C.
1977-01-01
The automated terminal area path generation problem in the advanced Air Traffic Control System (ATC), has been studied. Definitions, input, output and the interrelationships with other ATC functions have been discussed. Alternatives in modeling the problem have been identified. Problem formulations and solution techniques are presented. In particular, the solution of a minimum effort path stretching problem (path generation on a given schedule) has been carried out using the Newton-Raphson trajectory optimization method. Discussions are presented on the effect of different delivery time, aircraft entry position, initial guess on the boundary conditions, etc. Recommendations are made on real-world implementations.
Naturalness of Electroweak Symmetry Breaking while Waiting for the LHC
NASA Astrophysics Data System (ADS)
Espinosa, J. R.
2007-06-01
After revisiting the hierarchy problem of the Standard Model and its implications for the scale of New Physics, I consider the finetuning problem of electroweak symmetry breaking in several scenarios beyond the Standard Model: SUSY, Little Higgs and "improved naturalness" models. The main conclusions are that: New Physics should appear on the reach of the LHC; some SUSY models can solve the hierarchy problem with acceptable residual tuning; Little Higgs models generically suffer from large tunings, many times hidden; and, finally, that "improved naturalness" models do not generically improve the naturalness of the SM.
New design and operating techniques and requirements for improved aircraft terminal area operations
NASA Technical Reports Server (NTRS)
Reeder, J. P.; Taylor, R. T.; Walsh, T. M.
1974-01-01
Current aircraft operating problems that must be alleviated for future high-density terminal areas are safety, dependence on weather, congestion, energy conservation, noise, and atmospheric pollution. The Microwave Landing System (MLS) under development by FAA provides increased capabilities over the current ILS. The development of the airborne system's capability to take maximum advantage of the MLS capabilities in order to solve terminal area problems are discussed. A major limiting factor in longitudinal spacing for capacity increase is the trailing vortex hazard. Promising methods for causing early dissipation of the vortices were explored. Flight procedures for avoiding the hazard were investigated. Terminal configured vehicles and their flight test development are discussed.
Modelling with Difference Equations Supported by GeoGebra: Exploring the Kepler Problem
ERIC Educational Resources Information Center
Kovacs, Zoltan
2010-01-01
The use of difference and differential equations in the modelling is a topic usually studied by advanced students in mathematics. However difference and differential equations appear in the school curriculum in many direct or hidden ways. Difference equations first enter in the curriculum when studying arithmetic sequences. Moreover Newtonian…
Improving School Attendance through Collaboration: A Catalyst for Community Involvement and Change
ERIC Educational Resources Information Center
Childs, Joshua; Grooms, Ain A.
2018-01-01
Chronic absenteeism is often referred to as a problem hidden in plain sight (Chang & Romero, 2008). In recent years, more communities around the United States have been intentional on improving student attendance and limiting the impact of chronic absenteeism. Using qualitative interviews, we sought to understand how one community was…
Curricular Orientations in Elementary School Music: Roles, Pedagogies, and Values.
ERIC Educational Resources Information Center
Bresler, Liora
1996-01-01
Explores the day-to-day music curriculum in three elementary schools. Identifies three orientations toward the role of music education: (1) the functional, based on traditional academic goals and content; (2) the complementary, relegating music to a hidden curriculum; and (3) the expansive, focusing on enhancing perceptual and problem-solving…
Relational Aggression among Boys: Blind Spots and Hidden Dramas
ERIC Educational Resources Information Center
Eriksen, Ingunn Marie; Lyng, Selma Therese
2018-01-01
Although boys too are involved in relational aggression, their experiences are overshadowed by the focus on relational aggression among girls. This paradox mirrors the empirical puzzle that forms the starting point for this article: while teachers saw relational aggression as a 'girl problem', we found a vast undercurrent of relational aggression…
Child Abuse and Neglect in Japan: Coin-Operated-Locker Babies.
ERIC Educational Resources Information Center
Kouno, Akihisa; Johnson, Charles F.
1995-01-01
This paper reviews Japan's child abuse/neglect history, including the incidence of "coin-operated-locker babies," where murdered infants are hidden in railway and airport lockers, and actions taken to reduce this problem. The incidence of child abuse in Japan and the United States is compared, and social influences on the number of…
Is Your School a Dumping Ground?: Hidden Hazards You Can Identify and Eliminate.
ERIC Educational Resources Information Center
Cronin-Jones, Linda L.
1992-01-01
Describes how teachers and students can conduct a schoolwide hazardous waste survey. The activity is an introduction to hazardous waste management and is useful in general physical science, chemistry, and environmental science classes. Two activity worksheets are provided. Explains how schools can clean up hazardous waste problems. (PR)
The Hidden Curriculum of Whiteness: White Teachers, White Territory, and White Community.
ERIC Educational Resources Information Center
Allen, Ricky Lee
This paper suggests that space and spatiality are major features of racial identity and the formation of student resistance. It brings together critical studies of "Whiteness," human territoriality, and theories of resistance in education. The problems between white teachers and students of color can be understood better through a combination of…
ERIC Educational Resources Information Center
Nivens, Ryan Andrew
2016-01-01
This article provides a range of activities designed to engage students in using an early form of graphing. While the "Australian Curriculum: Mathematics" (2014) highlights understanding, fluency, problem-solving, and reasoning, the National Research Council (2001) describes five strands of mathematical proficiency, with the additional…
NASA Technical Reports Server (NTRS)
Hedgley, David R., Jr.
2000-01-01
A user's guide for the computer program SKETCH is presented on this disk. SKETCH solves a popular problem in computer graphics-the removal of hidden lines from images of solid objects. Examples and illustrations are included in the guide. Also included is the SKETCH program, so a user can incorporate the information into a particular software system.
ERIC Educational Resources Information Center
Grimes, Susan; Scevak, Jill; Southgate, Erica; Buchanan, Rachel
2017-01-01
Internationally, university students with disabilities (SWD) are recognised as being under-represented in higher education. They face significant problems accessing appropriate accommodations for their disability. Academic outcomes for this group are lower in terms of achievement and graduation rates. The true size of the SWD group at university…
ERIC Educational Resources Information Center
Polotskaia, Elena; Savard, Annie; Freiman, Viktor
2016-01-01
According to numerous studies (Barrouillet & Camos 2002; Brousseau 1988; Chevallard 1988; Riley et al. 1984; Schubauer-Leoni & Ntamakiliro, "Revue Des Sciences de L'éducation," 20(1): 87-113, 1994; Vergnaud 1982; Xin, "The Journal of Educational Research," 100(6):347-360, 2007), a combination of many factors, including…
Personality and Occupational Stress in Elite Performers.
ERIC Educational Resources Information Center
Hamilton, Linda H.; Kella, John J.
Performing Arts Psychology has recently emerged as a unique subspecialty comparable to that of Sports Psychology. Attention has been focused on problems common to all performers (e.g., performance anxiety); however, the various stresses within each art form often remain hidden from view. To assess the psychological aspects of different art forms,…
The Relationship between Teachers' Views about Cultural Values and Critical Pedagogy
ERIC Educational Resources Information Center
Yilmaz, Kursad; Altinkurt, Yahya; Ozciftci, Elif
2016-01-01
Problem Statement: Known as basic elements directing individuals' lives, cultural values are hidden cultural elements that influence all evaluations and perceptions. Values, in that sense, are elements individuals are aware of and provide the answer to the "what should I do?" feeling (Schein, 1992). Critical pedagogy is a project based…
Journal of Undergraduate Psychological Research, Vol. 1, No. 1.
ERIC Educational Resources Information Center
Ladd, Sandra L., Ed.; Hughmanick, Michael, Ed.
1974-01-01
Articles resulting from studies conducted by college undergraduates in all areas of experimental psychology are provided, together with abstracts of other papers authored by students in the field of study. The articles are: The Influence of SET on Solving Hidden-Word Problems by Lana I. Boutacoff; Violation of Personal Space in Deviant Adolescents…
Credits and Credibility: Educating Professionals for Cultural Sensitivity.
ERIC Educational Resources Information Center
Morgan, Elizabeth; Weigel, Van
A four-part discussion on cultural sensitivity and good listening skills in development professionals is presented. It is noted that there is much in their educational regimen which militates against developing these habits of mind. It is hypothesized that much of this problem resides in the hidden cultural meanings of professionalism in general…
Processes Underlying Young Children's Spatial Orientation during Movement.
ERIC Educational Resources Information Center
Bremner, J. Gavin; And Others
1994-01-01
Tested children 18 months to 4 years for their ability to relocate a hidden object after self-produced movement around an array of 4 locations. Children encountered no specific difficulty in coordinating dimensions, or they solved the task without recourse to such a system. They also appeared to change strategy when the problem requires more…
Bidirectional extreme learning machine for regression problem and its learning effectiveness.
Yang, Yimin; Wang, Yaonan; Yuan, Xiaofang
2012-09-01
It is clear that the learning effectiveness and learning speed of neural networks are in general far slower than required, which has been a major bottleneck for many applications. Recently, a simple and efficient learning method, referred to as extreme learning machine (ELM), was proposed by Huang , which has shown that, compared to some conventional methods, the training time of neural networks can be reduced by a thousand times. However, one of the open problems in ELM research is whether the number of hidden nodes can be further reduced without affecting learning effectiveness. This brief proposes a new learning algorithm, called bidirectional extreme learning machine (B-ELM), in which some hidden nodes are not randomly selected. In theory, this algorithm tends to reduce network output error to 0 at an extremely early learning stage. Furthermore, we find a relationship between the network output error and the network output weights in the proposed B-ELM. Simulation results demonstrate that the proposed method can be tens to hundreds of times faster than other incremental ELM algorithms.
Rule extraction from minimal neural networks for credit card screening.
Setiono, Rudy; Baesens, Bart; Mues, Christophe
2011-08-01
While feedforward neural networks have been widely accepted as effective tools for solving classification problems, the issue of finding the best network architecture remains unresolved, particularly so in real-world problem settings. We address this issue in the context of credit card screening, where it is important to not only find a neural network with good predictive performance but also one that facilitates a clear explanation of how it produces its predictions. We show that minimal neural networks with as few as one hidden unit provide good predictive accuracy, while having the added advantage of making it easier to generate concise and comprehensible classification rules for the user. To further reduce model size, a novel approach is suggested in which network connections from the input units to this hidden unit are removed by a very straightaway pruning procedure. In terms of predictive accuracy, both the minimized neural networks and the rule sets generated from them are shown to compare favorably with other neural network based classifiers. The rules generated from the minimized neural networks are concise and thus easier to validate in a real-life setting.
Flight experiments to improve terminal area operations
NASA Technical Reports Server (NTRS)
Salmirs, S.; Morello, S. A.
1978-01-01
A brief description is given of the objectives and activities of the terminal configured vehicle (TCV) program and of some of the airborne facilities. A short analysis of some particular problems of CTOL operations in the terminal area is also presented to show how the program's technical objectives are related to the defined problems. The test aircraft was flown both manually and automatically with manual monitoring over paths including 130 deg intercepts and 2.0 km (1.1. n. mi.) and 0.8 km (0.44 n. mi.) finals. Some statistical data are presented from these and other flight profiles designed to address specific terminal in the next biennium and their application to the terminal area. A description of work being undertaken to study the addition of adjacent traffic information to present map displays is also given.
Multilayer neural networks for reduced-rank approximation.
Diamantaras, K I; Kung, S Y
1994-01-01
This paper is developed in two parts. First, the authors formulate the solution to the general reduced-rank linear approximation problem relaxing the invertibility assumption of the input autocorrelation matrix used by previous authors. The authors' treatment unifies linear regression, Wiener filtering, full rank approximation, auto-association networks, SVD and principal component analysis (PCA) as special cases. The authors' analysis also shows that two-layer linear neural networks with reduced number of hidden units, trained with the least-squares error criterion, produce weights that correspond to the generalized singular value decomposition of the input-teacher cross-correlation matrix and the input data matrix. As a corollary the linear two-layer backpropagation model with reduced hidden layer extracts an arbitrary linear combination of the generalized singular vector components. Second, the authors investigate artificial neural network models for the solution of the related generalized eigenvalue problem. By introducing and utilizing the extended concept of deflation (originally proposed for the standard eigenvalue problem) the authors are able to find that a sequential version of linear BP can extract the exact generalized eigenvector components. The advantage of this approach is that it's easier to update the model structure by adding one more unit or pruning one or more units when the application requires it. An alternative approach for extracting the exact components is to use a set of lateral connections among the hidden units trained in such a way as to enforce orthogonality among the upper- and lower-layer weights. The authors call this the lateral orthogonalization network (LON) and show via theoretical analysis-and verify via simulation-that the network extracts the desired components. The advantage of the LON-based model is that it can be applied in a parallel fashion so that the components are extracted concurrently. Finally, the authors show the application of their results to the solution of the identification problem of systems whose excitation has a non-invertible autocorrelation matrix. Previous identification methods usually rely on the invertibility assumption of the input autocorrelation, therefore they can not be applied to this case.
A stochastic discrete optimization model for designing container terminal facilities
NASA Astrophysics Data System (ADS)
Zukhruf, Febri; Frazila, Russ Bona; Burhani, Jzolanda Tsavalista
2017-11-01
As uncertainty essentially affect the total transportation cost, it remains important in the container terminal that incorporates several modes and transshipments process. This paper then presents a stochastic discrete optimization model for designing the container terminal, which involves the decision of facilities improvement action. The container terminal operation model is constructed by accounting the variation of demand and facilities performance. In addition, for illustrating the conflicting issue that practically raises in the terminal operation, the model also takes into account the possible increment delay of facilities due to the increasing number of equipment, especially the container truck. Those variations expectantly reflect the uncertainty issue in the container terminal operation. A Monte Carlo simulation is invoked to propagate the variations by following the observed distribution. The problem is constructed within the framework of the combinatorial optimization problem for investigating the optimal decision of facilities improvement. A new variant of glow-worm swarm optimization (GSO) is thus proposed for solving the optimization, which is rarely explored in the transportation field. The model applicability is tested by considering the actual characteristics of the container terminal.
NASA Astrophysics Data System (ADS)
Wang, Hai; Kumar, Asutosh; Cho, Minhyung; Wu, Junde
2018-04-01
Physical quantities are assumed to take real values, which stems from the fact that an usual measuring instrument that measures a physical observable always yields a real number. Here we consider the question of what would happen if physical observables are allowed to assume complex values. In this paper, we show that by allowing observables in the Bell inequality to take complex values, a classical physical theory can actually get the same upper bound of the Bell expression as quantum theory. Also, by extending the real field to the quaternionic field, we can puzzle out the GHZ problem using local hidden variable model. Furthermore, we try to build a new type of hidden-variable theory of a single qubit based on the result.
Interferometric Computation Beyond Quantum Theory
NASA Astrophysics Data System (ADS)
Garner, Andrew J. P.
2018-03-01
There are quantum solutions for computational problems that make use of interference at some stage in the algorithm. These stages can be mapped into the physical setting of a single particle travelling through a many-armed interferometer. There has been recent foundational interest in theories beyond quantum theory. Here, we present a generalized formulation of computation in the context of a many-armed interferometer, and explore how theories can differ from quantum theory and still perform distributed calculations in this set-up. We shall see that quaternionic quantum theory proves a suitable candidate, whereas box-world does not. We also find that a classical hidden variable model first presented by Spekkens (Phys Rev A 75(3): 32100, 2007) can also be used for this type of computation due to the epistemic restriction placed on the hidden variable.
Characteristics of Oral Problems and Effects of Oral Care in Terminally Ill Patients With Cancer.
Nakajima, Nobuhisa
2017-06-01
Various distresses appear in the terminal stage of cancer. Oral problems including dry mouth, stomatitis and candidiasis are one of the important problems which should be resolved. The purpose of this study was to investigate oral problems in this stage and improvement of dry mouth by oral care. The study subjects were consecutive terminally ill cancer patients admitted over the past 2 years. Patients were divided based on the status of oral food intake into good oral food intake group (≥30%) and poor oral food intake group. The following 3 items were retrospectively investigated: 1) The incidences of these oral problems, 2) Severity of dry mouth and complication with other oral problems, 3) Improvement of dry mouth using standard oral care by nursing staff and specialist oral care including dentists as needed. There were 115 and 158 patients in good and poor oral intake groups, respectively. 1) The incidences of dry mouth, stomatitis, and candidiasis were significantly higher in poor oral intake group ( p < 0.001). 2) Severe cases of dry mouth (Grade-2&3) were noted in 20.0% and 64.8% in good and poor oral intake groups, respectively ( p < 0.0001). Candidiasis complication rate was significantly higher in poor oral intake group ( p = 0.0002). 3) The rate of dry mouth improvement by oral care was 100% in Grade-1, 86% in Grade-2 and 81% in Grade-3. Oral problems occur in many of terminally ill cancer patients. Accurate diagnosis of oral problems and corresponding appropriate interventions are important for improving quality of end-of-life care.
Optimizing Integrated Terminal Airspace Operations Under Uncertainty
NASA Technical Reports Server (NTRS)
Bosson, Christabelle; Xue, Min; Zelinski, Shannon
2014-01-01
In the terminal airspace, integrated departures and arrivals have the potential to increase operations efficiency. Recent research has developed geneticalgorithm- based schedulers for integrated arrival and departure operations under uncertainty. This paper presents an alternate method using a machine jobshop scheduling formulation to model the integrated airspace operations. A multistage stochastic programming approach is chosen to formulate the problem and candidate solutions are obtained by solving sample average approximation problems with finite sample size. Because approximate solutions are computed, the proposed algorithm incorporates the computation of statistical bounds to estimate the optimality of the candidate solutions. A proof-ofconcept study is conducted on a baseline implementation of a simple problem considering a fleet mix of 14 aircraft evolving in a model of the Los Angeles terminal airspace. A more thorough statistical analysis is also performed to evaluate the impact of the number of scenarios considered in the sampled problem. To handle extensive sampling computations, a multithreading technique is introduced.
Applying sociodramatic methods in teaching transition to palliative care.
Baile, Walter F; Walters, Rebecca
2013-03-01
We introduce the technique of sociodrama, describe its key components, and illustrate how this simulation method was applied in a workshop format to address the challenge of discussing transition to palliative care. We describe how warm-up exercises prepared 15 learners who provide direct clinical care to patients with cancer for a dramatic portrayal of this dilemma. We then show how small-group brainstorming led to the creation of a challenging scenario wherein highly optimistic family members of a 20-year-old young man with terminal acute lymphocytic leukemia responded to information about the lack of further anticancer treatment with anger and blame toward the staff. We illustrate how the facilitators, using sociodramatic techniques of doubling and role reversal, helped learners to understand and articulate the hidden feelings of fear and loss behind the family's emotional reactions. By modeling effective communication skills, the facilitators demonstrated how key communication skills, such as empathic responses to anger and blame and using "wish" statements, could transform the conversation from one of conflict to one of problem solving with the family. We also describe how we set up practice dyads to give the learners an opportunity to try out new skills with each other. An evaluation of the workshop and similar workshops we conducted is presented. Copyright © 2013 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.
Improving the Quality of Alerts and Predicting Intruder's Next Goal with Hidden Colored Petri-Net
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yu, Dong; Frincke, Deb A.
2006-06-22
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next likely goal. In this paper, we propose a novel approach to alert post-processing and correlation, the Hidden Colored Petri-Net (HCPN). Different from most other alert correlation methods, our approach treats the alert correlation problem as an inference problem rather than a filter problem. Our approach assumes that the intruder’s actions are unknown to the IDS and can be inferred only from the alerts generated by the IDS sensors. HCPN can describe the relationship between different stepsmore » carried out by intruders, model observations (alerts) and transitions (actions) separately, and associate each token element (system state) with a probability (or confidence). The model is an extension to Colored Petri-Net (CPN) .It is so called “hidden” because the transitions (actions) are not directly observable but can be inferred by looking through the observations (alerts). These features make HCPN especially suitable for discovering intruders’ actions from their partial observations (alerts,) and predicting intruders’ next goal. Our experiments on DARPA evaluation datasets and the attack scenarios from the Grand Challenge Problem (GCP) show that HCPN has promise as a way to reducing false positives and negatives, predicting intruder’s next possible action, uncovering intruders’ intrusion strategies after the attack scenario has happened, and providing confidence scores.« less
Psychosocial Impact of Terminal Chronic Illness.
ERIC Educational Resources Information Center
Chubon, Robert A.
1988-01-01
Development of a terminal chronic illness creates a spectrum of problems which call for counseling interventions to assist in the individual's adjustment. This overview, intended to raise the consciousness of rehabilitation counselors, outlines the three stages of terminal illness, followed by an examination of resulting lifestyle and relationship…
Termination of School Employees: Legal Issues and Techniques.
ERIC Educational Resources Information Center
National School Boards Association, Alexandria, VA. Council of School Attorneys.
The termination of unsatisfactory school employees is an ubiquitous and often expensive legal problem for school districts. This monograph was designed to help school attorneys and administrators in handling the termination process as fairly and efficiently as possible. The monograph begins with articles on documentation, evaluation, and…
Naville, Magali; Gautheret, Daniel
2010-01-01
Bacterial transcription attenuation occurs through a variety of cis-regulatory elements that control gene expression in response to a wide range of signals. The signal-sensing structures in attenuators are so diverse and rapidly evolving that only a small fraction have been properly annotated and characterized to date. Here we apply a broad-spectrum detection tool in order to achieve a more complete view of the transcriptional attenuation complement of key bacterial species. Our protocol seeks gene families with an unusual frequency of 5' terminators found across multiple species. Many of the detected attenuators are part of annotated elements, such as riboswitches or T-boxes, which often operate through transcriptional attenuation. However, a significant fraction of candidates were not previously characterized in spite of their unmistakable footprint. We further characterized some of these new elements using sequence and secondary structure analysis. We also present elements that may control the expression of several non-homologous genes, suggesting co-transcription and response to common signals. An important class of such elements, which we called mobile attenuators, is provided by 3' terminators of insertion sequences or prophages that may be exapted as 5' regulators when inserted directly upstream of a cellular gene. We show here that attenuators involve a complex landscape of signal-detection structures spanning the entire bacterial domain. We discuss possible scenarios through which these diverse 5' regulatory structures may arise or evolve.
Reading and Writing Difficulties--A Problem? EMIR Education and Research.
ERIC Educational Resources Information Center
Ericson, Britta, Ed.
This collection of essays contains a brief description of the symptoms of dyslexia and a definition of the terminology. The meaning of being the mother of a dyslexic child and how to live with this "hidden handicap" are also described. Suggestions regarding how to treat persons with reading and writing difficulties are put forward. After…
ERIC Educational Resources Information Center
Hsieh, Hsiu-Fang; Wang, Jing-Jy; Yen, Maiofen; Liu, Tzu-Ti
2009-01-01
Institutionalized elderly who are frail and dependent are vulnerable to be abused by overwhelmed caregivers especially caregiver psychological abusive behavior is a growing but hidden problem with few evidence-based interventions. The purpose of this study was to examine the effectiveness of an educational support group in alleviating caregiver's…
Hidden Challenges to Education Systems in Transition Economies.
ERIC Educational Resources Information Center
Berryman, Sue E.
This book, published by the World Bank, sounds the alarm for education in Europe and Central Asia (ECA). It describes how the transition from communism to free-market economies has left many countries' educational systems in disarray. At the start of transition, ECA education systems had solved problems that plagued other regions of the world,…
W 4 toda example as hidden Liouville CFT
NASA Astrophysics Data System (ADS)
Furlan, P.; Petkova, V. B.
2017-03-01
We construct correlators in the W 4 Toda 2d conformal field theory for a particular class of representations and demonstrate a relation to a W 2 (Virasoro) theory with different central charge. The relevance of the classical limits of the constructed 3-point functions and braiding matrices to problems in 4d conformal theories is discussed.
NASA Astrophysics Data System (ADS)
Aldrin, John C.; Wertz, John N.; Welter, John T.; Wallentine, Sarah; Lindgren, Eric A.; Kramb, Victoria; Zainey, David
2018-04-01
In this study, the use of angled-beam ultrasonic NDE was explored for the potential characterization of the hidden regions of impact damage in composites. Simulated studies using CIVA FIDEL 2D were used to explore this inspection problem. Quasi-shear (qS) modes can be generated over a wide range of angles and used to reflect off the backwall and interrogate under the top delaminations of impact damage. Secondary probe signals that do propagate normal to the surface were found to be significant under certain probe conditions, and can potentially interfere with weakly scattered signals from within the composite panel. Simulations were used to evaluate the source of the multiple paths of reflections from the edge of a delamination; time-of-flight and amplitude will depend on the depth of the delamination and location of neighboring delaminations. For angled-beam inspections, noise from both the top surface roughness and internal features was found to potentially mask the detection of signals from the edge of delaminations. Lastly, the study explored the potential of generating "guided" waves along the backwall using an angled-beam source and subsequently measuring scattered signals from a far surface crack hidden under a delamination.
Graviweak Unification, Invisible Universe and Dark Energy
NASA Astrophysics Data System (ADS)
Das, C. R.; Laperashvili, L. V.; Tureanu, A.
2013-07-01
We consider a graviweak unification model with the assumption of the existence of a hidden (invisible) sector of our Universe, parallel to the visible world. This Hidden World (HW) is assumed to be a Mirror World (MW) with broken mirror parity. We start with a diffeomorphism invariant theory of a gauge field valued in a Lie algebra g, which is broken spontaneously to the direct sum of the space-time Lorentz algebra and the Yang-Mills algebra: ˜ {g} = {{su}}(2) (grav)L ⊕ {{su}}(2)L — in the ordinary world, and ˜ {g}' = {{su}}(2){' (grav)}R ⊕ {{su}}(2)'R — in the hidden world. Using an extension of the Plebanski action for general relativity, we recover the actions for gravity, SU(2) Yang-Mills and Higgs fields in both (visible and invisible) sectors of the Universe, and also the total action. After symmetry breaking, all physical constants, including the Newton's constants, cosmological constants, Yang-Mills couplings, and other parameters, are determined by a single parameter g present in the initial action, and by the Higgs VEVs. The dark energy problem of this model predicts a too large supersymmetric breaking scale (MSUSY 1010GeV), which is not within the reach of the LHC experiments.
Double Higgs mechanisms, supermassive stable particles and the vacuum energy
NASA Astrophysics Data System (ADS)
Santillán, Osvaldo P.; Gabbanelli, Luciano
2016-07-01
In the present work, a hidden scenario which cast a long-lived superheavy particle A0 and simultaneously an extremely light particle a with mass ma ˜ 10-32-10-33 eV is presented. The potential energy V (a) of the particle a models the vacuum energy density of the universe ρc ≃ 10-47GeV4. On the other hand, the A0 particle may act as superheavy dark matter at present times and the products of its decay may be observed in high energy cosmic ray events. The hidden sector proposed here include light fermions with masses near the neutrino mass mν ˜ 10-2 eV and superheavy ones with masses of the order of the GUT scale, interacting through a hidden SU(2)L interaction which also affects the ordinary sector. The construction of such combined scenario is nontrivial since the presence of light particles may spoil the stability of the heavy particle A0. However, double Higgs mechanisms may be helpful for overcoming this problem. In this context, the stability of the superheavy particle A0 is ensured due to chiral symmetry arguments elaborated in the text.
Ferentinos, Konstantinos P
2005-09-01
Two neural network (NN) applications in the field of biological engineering are developed, designed and parameterized by an evolutionary method based on the evolutionary process of genetic algorithms. The developed systems are a fault detection NN model and a predictive modeling NN system. An indirect or 'weak specification' representation was used for the encoding of NN topologies and training parameters into genes of the genetic algorithm (GA). Some a priori knowledge of the demands in network topology for specific application cases is required by this approach, so that the infinite search space of the problem is limited to some reasonable degree. Both one-hidden-layer and two-hidden-layer network architectures were explored by the GA. Except for the network architecture, each gene of the GA also encoded the type of activation functions in both hidden and output nodes of the NN and the type of minimization algorithm that was used by the backpropagation algorithm for the training of the NN. Both models achieved satisfactory performance, while the GA system proved to be a powerful tool that can successfully replace the problematic trial-and-error approach that is usually used for these tasks.
Ni, Yepeng; Liu, Jianbo; Liu, Shan; Bai, Yaxin
2016-01-01
With the rapid development of smartphones and wireless networks, indoor location-based services have become more and more prevalent. Due to the sophisticated propagation of radio signals, the Received Signal Strength Indicator (RSSI) shows a significant variation during pedestrian walking, which introduces critical errors in deterministic indoor positioning. To solve this problem, we present a novel method to improve the indoor pedestrian positioning accuracy by embedding a fuzzy pattern recognition algorithm into a Hidden Markov Model. The fuzzy pattern recognition algorithm follows the rule that the RSSI fading has a positive correlation to the distance between the measuring point and the AP location even during a dynamic positioning measurement. Through this algorithm, we use the RSSI variation trend to replace the specific RSSI value to achieve a fuzzy positioning. The transition probability of the Hidden Markov Model is trained by the fuzzy pattern recognition algorithm with pedestrian trajectories. Using the Viterbi algorithm with the trained model, we can obtain a set of hidden location states. In our experiments, we demonstrate that, compared with the deterministic pattern matching algorithm, our method can greatly improve the positioning accuracy and shows robust environmental adaptability. PMID:27618053
Das, Raibatak; Cairo, Christopher W.; Coombs, Daniel
2009-01-01
The extraction of hidden information from complex trajectories is a continuing problem in single-particle and single-molecule experiments. Particle trajectories are the result of multiple phenomena, and new methods for revealing changes in molecular processes are needed. We have developed a practical technique that is capable of identifying multiple states of diffusion within experimental trajectories. We model single particle tracks for a membrane-associated protein interacting with a homogeneously distributed binding partner and show that, with certain simplifying assumptions, particle trajectories can be regarded as the outcome of a two-state hidden Markov model. Using simulated trajectories, we demonstrate that this model can be used to identify the key biophysical parameters for such a system, namely the diffusion coefficients of the underlying states, and the rates of transition between them. We use a stochastic optimization scheme to compute maximum likelihood estimates of these parameters. We have applied this analysis to single-particle trajectories of the integrin receptor lymphocyte function-associated antigen-1 (LFA-1) on live T cells. Our analysis reveals that the diffusion of LFA-1 is indeed approximately two-state, and is characterized by large changes in cytoskeletal interactions upon cellular activation. PMID:19893741
The Application of Survival Analysis to the Study of Psychotherapy Termination
ERIC Educational Resources Information Center
Corning, Alexadra F.; Malofeeva, Elena V.
2004-01-01
The state of the psychotherapy termination literature to date might best be characterized as inconclusive. Despite decades of studies, almost no predictors of premature termination have emerged consistently. An examination of this literature reveals a number of recurrent methodological-analytical problems that likely have contributed substantially…
The hidden web and the fentanyl problem: Detection of ocfentanil as an adulterant in heroin.
Quintana, Pol; Ventura, Mireia; Grifell, Marc; Palma, Alvaro; Galindo, Liliana; Fornís, Iván; Gil, Cristina; Carbón, Xoán; Caudevilla, Fernando; Farré, Magí; Torrens, Marta
2017-02-01
The popularization of anonymous markets such as Silk Road is challenging current drug policy and may provide a new context for old issues, such as adulteration of heroin with fentanyl derivatives. The aims of this paper are to report the presence of ocfentanil, a novel, potent, non-controlled fentanyl analog, in samples sold as heroin in the hidden web, and to summarize the effects reported by users. In 2015, four samples allegedly bought as heroin in cryptomarkets of the hidden web were sent to Energy Control for analysis. Energy Control is a Spanish harm reduction NGO that offers anonymous drug checking with the purpose of adapting counselling to the specific substances present in the drug and monitor the drug market. Identification was performed by GC/MS and LC/MS/MS. We contacted the submitters of the samples and performed an Internet search to retrieve additional information. One sample contained ocfentanil, caffeine and heroin. Three samples contained the aforementioned substances plus paracetamol. Two out of the four contacted users reported distinct short acting, opioid-like effects. No fora discussion could be found about the effects of ocfentanil, neither web pages nor individuals advertising the substance. We report the presence of a new substance detected in the hidden web as an adulterant of heroin, ocfentanil. It has short acting opioid-like effects, roughly the same potency as fentanyl, and can be injected, snorted or smoked. Severe side effects have been associated with its use, including one death. No discussion about this substance could be found in the Internet, which suggests this substance has not been sold as such. Available data about purities of drugs purchased in cryptomarkets suggest that adulteration is not a severe problem and this agrees with users' perceptions. However, this study suggests that adulteration is a real threat not only at the street level, but also for users that buy substances in cryptomarkets, and suggest the need for harm reduction initiatives in this setting. Copyright © 2016 Elsevier B.V. All rights reserved.
Software environment for implementing engineering applications on MIMD computers
NASA Technical Reports Server (NTRS)
Lopez, L. A.; Valimohamed, K. A.; Schiff, S.
1990-01-01
In this paper the concept for a software environment for developing engineering application systems for multiprocessor hardware (MIMD) is presented. The philosophy employed is to solve the largest problems possible in a reasonable amount of time, rather than solve existing problems faster. In the proposed environment most of the problems concerning parallel computation and handling of large distributed data spaces are hidden from the application program developer, thereby facilitating the development of large-scale software applications. Applications developed under the environment can be executed on a variety of MIMD hardware; it protects the application software from the effects of a rapidly changing MIMD hardware technology.
NASA Astrophysics Data System (ADS)
Sakakibara, Kazutoshi; Tian, Yajie; Nishikawa, Ikuko
We discuss the planning of transportation by trucks over a multi-day period. Each truck collects loads from suppliers and delivers them to assembly plants or a truck terminal. By exploiting the truck terminal as a temporal storage, we aim to increase the load ratio of each truck and to minimize the lead time for transportation. In this paper, we show a mixed integer programming model which represents each product explicitly, and discuss the decomposition of the problem into a problem of delivery and storage, and a problem of vehicle routing. Based on this model, we propose a relax-and-fix type heuristic in which decision variables are fixed one by one by mathematical programming techniques such as branch-and-bound methods.
Terminal Sliding Modes In Nonlinear Control Systems
NASA Technical Reports Server (NTRS)
Venkataraman, Subramanian T.; Gulati, Sandeep
1993-01-01
Control systems of proposed type called "terminal controllers" offers increased precision and stability of robotic operations in presence of unknown and/or changing parameters. Systems include special computer hardware and software implementing novel control laws involving terminal sliding modes of motion: closed-loop combination of robot and terminal controller converge, in finite time, to point of stable equilibrium in abstract space of velocity and/or position coordinates applicable to particular control problem.
The free fall of an apple: conceptual subtleties and implications for physics teaching
NASA Astrophysics Data System (ADS)
Assis, A. K. T.; Karam, R. A. S.
2018-05-01
The study of free fall is thoroughly present in physics teaching at all levels. From the point of view of Newtonian dynamics it appears to be extremely simple, as it consists of a two-body problem with a constant force generating a constant acceleration. However, there are several important conceptual subtleties and hidden assumptions involved in this problem, which are rarely discussed in educational settings. In this work we present some of these subtleties and argue that explicitly addressing them has significant pedagogical benefits.
NASA Astrophysics Data System (ADS)
Kogan, Ian I.
We discuss a quantum { U}q [sl(2)] symmetry in the Landau problem, which naturally arises due to the relation between { U}q [sl(2)] and the group of magnetic translations. The latter is connected with W∞ and area-preserving (symplectic) diffeomorphisms which are the canonical transformations in the two-dimensional phase space. We shall discuss the hidden quantum symmetry in a 2 + 1 gauge theory with the Chern-Simons term and in a quantum Hall system, which are both connected with the Landau problem.
Adhoc Wireless Network Control: Energy Efficiency and Hidden Terminal Considerations
2009-12-01
Pnl (t) +Bn(t), Emax ) , (57) Ynl(t+ 1) = [Ynl(t)−Rnl,in(t)] + + γnl(t), (58) Dn(t+ 1) = [Dn(t...1− δ)Bn(t)] + + ∑ l∈On Pnl (t), (59) subject to constraints Rnl,in(t) ≤ Vnl(t) +Anl(t) ∀n, l, t, P (t) ∈ PS(t), ∑ l∈On Pnl (t) ≤ min ( En(t), P̂ ) ∀n...γnl(t)] ∣ ∣ ∣ ∣ ∣ ∣ X(t) − 2E ∑ n,l [Unl(t)µnl (S(t),P (t))−Dn(t) Pnl (t)] ∣ ∣ ∣ ∣ ∣ ∣ X(t) − 2E ∑ n,l [ηYnl(t)−
McDonnell, Mark D.; Tissera, Migel D.; Vladusich, Tony; van Schaik, André; Tapson, Jonathan
2015-01-01
Recent advances in training deep (multi-layer) architectures have inspired a renaissance in neural network use. For example, deep convolutional networks are becoming the default option for difficult tasks on large datasets, such as image and speech recognition. However, here we show that error rates below 1% on the MNIST handwritten digit benchmark can be replicated with shallow non-convolutional neural networks. This is achieved by training such networks using the ‘Extreme Learning Machine’ (ELM) approach, which also enables a very rapid training time (∼ 10 minutes). Adding distortions, as is common practise for MNIST, reduces error rates even further. Our methods are also shown to be capable of achieving less than 5.5% error rates on the NORB image database. To achieve these results, we introduce several enhancements to the standard ELM algorithm, which individually and in combination can significantly improve performance. The main innovation is to ensure each hidden-unit operates only on a randomly sized and positioned patch of each image. This form of random ‘receptive field’ sampling of the input ensures the input weight matrix is sparse, with about 90% of weights equal to zero. Furthermore, combining our methods with a small number of iterations of a single-batch backpropagation method can significantly reduce the number of hidden-units required to achieve a particular performance. Our close to state-of-the-art results for MNIST and NORB suggest that the ease of use and accuracy of the ELM algorithm for designing a single-hidden-layer neural network classifier should cause it to be given greater consideration either as a standalone method for simpler problems, or as the final classification stage in deep neural networks applied to more difficult problems. PMID:26262687
Cascade Error Projection: A Learning Algorithm for Hardware Implementation
NASA Technical Reports Server (NTRS)
Duong, Tuan A.; Daud, Taher
1996-01-01
In this paper, we workout a detailed mathematical analysis for a new learning algorithm termed Cascade Error Projection (CEP) and a general learning frame work. This frame work can be used to obtain the cascade correlation learning algorithm by choosing a particular set of parameters. Furthermore, CEP learning algorithm is operated only on one layer, whereas the other set of weights can be calculated deterministically. In association with the dynamical stepsize change concept to convert the weight update from infinite space into a finite space, the relation between the current stepsize and the previous energy level is also given and the estimation procedure for optimal stepsize is used for validation of our proposed technique. The weight values of zero are used for starting the learning for every layer, and a single hidden unit is applied instead of using a pool of candidate hidden units similar to cascade correlation scheme. Therefore, simplicity in hardware implementation is also obtained. Furthermore, this analysis allows us to select from other methods (such as the conjugate gradient descent or the Newton's second order) one of which will be a good candidate for the learning technique. The choice of learning technique depends on the constraints of the problem (e.g., speed, performance, and hardware implementation); one technique may be more suitable than others. Moreover, for a discrete weight space, the theoretical analysis presents the capability of learning with limited weight quantization. Finally, 5- to 8-bit parity and chaotic time series prediction problems are investigated; the simulation results demonstrate that 4-bit or more weight quantization is sufficient for learning neural network using CEP. In addition, it is demonstrated that this technique is able to compensate for less bit weight resolution by incorporating additional hidden units. However, generation result may suffer somewhat with lower bit weight quantization.
McKim, James M.; Hartung, Thomas; Kleensang, Andre; Sá-Rocha, Vanessa
2016-01-01
Supervised learning methods promise to improve integrated testing strategies (ITS), but must be adjusted to handle high dimensionality and dose–response data. ITS approaches are currently fueled by the increasing mechanistic understanding of adverse outcome pathways (AOP) and the development of tests reflecting these mechanisms. Simple approaches to combine skin sensitization data sets, such as weight of evidence, fail due to problems in information redundancy and high dimension-ality. The problem is further amplified when potency information (dose/response) of hazards would be estimated. Skin sensitization currently serves as the foster child for AOP and ITS development, as legislative pressures combined with a very good mechanistic understanding of contact dermatitis have led to test development and relatively large high-quality data sets. We curated such a data set and combined a recursive variable selection algorithm to evaluate the information available through in silico, in chemico and in vitro assays. Chemical similarity alone could not cluster chemicals’ potency, and in vitro models consistently ranked high in recursive feature elimination. This allows reducing the number of tests included in an ITS. Next, we analyzed with a hidden Markov model that takes advantage of an intrinsic inter-relationship among the local lymph node assay classes, i.e. the monotonous connection between local lymph node assay and dose. The dose-informed random forest/hidden Markov model was superior to the dose-naive random forest model on all data sets. Although balanced accuracy improvement may seem small, this obscures the actual improvement in misclassifications as the dose-informed hidden Markov model strongly reduced "false-negatives" (i.e. extreme sensitizers as non-sensitizer) on all data sets. PMID:26046447
Luechtefeld, Thomas; Maertens, Alexandra; McKim, James M; Hartung, Thomas; Kleensang, Andre; Sá-Rocha, Vanessa
2015-11-01
Supervised learning methods promise to improve integrated testing strategies (ITS), but must be adjusted to handle high dimensionality and dose-response data. ITS approaches are currently fueled by the increasing mechanistic understanding of adverse outcome pathways (AOP) and the development of tests reflecting these mechanisms. Simple approaches to combine skin sensitization data sets, such as weight of evidence, fail due to problems in information redundancy and high dimensionality. The problem is further amplified when potency information (dose/response) of hazards would be estimated. Skin sensitization currently serves as the foster child for AOP and ITS development, as legislative pressures combined with a very good mechanistic understanding of contact dermatitis have led to test development and relatively large high-quality data sets. We curated such a data set and combined a recursive variable selection algorithm to evaluate the information available through in silico, in chemico and in vitro assays. Chemical similarity alone could not cluster chemicals' potency, and in vitro models consistently ranked high in recursive feature elimination. This allows reducing the number of tests included in an ITS. Next, we analyzed with a hidden Markov model that takes advantage of an intrinsic inter-relationship among the local lymph node assay classes, i.e. the monotonous connection between local lymph node assay and dose. The dose-informed random forest/hidden Markov model was superior to the dose-naive random forest model on all data sets. Although balanced accuracy improvement may seem small, this obscures the actual improvement in misclassifications as the dose-informed hidden Markov model strongly reduced " false-negatives" (i.e. extreme sensitizers as non-sensitizer) on all data sets. Copyright © 2015 John Wiley & Sons, Ltd.
Affective State Level Recognition in Naturalistic Facial and Vocal Expressions.
Meng, Hongying; Bianchi-Berthouze, Nadia
2014-03-01
Naturalistic affective expressions change at a rate much slower than the typical rate at which video or audio is recorded. This increases the probability that consecutive recorded instants of expressions represent the same affective content. In this paper, we exploit such a relationship to improve the recognition performance of continuous naturalistic affective expressions. Using datasets of naturalistic affective expressions (AVEC 2011 audio and video dataset, PAINFUL video dataset) continuously labeled over time and over different dimensions, we analyze the transitions between levels of those dimensions (e.g., transitions in pain intensity level). We use an information theory approach to show that the transitions occur very slowly and hence suggest modeling them as first-order Markov models. The dimension levels are considered to be the hidden states in the Hidden Markov Model (HMM) framework. Their discrete transition and emission matrices are trained by using the labels provided with the training set. The recognition problem is converted into a best path-finding problem to obtain the best hidden states sequence in HMMs. This is a key difference from previous use of HMMs as classifiers. Modeling of the transitions between dimension levels is integrated in a multistage approach, where the first level performs a mapping between the affective expression features and a soft decision value (e.g., an affective dimension level), and further classification stages are modeled as HMMs that refine that mapping by taking into account the temporal relationships between the output decision labels. The experimental results for each of the unimodal datasets show overall performance to be significantly above that of a standard classification system that does not take into account temporal relationships. In particular, the results on the AVEC 2011 audio dataset outperform all other systems presented at the international competition.
Dark matter versus Mach's principle.
NASA Astrophysics Data System (ADS)
von Borzeszkowski, H.-H.; Treder, H.-J.
1998-02-01
Empirical and theoretical evidence show that the astrophysical problem of dark matter might be solved by a theory of Einstein-Mayer type. In this theory up to global Lorentz rotations the reference system is determined by the motion of cosmic matter. Thus one is led to a "Riemannian space with teleparallelism" realizing a geometric version of the Mach-Einstein doctrine. The field equations of this gravitational theory contain hidden matter terms where the existence of hidden matter is inferred safely from its gravitational effects. It is argued that in the nonrelativistic mechanical approximation they provide an inertia-free mechanics where the inertial mass of a body is induced by the gravitational action of the comic masses. Interpreted form the Newtonian point of view this mechanics shows that the effective gravitational mass of astrophysical objects depends on r such that one expects the existence of dark matter.
Maximum likelihood: Extracting unbiased information from complex networks
NASA Astrophysics Data System (ADS)
Garlaschelli, Diego; Loffredo, Maria I.
2008-07-01
The choice of free parameters in network models is subjective, since it depends on what topological properties are being monitored. However, we show that the maximum likelihood (ML) principle indicates a unique, statistically rigorous parameter choice, associated with a well-defined topological feature. We then find that, if the ML condition is incompatible with the built-in parameter choice, network models turn out to be intrinsically ill defined or biased. To overcome this problem, we construct a class of safely unbiased models. We also propose an extension of these results that leads to the fascinating possibility to extract, only from topological data, the “hidden variables” underlying network organization, making them “no longer hidden.” We test our method on World Trade Web data, where we recover the empirical gross domestic product using only topological information.
A dual method for optimal control problems with initial and final boundary constraints.
NASA Technical Reports Server (NTRS)
Pironneau, O.; Polak, E.
1973-01-01
This paper presents two new algorithms belonging to the family of dual methods of centers. The first can be used for solving fixed time optimal control problems with inequality constraints on the initial and terminal states. The second one can be used for solving fixed time optimal control problems with inequality constraints on the initial and terminal states and with affine instantaneous inequality constraints on the control. Convergence is established for both algorithms. Qualitative reasoning indicates that the rate of convergence is linear.
SPEECH TO FACULTY OF HARVARD-BOSTON SUMMER PROGRAM AT PREPLANNING MEETINGS.
ERIC Educational Resources Information Center
HAIZLIP, HAROLD
THE AREA TO WHICH THIS GROUP OF TEACHERS WILL BE SENT IS CHARACTERIZED BY ITS LARGE INFLUX OF POOR NEGRO FAMILIES WITH POOR CULTURAL BACKGROUNDS. SOME OF THE PROBLEMS OF THIS AREA WILL REQUIRE A BROAD-SCALE, CAREFULLY ANALYZED, AND PLANNED ATTACK WITHIN AND BY PUBLIC SCHOOLS. EVERY SCHOOL HAS A HIDDEN OR SUBLIMINAL CURRICULUM WHICH TEACHES, IN…
Substance Abuse: A Hidden Problem within the D/deaf and Hard of Hearing Communities
ERIC Educational Resources Information Center
Guthmann, Debra; Graham, Vicki
2004-01-01
Current research indicates that D/deaf and hard of hearing clients seeking treatment for substance abuse often encounter obstacles in receiving the help they need. Many of these obstacles are the result of a lack of knowledge and experience with regard to treating D/deaf and hard of hearing people. Programs designed for hearing people that attempt…
ERIC Educational Resources Information Center
Gunzelmann, Betsy
2005-01-01
Safety in the schools involves much more than metal detectors and disaster plans. Although such catastrophe preparation is necessary, we often overlook less obvious beliefs and practices that put children's everyday safety at risk. According to the well-known pediatrician T. Berry Brazelton and the child psychiatrist Stanley Greenspan (2000), all…
ERIC Educational Resources Information Center
Yuksel, Sedat
2006-01-01
Student resistance can be a very important problem for the instructors in universities. Student resistance includes the conscious and preplanned behaviors towards the information presented to them in the classroom and the institutional practices. Typically, student resistance takes the form of passive or active non-compliance with roles and…
ERIC Educational Resources Information Center
Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.
2011-01-01
The Monitoring the Future (MTF) study involves an ongoing series of national surveys of American adolescents and adults that has provided the nation with a vital window into the important, but largely hidden, problem behaviors of illegal drug use, alcohol use, tobacco use, anabolic steroid use, and psychotherapeutic drug use. For more than a third…
Bianchini, Monica; Scarselli, Franco
2014-08-01
Recently, researchers in the artificial neural network field have focused their attention on connectionist models composed by several hidden layers. In fact, experimental results and heuristic considerations suggest that deep architectures are more suitable than shallow ones for modern applications, facing very complex problems, e.g., vision and human language understanding. However, the actual theoretical results supporting such a claim are still few and incomplete. In this paper, we propose a new approach to study how the depth of feedforward neural networks impacts on their ability in implementing high complexity functions. First, a new measure based on topological concepts is introduced, aimed at evaluating the complexity of the function implemented by a neural network, used for classification purposes. Then, deep and shallow neural architectures with common sigmoidal activation functions are compared, by deriving upper and lower bounds on their complexity, and studying how the complexity depends on the number of hidden units and the used activation function. The obtained results seem to support the idea that deep networks actually implements functions of higher complexity, so that they are able, with the same number of resources, to address more difficult problems.
Neural net classification of x-ray pistachio nut data
NASA Astrophysics Data System (ADS)
Casasent, David P.; Sipe, Michael A.; Schatzki, Thomas F.; Keagy, Pamela M.; Le, Lan Chau
1996-12-01
Classification results for agricultural products are presented using a new neural network. This neural network inherently produces higher-order decision surfaces. It achieves this with fewer hidden layer neurons than other classifiers require. This gives better generalization. It uses new techniques to select the number of hidden layer neurons and adaptive algorithms that avoid other such ad hoc parameter selection problems; it allows selection of the best classifier parameters without the need to analyze the test set results. The agriculture case study considered is the inspection and classification of pistachio nuts using x- ray imagery. Present inspection techniques cannot provide good rejection of worm damaged nuts without rejecting too many good nuts. X-ray imagery has the potential to provide 100% inspection of such agricultural products in real time. Only preliminary results are presented, but these indicate the potential to reduce major defects to 2% of the crop with 1% of good nuts rejected. Future image processing techniques that should provide better features to improve performance and allow inspection of a larger variety of nuts are noted. These techniques and variations of them have uses in a number of other agricultural product inspection problems.
Clustering Multivariate Time Series Using Hidden Markov Models
Ghassempour, Shima; Girosi, Federico; Maeder, Anthony
2014-01-01
In this paper we describe an algorithm for clustering multivariate time series with variables taking both categorical and continuous values. Time series of this type are frequent in health care, where they represent the health trajectories of individuals. The problem is challenging because categorical variables make it difficult to define a meaningful distance between trajectories. We propose an approach based on Hidden Markov Models (HMMs), where we first map each trajectory into an HMM, then define a suitable distance between HMMs and finally proceed to cluster the HMMs with a method based on a distance matrix. We test our approach on a simulated, but realistic, data set of 1,255 trajectories of individuals of age 45 and over, on a synthetic validation set with known clustering structure, and on a smaller set of 268 trajectories extracted from the longitudinal Health and Retirement Survey. The proposed method can be implemented quite simply using standard packages in R and Matlab and may be a good candidate for solving the difficult problem of clustering multivariate time series with categorical variables using tools that do not require advanced statistic knowledge, and therefore are accessible to a wide range of researchers. PMID:24662996
Detecting network communities beyond assortativity-related attributes
NASA Astrophysics Data System (ADS)
Liu, Xin; Murata, Tsuyoshi; Wakita, Ken
2014-07-01
In network science, assortativity refers to the tendency of links to exist between nodes with similar attributes. In social networks, for example, links tend to exist between individuals of similar age, nationality, location, race, income, educational level, religious belief, and language. Thus, various attributes jointly affect the network topology. An interesting problem is to detect community structure beyond some specific assortativity-related attributes ρ, i.e., to take out the effect of ρ on network topology and reveal the hidden community structures which are due to other attributes. An approach to this problem is to redefine the null model of the modularity measure, so as to simulate the effect of ρ on network topology. However, a challenge is that we do not know to what extent the network topology is affected by ρ and by other attributes. In this paper, we propose a distance modularity, which allows us to freely choose any suitable function to simulate the effect of ρ. Such freedom can help us probe the effect of ρ and detect the hidden communities which are due to other attributes. We test the effectiveness of distance modularity on synthetic benchmarks and two real-world networks.
Extracting duration information in a picture category decoding task using hidden Markov Models
NASA Astrophysics Data System (ADS)
Pfeiffer, Tim; Heinze, Nicolai; Frysch, Robert; Deouell, Leon Y.; Schoenfeld, Mircea A.; Knight, Robert T.; Rose, Georg
2016-04-01
Objective. Adapting classifiers for the purpose of brain signal decoding is a major challenge in brain-computer-interface (BCI) research. In a previous study we showed in principle that hidden Markov models (HMM) are a suitable alternative to the well-studied static classifiers. However, since we investigated a rather straightforward task, advantages from modeling of the signal could not be assessed. Approach. Here, we investigate a more complex data set in order to find out to what extent HMMs, as a dynamic classifier, can provide useful additional information. We show for a visual decoding problem that besides category information, HMMs can simultaneously decode picture duration without an additional training required. This decoding is based on a strong correlation that we found between picture duration and the behavior of the Viterbi paths. Main results. Decoding accuracies of up to 80% could be obtained for category and duration decoding with a single classifier trained on category information only. Significance. The extraction of multiple types of information using a single classifier enables the processing of more complex problems, while preserving good training results even on small databases. Therefore, it provides a convenient framework for online real-life BCI utilizations.
Hidden physics models: Machine learning of nonlinear partial differential equations
NASA Astrophysics Data System (ADS)
Raissi, Maziar; Karniadakis, George Em
2018-03-01
While there is currently a lot of enthusiasm about "big data", useful data is usually "small" and expensive to acquire. In this paper, we present a new paradigm of learning partial differential equations from small data. In particular, we introduce hidden physics models, which are essentially data-efficient learning machines capable of leveraging the underlying laws of physics, expressed by time dependent and nonlinear partial differential equations, to extract patterns from high-dimensional data generated from experiments. The proposed methodology may be applied to the problem of learning, system identification, or data-driven discovery of partial differential equations. Our framework relies on Gaussian processes, a powerful tool for probabilistic inference over functions, that enables us to strike a balance between model complexity and data fitting. The effectiveness of the proposed approach is demonstrated through a variety of canonical problems, spanning a number of scientific domains, including the Navier-Stokes, Schrödinger, Kuramoto-Sivashinsky, and time dependent linear fractional equations. The methodology provides a promising new direction for harnessing the long-standing developments of classical methods in applied mathematics and mathematical physics to design learning machines with the ability to operate in complex domains without requiring large quantities of data.
Termination of String Rewriting Rules that have One Pair of Overlaps
NASA Technical Reports Server (NTRS)
Geser, Alfons; Bushnell, Dennis M. (Technical Monitor)
2002-01-01
This paper presents a partial solution to the long standing open problem of termination of one-rule string rewriting. Overlaps between the two sides of the rule play a central role in existing termination criteria. We characterize termination of all one-rule string rewriting systems that have one such overlap at either end. This both completes a result of Kurth and generalizes a result of Shikishima-Tsuji et al.
Free terminal time optimal control problem of an HIV model based on a conjugate gradient method.
Jang, Taesoo; Kwon, Hee-Dae; Lee, Jeehyun
2011-10-01
The minimum duration of treatment periods and the optimal multidrug therapy for human immunodeficiency virus (HIV) type 1 infection are considered. We formulate an optimal tracking problem, attempting to drive the states of the model to a "healthy" steady state in which the viral load is low and the immune response is strong. We study an optimal time frame as well as HIV therapeutic strategies by analyzing the free terminal time optimal tracking control problem. The minimum duration of treatment periods and the optimal multidrug therapy are found by solving the corresponding optimality systems with the additional transversality condition for the terminal time. We demonstrate by numerical simulations that the optimal dynamic multidrug therapy can lead to the long-term control of HIV by the strong immune response after discontinuation of therapy.
Modeling of the Temperature Field Recovery in the Oil Pool
NASA Astrophysics Data System (ADS)
Khabibullin, I. L.; Davtetbaev, A. Ya.; Mar'in, D. F.; Khisamov, A. A.
2018-05-01
This paper considers the problem on mathematical modeling of the temperature field recovery in the oil pool upon termination of injection of water into the pool. The problem is broken down into two stages: injection of water and temperature and pressure recovery upon termination of injection. A review of the existing mathematical models is presented, analytical solutions for a number of cases have been constructed, and a comparison of the analytical solutions of different models has been made. In the general form, the expression has been obtained that permits determining the temperature change in the oil pool upon termination of injection of water (recovery of the temperature field).
Enhancing data locality by using terminal propagation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hendrickson, B.; Leland, R.; Van Driessche, R.
1995-12-31
Terminal propagation is a method developed in the circuit placement community for adding constraints to graph partitioning problems. This paper adapts and expands this idea, and applies it to the problem of partitioning data structures among the processors of a parallel computer. We show how the constraints in terminal propagation can be used to encourage partitions in which messages are communicated only between architecturally near processors. We then show how these constraints can be handled in two important partitioning algorithms, spectral bisection and multilevel-KL. We compare the quality of partitions generated by these algorithms to each other and to Partitionsmore » generated by more familiar techniques.« less
A flight research program to develop airborne systems for improved terminal area operations
NASA Technical Reports Server (NTRS)
Reeder, J. P.
1974-01-01
The research program considered is concerned with the solution of operational problems for the approximate time period from 1980 to 2000. The problems are related to safety, weather effects, congestion, energy conservation, noise, atmospheric pollution, and the loss in productivity caused by delays, diversions, and schedule stretchouts. The terminal configured vehicle (TCV) program is to develop advanced flight-control capability. The various aspects of the TCV program are discussed, giving attention to avionics equipment, the piloted simulator, terminal-area environment simulation, the Wallops research facility, flight procedures, displays and human factors, flight activities, and questions of vortex-wake reduction and tracking.
Effects of a Video Lottery Terminal (VLT) Banner on Gambling: A Field Study
ERIC Educational Resources Information Center
Gallagher, Timothy; Nicki, Richard; Otteson, Amy; Elliott, Heather
2011-01-01
The effects of a warning banner, informing patrons of the randomness of Video Lottery Terminal (VLT) outcomes, on gambling behaviour and beliefs were tested in a field setting using a mixed-model 2 x 3 design over a six-week period with 27 problem and 27 non-problem gamblers recruited from bars in a Canadian city with a population of 85,000.…
Mean-field theory of baryonic matter for QCD in the large Nc and heavy quark mass limits
NASA Astrophysics Data System (ADS)
Adhikari, Prabal; Cohen, Thomas D.
2013-11-01
We discuss theoretical issues pertaining to baryonic matter in the combined heavy-quark and large Nc limits of QCD. Witten's classic argument that baryons and interacting systems of baryons can be described in a mean-field approximation with each of the quarks moving in an average potential due to the remaining quarks is heuristic. It is important to justify this heuristic description for the case of baryonic matter since systems of interacting baryons are intrinsically more complicated than single baryons due to the possibility of hidden color states—states in which the subsystems making up the entire baryon crystal are not color-singlet nucleons but rather colorful states coupled together to make a color-singlet state. In this work, we provide a formal justification of this heuristic prescription. In order to do this, we start by taking the heavy quark limit, thus effectively reducing the problem to a many-body quantum mechanical system. This problem can be formulated in terms of integrals over coherent states, which for this problem are simple Slater determinants. We show that for the many-body problem, the support region for these integrals becomes narrow at large Nc, yielding an energy which is well approximated by a single coherent state—that is a mean-field description. Corrections to the energy are of relative order 1/Nc. While hidden color states are present in the exact state of the heavy quark system, they only influence the interaction energy below leading order in 1/Nc.
A note on the cracked plates reinforced by a line stiffener
NASA Technical Reports Server (NTRS)
Yahsi, O. S.; Erdogan, F.
1983-01-01
The problem of a cracked plate reinforced by a line stiffener is reconsidered. The original solution of this problem was given in the literature. Also, a variation of the problem with debonding between the plate and the stiffener near the cracked region was reported in the literature. However, the special case of the problem in which the crack tip terminates at the stiffener does not appear to have been studied. In practice, the solution may be necessary in order to assess the crack arrest effectiveness of the stiffener. The problem of a stiffened plate with a crack is reformulated, the asymptotic stress state near the crack tip terminating at the stiffener is examined, and numerical results are given for various stiffness constants.
NASA Technical Reports Server (NTRS)
Mcentire, K.
1994-01-01
NPLOT is an interactive computer graphics program for plotting undeformed and deformed NASTRAN finite element models (FEMs). Although there are many commercial codes already available for plotting FEMs, these have limited use due to their cost, speed, and lack of features to view BAR elements. NPLOT was specifically developed to overcome these limitations. On a vector type graphics device the two best ways to show depth are by hidden line plotting or haloed line plotting. A hidden line algorithm generates views of models with all hidden lines removed, and a haloed line algorithm displays views with aft lines broken in order to show depth while keeping the entire model visible. A haloed line algorithm is especially useful for plotting models composed of many line elements and few surface elements. The most important feature of NPLOT is its ability to create both hidden line and haloed line views accurately and much more quickly than with any other existing hidden or haloed line algorithms. NPLOT is also capable of plotting a normal wire frame view to display all lines of a model. NPLOT is able to aid in viewing all elements, but it has special features not generally available for plotting BAR elements. These features include plotting of TRUE LENGTH and NORMALIZED offset vectors and orientation vectors. Standard display operations such as rotation and perspective are possible, but different view planes such as X-Y, Y-Z, and X-Z may also be selected. Another display option is the Z-axis cut which allows a portion of the fore part of the model to be cut away to reveal details of the inside of the model. A zoom function is available to terminals with a locator (graphics cursor, joystick, etc.). The user interface of NPLOT is designed to make the program quick and easy to use. A combination of menus and commands with help menus for detailed information about each command allows experienced users greater speed and efficiency. Once a plot is on the screen the interface becomes command driven, enabling the user to manipulate the display or execute a command without having to return to the menu. NPLOT is also able to plot deformed shapes allowing it to perform post-processing. The program can read displacements, either static displacements or eigenvectors, from a MSC/NASTRAN F06 file or a UAI/NASTRAN PRT file. The displacements are written into a unformatted scratch file where they are available for rapid access when the user wishes to display a deformed shape. All subcases or mode shapes can be read in at once. Then it is easy to enable the deformed shape, to change subcases or mode shapes and to change the scale factor for subsequent plots. NPLOT is written in VAX FORTRAN for DEC VAX series computers running VMS. As distributed, the NPLOT source code makes calls to the DI3000 graphics package from Precision Visuals; however, a set of interface routines is provided to translate the DI3000 calls into Tektronix PLOT10/TCS graphics library calls so that NPLOT can use the standard Tektronix 4010 which many PC terminal emulation software programs support. NPLOT is available in VAX BACKUP format on a 9-track 1600 BPI DEC VAX BACKUP format magnetic tape (standard media) or a TK50 tape cartridge. This program was developed in 1991. DEC, VAX, VMS, and TK50 are trademarks of Digital Equipment Corporation. Tektronix, PLOT10, and TCS are trademarks of Tektronix, Inc. DI3000 is a registered trademark of Precision Visuals, Inc. NASTRAN is a registered trademark of the National Aeronautics and Space Administration. MSC/ is a trademark of MacNeal-Schwendler Corporation. UAI is a trademark of Universal Analytics, Inc.
NASA Technical Reports Server (NTRS)
Ghaffarian, Reza
2014-01-01
Bottom terminated components and quad flat no-lead (BTC/QFN) packages have been extensively used by commercial industry for more than a decade. Cost and performance advantages and the closeness of the packages to the boards make them especially unique for radio frequency (RF) applications. A number of high-reliability parts are now available in this style of package configuration. This report presents a summary of literature surveyed and provides a body of knowledge (BOK) gathered on the status of BTC/QFN and their advanced versions of multi-row QFN (MRQFN) packaging technologies. The report provides a comprehensive review of packaging trends and specifications on design, assembly, and reliability. Emphasis is placed on assembly reliability and associated key design and process parameters because they show lower life than standard leaded package assembly under thermal cycling exposures. Inspection of hidden solder joints for assuring quality is challenging and is similar to ball grid arrays (BGAs). Understanding the key BTC/QFN technology trends, applications, processing parameters, workmanship defects, and reliability behavior is important when judicially selecting and narrowing the follow-on packages for evaluation and testing, as well as for the low risk insertion in high-reliability applications.
Weak nanoscale chaos and anomalous relaxation in DNA
NASA Astrophysics Data System (ADS)
Mazur, Alexey K.
2017-06-01
Anomalous nonexponential relaxation in hydrated biomolecules is commonly attributed to the complexity of the free-energy landscapes, similarly to polymers and glasses. It was found recently that the hydrogen-bond breathing of terminal DNA base pairs exhibits a slow power-law relaxation attributable to weak Hamiltonian chaos, with parameters similar to experimental data. Here, the relationship is studied between this motion and spectroscopic signals measured in DNA with a small molecular photoprobe inserted into the base-pair stack. To this end, the earlier computational approach in combination with an analytical theory is applied to the experimental DNA fragment. It is found that the intensity of breathing dynamics is strongly increased in the internal base pairs that flank the photoprobe, with anomalous relaxation quantitatively close to that in terminal base pairs. A physical mechanism is proposed to explain the coupling between the relaxation of base-pair breathing and the experimental response signal. It is concluded that the algebraic relaxation observed experimentally is very likely a manifestation of weakly chaotic dynamics of hydrogen-bond breathing in the base pairs stacked to the photoprobe and that the weak nanoscale chaos can represent an ubiquitous hidden source of nonexponential relaxation in ultrafast spectroscopy.
Weak nanoscale chaos and anomalous relaxation in DNA.
Mazur, Alexey K
2017-06-01
Anomalous nonexponential relaxation in hydrated biomolecules is commonly attributed to the complexity of the free-energy landscapes, similarly to polymers and glasses. It was found recently that the hydrogen-bond breathing of terminal DNA base pairs exhibits a slow power-law relaxation attributable to weak Hamiltonian chaos, with parameters similar to experimental data. Here, the relationship is studied between this motion and spectroscopic signals measured in DNA with a small molecular photoprobe inserted into the base-pair stack. To this end, the earlier computational approach in combination with an analytical theory is applied to the experimental DNA fragment. It is found that the intensity of breathing dynamics is strongly increased in the internal base pairs that flank the photoprobe, with anomalous relaxation quantitatively close to that in terminal base pairs. A physical mechanism is proposed to explain the coupling between the relaxation of base-pair breathing and the experimental response signal. It is concluded that the algebraic relaxation observed experimentally is very likely a manifestation of weakly chaotic dynamics of hydrogen-bond breathing in the base pairs stacked to the photoprobe and that the weak nanoscale chaos can represent an ubiquitous hidden source of nonexponential relaxation in ultrafast spectroscopy.
NASA Technical Reports Server (NTRS)
Ghaffarian, Reza
2014-01-01
Bottom terminated components and quad flat no-lead (BTC/QFN) packages have been extensively used by commercial industry for more than a decade. Cost and performance advantages and the closeness of the packages to the boards make them especially unique for radio frequency (RF) applications. A number of high-reliability parts are now available in this style of package configuration. This report presents a summary of literature surveyed and provides a body of knowledge (BOK) gathered on the status of BTC/QFN and their advanced versions of multi-row QFN (MRQFN) packaging technologies. The report provides a comprehensive review of packaging trends and specifications on design, assembly, and reliability. Emphasis is placed on assembly reliability and associated key design and process parameters because they show lower life than standard leaded package assembly under thermal cycling exposures. Inspection of hidden solder joints for assuring quality is challenging and is similar to ball grid arrays (BGAs). Understanding the key BTC/QFN technology trends, applications, processing parameters, workmanship defects, and reliability behavior is important when judicially selecting and narrowing the follow-on packages for evaluation and testing, as well as for the low risk insertion in high-reliability applications.
Screening of the aerodynamic and biophysical properties of barley malt
NASA Astrophysics Data System (ADS)
Ghodsvali, Alireza; Farzaneh, Vahid; Bakhshabadi, Hamid; Zare, Zahra; Karami, Zahra; Mokhtarian, Mohsen; Carvalho, Isabel. S.
2016-10-01
An understanding of the aerodynamic and biophysical properties of barley malt is necessary for the appropriate design of equipment for the handling, shipping, dehydration, grading, sorting and warehousing of this strategic crop. Malting is a complex biotechnological process that includes steeping; germination and finally, the dehydration of cereal grains under controlled temperature and humidity conditions. In this investigation, the biophysical properties of barley malt were predicted using two models of artificial neural networks as well as response surface methodology. Stepping time and germination time were selected as the independent variables and 1 000 kernel weight, kernel density and terminal velocity were selected as the dependent variables (responses). The obtained outcomes showed that the artificial neural network model, with a logarithmic sigmoid activation function, presents more precise results than the response surface model in the prediction of the aerodynamic and biophysical properties of produced barley malt. This model presented the best result with 8 nodes in the hidden layer and significant correlation coefficient values of 0.783, 0.767 and 0.991 were obtained for responses one thousand kernel weight, kernel density, and terminal velocity, respectively. The outcomes indicated that this novel technique could be successfully applied in quantitative and qualitative monitoring within the malting process.
Hidden momentum of electrons, nuclei, atoms, and molecules
NASA Astrophysics Data System (ADS)
Cameron, Robert P.; Cotter, J. P.
2018-04-01
We consider the positions and velocities of electrons and spinning nuclei and demonstrate that these particles harbour hidden momentum when located in an electromagnetic field. This hidden momentum is present in all atoms and molecules, however it is ultimately canceled by the momentum of the electromagnetic field. We point out that an electron vortex in an electric field might harbour a comparatively large hidden momentum and recognize the phenomenon of hidden hidden momentum.
NASA aviation safety reporting system
NASA Technical Reports Server (NTRS)
1977-01-01
A decline in reports concerning small aircraft was noted; more reports involved transport aircraft, professional pilots, instrument meteorological conditions, and weather problems. A study of 136 reports of operational problems in terminal radar service areas was made. Pilot, controller, and system factors were found to be associated with these occurrences. Information transfer difficulties were prominent. Misunderstandings by pilots, and in some cases by controllers, of the policies and limitations of terminal radar programs were observed.
NASA Technical Reports Server (NTRS)
Golias, Mihalis M.
2011-01-01
Berth scheduling is a critical function at marine container terminals and determining the best berth schedule depends on several factors including the type and function of the port, size of the port, location, nearby competition, and type of contractual agreement between the terminal and the carriers. In this paper we formulate the berth scheduling problem as a bi-objective mixed-integer problem with the objective to maximize customer satisfaction and reliability of the berth schedule under the assumption that vessel handling times are stochastic parameters following a discrete and known probability distribution. A combination of an exact algorithm, a Genetic Algorithms based heuristic and a simulation post-Pareto analysis is proposed as the solution approach to the resulting problem. Based on a number of experiments it is concluded that the proposed berth scheduling policy outperforms the berth scheduling policy where reliability is not considered.
Sonnewald, Uwe
2011-01-01
Many plant viruses encode for specialized movement proteins (MP) to facilitate passage of viral material to and through plasmodesmata (PD). To analyze intracellular trafficking of potato leaf roll virus (PLRV) movement protein (MP17) we performed GFP fusion experiments with distinct deletion variants of MP17. These studies revealed that the C-terminus of MP17 is essential but not sufficient for PD targeting. Interestingly, fusion of GFP to three C-terminal MP17 deletion variants resulted in the accumulation of GFP in chloroplasts. This indicates that MP17 harbors hidden plastid targeting sequences. Previous studies showed that posttranslational protein phosphorylation influences PD targeting of MP and virus spread. Analysis of MP17-derived phospho-peptides by mass spectrometry revealed four phosphorylated serine residues (S71, S79, S137, and S140). Site-directed mutagenesis of S71/S79 and S137/S140 showed that the C-terminal serine residues S137/S140 are dispensable for PD targeting. However, exchange of S71/S79 to A71/A79 abolished PD targeting of the mutated MP17 protein. To mimic phosphorylation of S71/S79 both amino acids were substituted by aspartic acid. The resulting D71/D79 variant of MP17 was efficiently targeted to PD. Further deletion analysis showed that PD targeting of MP17 is dependent on the C-terminus, phosphorylation of S71 and/or S79 and a N-terminal domain. PMID:22645527
The Hidden Diversity of Flagellated Protists in Soil.
Venter, Paul Christiaan; Nitsche, Frank; Arndt, Hartmut
2018-07-01
Protists are among the most diverse and abundant eukaryotes in soil. However, gaps between described and sequenced protist morphospecies still present a pending problem when surveying environmental samples for known species using molecular methods. The number of sequences in the molecular PR 2 database (∼130,000) is limited compared to the species richness expected (>1 million protist species) - limiting the recovery rate. This is important, since high throughput sequencing (HTS) methods are used to find associative patterns between functional traits, taxa and environmental parameters. We performed HTS to survey soil flagellates in 150 grasslands of central Europe, and tested the recovery rate of ten previously isolated and cultivated cercomonad species, among locally found diversity. We recovered sequences for reference soil flagellate species, but also a great number of their phylogenetically evaluated genetic variants, among rare and dominant taxa with presumably own biogeography. This was recorded among dominant (cercozoans, Sandona), rare (apusozoans) and a large hidden diversity of predominantly aquatic protists in soil (choanoflagellates, bicosoecids) often forming novel clades associated with uncultured environmental sequences. Evaluating the reads, instead of the OTUs that individual reads are usually clustered into, we discovered that much of this hidden diversity may be lost due to clustering. Copyright © 2018 Elsevier GmbH. All rights reserved.
A Hidden Markov Model for Urban-Scale Traffic Estimation Using Floating Car Data.
Wang, Xiaomeng; Peng, Ling; Chi, Tianhe; Li, Mengzhu; Yao, Xiaojing; Shao, Jing
2015-01-01
Urban-scale traffic monitoring plays a vital role in reducing traffic congestion. Owing to its low cost and wide coverage, floating car data (FCD) serves as a novel approach to collecting traffic data. However, sparse probe data represents the vast majority of the data available on arterial roads in most urban environments. In order to overcome the problem of data sparseness, this paper proposes a hidden Markov model (HMM)-based traffic estimation model, in which the traffic condition on a road segment is considered as a hidden state that can be estimated according to the conditions of road segments having similar traffic characteristics. An algorithm based on clustering and pattern mining rather than on adjacency relationships is proposed to find clusters with road segments having similar traffic characteristics. A multi-clustering strategy is adopted to achieve a trade-off between clustering accuracy and coverage. Finally, the proposed model is designed and implemented on the basis of a real-time algorithm. Results of experiments based on real FCD confirm the applicability, accuracy, and efficiency of the model. In addition, the results indicate that the model is practicable for traffic estimation on urban arterials and works well even when more than 70% of the probe data are missing.
Hidden Markov induced Dynamic Bayesian Network for recovering time evolving gene regulatory networks
NASA Astrophysics Data System (ADS)
Zhu, Shijia; Wang, Yadong
2015-12-01
Dynamic Bayesian Networks (DBN) have been widely used to recover gene regulatory relationships from time-series data in computational systems biology. Its standard assumption is ‘stationarity’, and therefore, several research efforts have been recently proposed to relax this restriction. However, those methods suffer from three challenges: long running time, low accuracy and reliance on parameter settings. To address these problems, we propose a novel non-stationary DBN model by extending each hidden node of Hidden Markov Model into a DBN (called HMDBN), which properly handles the underlying time-evolving networks. Correspondingly, an improved structural EM algorithm is proposed to learn the HMDBN. It dramatically reduces searching space, thereby substantially improving computational efficiency. Additionally, we derived a novel generalized Bayesian Information Criterion under the non-stationary assumption (called BWBIC), which can help significantly improve the reconstruction accuracy and largely reduce over-fitting. Moreover, the re-estimation formulas for all parameters of our model are derived, enabling us to avoid reliance on parameter settings. Compared to the state-of-the-art methods, the experimental evaluation of our proposed method on both synthetic and real biological data demonstrates more stably high prediction accuracy and significantly improved computation efficiency, even with no prior knowledge and parameter settings.
Noninvasive Fetal ECG: the PhysioNet/Computing in Cardiology Challenge 2013.
Silva, Ikaro; Behar, Joachim; Sameni, Reza; Zhu, Tingting; Oster, Julien; Clifford, Gari D; Moody, George B
2013-03-01
The PhysioNet/CinC 2013 Challenge aimed to stimulate rapid development and improvement of software for estimating fetal heart rate (FHR), fetal interbeat intervals (FRR), and fetal QT intervals (FQT), from multichannel recordings made using electrodes placed on the mother's abdomen. For the challenge, five data collections from a variety of sources were used to compile a large standardized database, which was divided into training, open test, and hidden test subsets. Gold-standard fetal QRS and QT interval annotations were developed using a novel crowd-sourcing framework. The challenge organizers used the hidden test subset to evaluate 91 open-source software entries submitted by 53 international teams of participants in three challenge events, estimating FHR, FRR, and FQT using the hidden test subset, which was not available for study by participants. Two additional events required only user-submitted QRS annotations to evaluate FHR and FRR estimation accuracy using the open test subset available to participants. The challenge yielded a total of 91 open-source software entries. The best of these achieved average estimation errors of 187bpm 2 for FHR, 20.9 ms for FRR, and 152.7 ms for FQT. The open data sets, scoring software, and open-source entries are available at PhysioNet for researchers interested on working on these problems.
Implementation method of multi-terminal DC control system
NASA Astrophysics Data System (ADS)
Yi, Liu; Hao-Ran, Huang; Jun-Wen, Zhou; Hong-Guang, Guo; Yu-Yong, Zhou
2018-04-01
Currently the multi-terminal DC system (MTDC) has more stations. Each station needs operators to monitor and control the device. It needs much more operation and maintenance, low efficiency and small reliability; for the most important reason, multi-terminal DC system has complex control mode. If one of the stations has some problem, the control of the whole system should have problems. According to research of the characteristics of multi-terminal DC (VSC-MTDC) systems, this paper presents a strong implementation of the multi-terminal DC Supervisory Control and Data Acquisition (SCADA) system. This system is intelligent, can be networking, integration and intelligent. A master control system is added in each station to communication with the other stations to send current and DC voltage value to pole control system for each station. Based on the practical application and information feedback in the China South Power Grid research center VSC-MTDC project, this system is higher efficiency and save the cost on the maintenance of convertor station to improve the intelligent level and comprehensive effect. And because of the master control system, a multi-terminal system hierarchy coordination control strategy is formed, this make the control and protection system more efficiency and reliability.
Self-growing neural network architecture using crisp and fuzzy entropy
NASA Technical Reports Server (NTRS)
Cios, Krzysztof J.
1992-01-01
The paper briefly describes the self-growing neural network algorithm, CID3, which makes decision trees equivalent to hidden layers of a neural network. The algorithm generates a feedforward architecture using crisp and fuzzy entropy measures. The results for a real-life recognition problem of distinguishing defects in a glass ribbon, and for a benchmark problen of telling two spirals apart are shown and discussed.
ERIC Educational Resources Information Center
Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.
2006-01-01
In 2005, the Monitoring the Future study marked its 31st year of conducting national surveys of substance use among American young people. Beginning with the first survey of high school seniors in 1975, the study has provided the nation with a window through which to view the important, but largely hidden, problem behaviors of illicit drug use,…
Troublesome aspects of the Renyi-MaxEnt treatment.
Plastino, A; Rocca, M C; Pennini, F
2016-07-01
We study in great detail the possible existence of a Renyi-associated thermodynamics, with negative results. In particular, we uncover a hidden relation in Renyi's variational problem (MaxEnt). This relation connects the two associated Lagrange multipliers (canonical ensemble) with the mean energy 〈U〉 and the Renyi parameter α. As a consequence of such relation, we obtain anomalous Renyi-MaxEnt thermodynamic results.
ERIC Educational Resources Information Center
Montalvo, Frank F.
Failure to understand the role of skin color in the development of ethnoracial identity among Hispanic Americans has led to continued psychic and educational problems for them, hidden the cause of real and potential divisiveness in the community, and prevented the development of effective strategies for overcoming ethnic prejudice. The ethnic…
Parsimonious extreme learning machine using recursive orthogonal least squares.
Wang, Ning; Er, Meng Joo; Han, Min
2014-10-01
Novel constructive and destructive parsimonious extreme learning machines (CP- and DP-ELM) are proposed in this paper. By virtue of the proposed ELMs, parsimonious structure and excellent generalization of multiinput-multioutput single hidden-layer feedforward networks (SLFNs) are obtained. The proposed ELMs are developed by innovative decomposition of the recursive orthogonal least squares procedure into sequential partial orthogonalization (SPO). The salient features of the proposed approaches are as follows: 1) Initial hidden nodes are randomly generated by the ELM methodology and recursively orthogonalized into an upper triangular matrix with dramatic reduction in matrix size; 2) the constructive SPO in the CP-ELM focuses on the partial matrix with the subcolumn of the selected regressor including nonzeros as the first column while the destructive SPO in the DP-ELM operates on the partial matrix including elements determined by the removed regressor; 3) termination criteria for CP- and DP-ELM are simplified by the additional residual error reduction method; and 4) the output weights of the SLFN need not be solved in the model selection procedure and is derived from the final upper triangular equation by backward substitution. Both single- and multi-output real-world regression data sets are used to verify the effectiveness and superiority of the CP- and DP-ELM in terms of parsimonious architecture and generalization accuracy. Innovative applications to nonlinear time-series modeling demonstrate superior identification results.
Test results of smart aircraft fastener for KC-135 structural integrity
NASA Astrophysics Data System (ADS)
Schoess, Jeffrey N.; Seifert, Greg
1998-07-01
Hidden and inaccessible corrosion in aircraft structures is the number one logistics problem for the US Air Force, with an estimated maintenance cost in excess of $LR 1.0B per year in 1990-equivalent dollars. The Smart Aircraft Fastener Evaluation (SAFE) system was developed to provide early warning detection of corrosion-related symptoms in hidden locations of aircraft structures. The SAFE system incorporates an in situ measurement approach that measures and autonomously records several environmental conditions within a Hi-Lok aircraft fastener that could cause corrosion. The SAFE system integrates a miniature electrochemical microsensor array and a time-of-wetness sensor with an ultra low power 8-bit microcontroller and 4- Mbyte solid-state FLASH archival memory to measure evidence of active corrosion. A summary of the technical approach and a detailed analysis of the KC-135 lap joint test coupon results are presented.
Smart fastener for KC-135 structural integrity monitoring
NASA Astrophysics Data System (ADS)
Schoess, Jeffrey N.; Seifert, Greg
1997-06-01
Hidden and inaccessible corrosion in aircraft structures is the number-one logistics problem for the U.S. Air Force, with an estimated maintenance cost in excess of $DOL1.0 billion per year in 1990-equivalent dollars. The Smart Aircraft Fastener Evaluation (SAFE) system is being developed to provide early warning detection of corrosion- related symptoms in hidden locations of aircraft structures. The SAFE incorporates an in situ measurement approach that measures and autonomously records several environmental conditions (i.e., pH, temperature, chloride, free potential, time-of-wetness) within a Hi-Lok aircraft fastener that could cause corrosion to occur. The SAFE system integrates a miniature electrochemical microsensor array and a time-of- wetness sensor with an ultra-low-power 8-bit microcontroller and 5-Mbyte solid-state FLASH archival memory to measure the evidence of active corrosion. A summary of the technical approach, system design definition, software architecture, and future field test plans will be presented.
Passive Acoustic Leak Detection for Sodium Cooled Fast Reactors Using Hidden Markov Models
NASA Astrophysics Data System (ADS)
Marklund, A. Riber; Kishore, S.; Prakash, V.; Rajan, K. K.; Michel, F.
2016-06-01
Acoustic leak detection for steam generators of sodium fast reactors have been an active research topic since the early 1970s and several methods have been tested over the years. Inspired by its success in the field of automatic speech recognition, we here apply hidden Markov models (HMM) in combination with Gaussian mixture models (GMM) to the problem. To achieve this, we propose a new feature calculation scheme, based on the temporal evolution of the power spectral density (PSD) of the signal. Using acoustic signals recorded during steam/water injection experiments done at the Indira Gandhi Centre for Atomic Research (IGCAR), the proposed method is tested. We perform parametric studies on the HMM+GMM model size and demonstrate that the proposed method a) performs well without a priori knowledge of injection noise, b) can incorporate several noise models and c) has an output distribution that simplifies false alarm rate control.
Experimental entanglement distillation and 'hidden' non-locality.
Kwiat, P G; Barraza-Lopez, S; Stefanov, A; Gisin, N
2001-02-22
Entangled states are central to quantum information processing, including quantum teleportation, efficient quantum computation and quantum cryptography. In general, these applications work best with pure, maximally entangled quantum states. However, owing to dissipation and decoherence, practically available states are likely to be non-maximally entangled, partially mixed (that is, not pure), or both. To counter this problem, various schemes of entanglement distillation, state purification and concentration have been proposed. Here we demonstrate experimentally the distillation of maximally entangled states from non-maximally entangled inputs. Using partial polarizers, we perform a filtering process to maximize the entanglement of pure polarization-entangled photon pairs generated by spontaneous parametric down-conversion. We have also applied our methods to initial states that are partially mixed. After filtering, the distilled states demonstrate certain non-local correlations, as evidenced by their violation of a form of Bell's inequality. Because the initial states do not have this property, they can be said to possess 'hidden' non-locality.
ECG signal analysis through hidden Markov models.
Andreão, Rodrigo V; Dorizzi, Bernadette; Boudy, Jérôme
2006-08-01
This paper presents an original hidden Markov model (HMM) approach for online beat segmentation and classification of electrocardiograms. The HMM framework has been visited because of its ability of beat detection, segmentation and classification, highly suitable to the electrocardiogram (ECG) problem. Our approach addresses a large panel of topics some of them never studied before in other HMM related works: waveforms modeling, multichannel beat segmentation and classification, and unsupervised adaptation to the patient's ECG. The performance was evaluated on the two-channel QT database in terms of waveform segmentation precision, beat detection and classification. Our waveform segmentation results compare favorably to other systems in the literature. We also obtained high beat detection performance with sensitivity of 99.79% and a positive predictivity of 99.96%, using a test set of 59 recordings. Moreover, premature ventricular contraction beats were detected using an original classification strategy. The results obtained validate our approach for real world application.
Adaptive distributed source coding.
Varodayan, David; Lin, Yao-Chung; Girod, Bernd
2012-05-01
We consider distributed source coding in the presence of hidden variables that parameterize the statistical dependence among sources. We derive the Slepian-Wolf bound and devise coding algorithms for a block-candidate model of this problem. The encoder sends, in addition to syndrome bits, a portion of the source to the decoder uncoded as doping bits. The decoder uses the sum-product algorithm to simultaneously recover the source symbols and the hidden statistical dependence variables. We also develop novel techniques based on density evolution (DE) to analyze the coding algorithms. We experimentally confirm that our DE analysis closely approximates practical performance. This result allows us to efficiently optimize parameters of the algorithms. In particular, we show that the system performs close to the Slepian-Wolf bound when an appropriate doping rate is selected. We then apply our coding and analysis techniques to a reduced-reference video quality monitoring system and show a bit rate saving of about 75% compared with fixed-length coding.
Noise-tolerant parity learning with one quantum bit
NASA Astrophysics Data System (ADS)
Park, Daniel K.; Rhee, June-Koo K.; Lee, Soonchil
2018-03-01
Demonstrating quantum advantage with less powerful but more realistic devices is of great importance in modern quantum information science. Recently, a significant quantum speedup was achieved in the problem of learning a hidden parity function with noise. However, if all data qubits at the query output are completely depolarized, the algorithm fails. In this work, we present a quantum parity learning algorithm that exhibits quantum advantage as long as one qubit is provided with nonzero polarization in each query. In this scenario, the quantum parity learning naturally becomes deterministic quantum computation with one qubit. Then the hidden parity function can be revealed by performing a set of operations that can be interpreted as measuring nonlocal observables on the auxiliary result qubit having nonzero polarization and each data qubit. We also discuss the source of the quantum advantage in our algorithm from the resource-theoretic point of view.
NASA Astrophysics Data System (ADS)
Souleymanou, Abbagari; Thomas, B. Bouetou; Timoleon, C. Kofane
2013-08-01
The prolongation structure methodologies of Wahlquist—Estabrook [H.D. Wahlquist and F.B. Estabrook, J. Math. Phys. 16 (1975) 1] for nonlinear differential equations are applied to a more general set of coupled integrable dispersionless system. Based on the obtained prolongation structure, a Lie-Algebra valued connection of a closed ideal of exterior differential forms related to the above system is constructed. A Lie-Algebra representation of some hidden structural symmetries of the previous system, its Bäcklund transformation using the Riccati form of the linear eigenvalue problem and their general corresponding Lax-representation are derived. In the wake of the previous results, we extend the above prolongation scheme to higher-dimensional systems from which a new (2 + 1)-dimensional coupled integrable dispersionless system is unveiled along with its inverse scattering formulation, which applications are straightforward in nonlinear optics where additional propagating dimension deserves some attention.
Active semi-supervised learning method with hybrid deep belief networks.
Zhou, Shusen; Chen, Qingcai; Wang, Xiaolong
2014-01-01
In this paper, we develop a novel semi-supervised learning algorithm called active hybrid deep belief networks (AHD), to address the semi-supervised sentiment classification problem with deep learning. First, we construct the previous several hidden layers using restricted Boltzmann machines (RBM), which can reduce the dimension and abstract the information of the reviews quickly. Second, we construct the following hidden layers using convolutional restricted Boltzmann machines (CRBM), which can abstract the information of reviews effectively. Third, the constructed deep architecture is fine-tuned by gradient-descent based supervised learning with an exponential loss function. Finally, active learning method is combined based on the proposed deep architecture. We did several experiments on five sentiment classification datasets, and show that AHD is competitive with previous semi-supervised learning algorithm. Experiments are also conducted to verify the effectiveness of our proposed method with different number of labeled reviews and unlabeled reviews respectively.
Lebed, A G
2011-08-19
We solve a long-standing problem about a theoretical description of the upper critical magnetic field, parallel to conducting layers and perpendicular to conducting chains, in a (TMTSF)(2)ClO(4) superconductor. In particular, we explain why the experimental upper critical field, H(c2)(b')≃6 T, is higher than both the quasiclassical upper critical field and the Clogston paramagnetic limit. We show that this property is due to the coexistence of the hidden reentrant and Larkin-Ovchinnikov-Fulde-Ferrell phases in a magnetic field in the form of three plane waves with nonzero momenta of the Cooper pairs. Our results are in good qualitative and quantitative agreement with the recent experimental measurements of H(c2)(b') and support a singlet d-wave-like scenario of superconductivity in (TMTSF)(2)ClO(4). © 2011 American Physical Society
Analysis of Accuracy and Epoch on Back-propagation BFGS Quasi-Newton
NASA Astrophysics Data System (ADS)
Silaban, Herlan; Zarlis, Muhammad; Sawaluddin
2017-12-01
Back-propagation is one of the learning algorithms on artificial neural networks that have been widely used to solve various problems, such as pattern recognition, prediction and classification. The Back-propagation architecture will affect the outcome of learning processed. BFGS Quasi-Newton is one of the functions that can be used to change the weight of back-propagation. This research tested some back-propagation architectures using classical back-propagation and back-propagation with BFGS. There are 7 architectures that have been tested on glass dataset with various numbers of neurons, 6 architectures with 1 hidden layer and 1 architecture with 2 hidden layers. BP with BFGS improves the convergence of the learning process. The average improvement convergence is 98.34%. BP with BFGS is more optimal on architectures with smaller number of neurons with decreased epoch number is 94.37% with the increase of accuracy about 0.5%.
How should we question young children's understanding of aspectuality?
Waters, Gillian M; Beck, Sarah R
2012-09-01
In two experiments, we investigated whether 4- to 5-year-old children's ability to demonstrate their understanding of aspectuality was influenced by how the test question was phrased. In Experiment 1, 60 children chose whether to look or feel to gain information about a hidden object (identifiable by sight or touch). Test questions referred either to the perceptual aspect of the hidden object (e.g., whether it was red or blue), the modality dimension (e.g., what colour it was), or the object's identity (e.g., which one it was). Children who heard the identity question performed worse than those who heard the aspect or dimension question. Further investigation in Experiment 2 (N= 23) established that children's difficulty with the identity question was not due to a problem recalling the objects. We discuss how the results of these methodological investigations impact on researchers' assessment of the development of aspectuality understanding. ©2011 The British Psychological Society.
[Geriatric assessment. Development, status quo and perspectives].
Lüttje, D; Varwig, D; Teigel, B; Gilhaus, B
2011-08-01
Multimorbidity is typical for geriatric patients. Problems not identified in time may lead to increased hospitalisation or prolonged hospital stay. Problems of multimorbidity are not covered by most guidelines or clinical pathways. The geriatric assessment supports standard clinical and technical assessment. Geriatric identification screening is basic for general practitioners and in emergency rooms to filter those patients bearing a special risk. Geriatric basic assessment covers most of the problems relevant for people in old age, revealing even problems that had so far been hidden. It permits to structure a comprehensive and holistic therapeutic approach and to evaluate the targets of treatment relevant for independent living and well-being. This results in reduction of morbidity and mortality. Assessment tools focusing on pain, nutrition and frailty should be added to the standardized geriatric basic assessment in Germany.
Prospects for mirage mediation
NASA Astrophysics Data System (ADS)
Pierce, Aaron; Thaler, Jesse
2006-09-01
Mirage mediation reduces the fine-tuning in the minimal supersymmetric standard model by dynamically arranging a cancellation between anomaly-mediated and modulus-mediated supersymmetry breaking. We explore the conditions under which a mirage ``messenger scale'' is generated near the weak scale and the little hierarchy problem is solved. We do this by explicitly including the dynamics of the SUSY-breaking sector needed to cancel the cosmological constant. The most plausible scenario for generating a low mirage scale does not readily admit an extra-dimensional interpretation. We also review the possibilities for solving the μ/Bμ problem in such theories, a potential hidden source of fine-tuning.
Method and apparatus for obtaining complete speech signals for speech recognition applications
NASA Technical Reports Server (NTRS)
Abrash, Victor (Inventor); Cesari, Federico (Inventor); Franco, Horacio (Inventor); George, Christopher (Inventor); Zheng, Jing (Inventor)
2009-01-01
The present invention relates to a method and apparatus for obtaining complete speech signals for speech recognition applications. In one embodiment, the method continuously records an audio stream comprising a sequence of frames to a circular buffer. When a user command to commence or terminate speech recognition is received, the method obtains a number of frames of the audio stream occurring before or after the user command in order to identify an augmented audio signal for speech recognition processing. In further embodiments, the method analyzes the augmented audio signal in order to locate starting and ending speech endpoints that bound at least a portion of speech to be processed for recognition. At least one of the speech endpoints is located using a Hidden Markov Model.
A note on the cracked plates reinforced by a line stiffener
NASA Technical Reports Server (NTRS)
Yahsi, O. S.; Erdogan, F.
1983-01-01
The problem of a cracked plate reinforced by a line stiffener is reconsidered. The original solution of this problem was given in the literature. Also, a variation of the problem with debonding between the plate and the stiffener near the cracked region was reported in the literature. However, the special case of the problem in which the crack tip terminates at the stiffener does not appear to have been studied. In practice, the solution may be necessary in order to assess the crack arrest effectiveness of the stiffener. The problem of a stiffened plate with a crack is reformulated, the asymptotic stress state near the crack tip terminating at the stiffener is examined, and numerical results are given for various stiffness constants. Previously announced in STAR as N83-21388
Joint Source-Channel Decoding of Variable-Length Codes with Soft Information: A Survey
NASA Astrophysics Data System (ADS)
Guillemot, Christine; Siohan, Pierre
2005-12-01
Multimedia transmission over time-varying wireless channels presents a number of challenges beyond existing capabilities conceived so far for third-generation networks. Efficient quality-of-service (QoS) provisioning for multimedia on these channels may in particular require a loosening and a rethinking of the layer separation principle. In that context, joint source-channel decoding (JSCD) strategies have gained attention as viable alternatives to separate decoding of source and channel codes. A statistical framework based on hidden Markov models (HMM) capturing dependencies between the source and channel coding components sets the foundation for optimal design of techniques of joint decoding of source and channel codes. The problem has been largely addressed in the research community, by considering both fixed-length codes (FLC) and variable-length source codes (VLC) widely used in compression standards. Joint source-channel decoding of VLC raises specific difficulties due to the fact that the segmentation of the received bitstream into source symbols is random. This paper makes a survey of recent theoretical and practical advances in the area of JSCD with soft information of VLC-encoded sources. It first describes the main paths followed for designing efficient estimators for VLC-encoded sources, the key component of the JSCD iterative structure. It then presents the main issues involved in the application of the turbo principle to JSCD of VLC-encoded sources as well as the main approaches to source-controlled channel decoding. This survey terminates by performance illustrations with real image and video decoding systems.
Gatesy, John; Springer, Mark S
2014-11-01
Large datasets are required to solve difficult phylogenetic problems that are deep in the Tree of Life. Currently, two divergent systematic methods are commonly applied to such datasets: the traditional supermatrix approach (= concatenation) and "shortcut" coalescence (= coalescence methods wherein gene trees and the species tree are not co-estimated). When applied to ancient clades, these contrasting frameworks often produce congruent results, but in recent phylogenetic analyses of Placentalia (placental mammals), this is not the case. A recent series of papers has alternatively disputed and defended the utility of shortcut coalescence methods at deep phylogenetic scales. Here, we examine this exchange in the context of published phylogenomic data from Mammalia; in particular we explore two critical issues - the delimitation of data partitions ("genes") in coalescence analysis and hidden support that emerges with the combination of such partitions in phylogenetic studies. Hidden support - increased support for a clade in combined analysis of all data partitions relative to the support evident in separate analyses of the various data partitions, is a hallmark of the supermatrix approach and a primary rationale for concatenating all characters into a single matrix. In the most extreme cases of hidden support, relationships that are contradicted by all gene trees are supported when all of the genes are analyzed together. A valid fear is that shortcut coalescence methods might bypass or distort character support that is hidden in individual loci because small gene fragments are analyzed in isolation. Given the extensive systematic database for Mammalia, the assumptions and applicability of shortcut coalescence methods can be assessed with rigor to complement a small but growing body of simulation work that has directly compared these methods to concatenation. We document several remarkable cases of hidden support in both supermatrix and coalescence paradigms and argue that in most instances, the emergent support in the shortcut coalescence analyses is an artifact. By referencing rigorous molecular clock studies of Mammalia, we suggest that inaccurate gene trees that imply unrealistically deep coalescences debilitate shortcut coalescence analyses of the placental dataset. We document contradictory coalescence results for Placentalia, and outline a critical conundrum that challenges the general utility of shortcut coalescence methods at deep phylogenetic scales. In particular, the basic unit of analysis in coalescence analysis, the coalescence-gene, is expected to shrink in size as more taxa are analyzed, but as the amount of data for reconstruction of a gene tree ratchets downward, the number of nodes in the gene tree that need to be resolved ratchets upward. Some advocates of shortcut coalescence methods have attempted to address problems with inaccurate gene trees by concatenating multiple coalescence-genes to yield "gene trees" that better match the species tree. However, this hybrid concatenation/coalescence approach, "concatalescence," contradicts the most basic biological rationale for performing a coalescence analysis in the first place. We discuss this reality in the context of recent simulation work that also suggests inaccurate reconstruction of gene trees is more problematic for shortcut coalescence methods than deep coalescence of independently segregating loci is for concatenation methods. Copyright © 2014 Elsevier Inc. All rights reserved.
Air Traffic Control: Status of FAA's Standard Terminal Automation Replacement System Project
DOT National Transportation Integrated Search
1997-03-01
Since the early 1980s, FAA's modernization efforts have experienced lengthy : schedule delays and substantial cost overruns. Because of such problems, in : 1994, FAA restructured its acquisition of the Terminal Advanced Automation : System into more ...
Efficient free energy calculations by combining two complementary tempering sampling methods.
Xie, Liangxu; Shen, Lin; Chen, Zhe-Ning; Yang, Mingjun
2017-01-14
Although energy barriers can be efficiently crossed in the reaction coordinate (RC) guided sampling, this type of method suffers from identification of the correct RCs or requirements of high dimensionality of the defined RCs for a given system. If only the approximate RCs with significant barriers are used in the simulations, hidden energy barriers with small to medium height would exist in other degrees of freedom (DOFs) relevant to the target process and consequently cause the problem of insufficient sampling. To address the sampling in this so-called hidden barrier situation, here we propose an effective approach to combine temperature accelerated molecular dynamics (TAMD), an efficient RC-guided sampling method, with the integrated tempering sampling (ITS), a generalized ensemble sampling method. In this combined ITS-TAMD method, the sampling along the major RCs with high energy barriers is guided by TAMD and the sampling of the rest of the DOFs with lower but not negligible barriers is enhanced by ITS. The performance of ITS-TAMD to three systems in the processes with hidden barriers has been examined. In comparison to the standalone TAMD or ITS approach, the present hybrid method shows three main improvements. (1) Sampling efficiency can be improved at least five times even if in the presence of hidden energy barriers. (2) The canonical distribution can be more accurately recovered, from which the thermodynamic properties along other collective variables can be computed correctly. (3) The robustness of the selection of major RCs suggests that the dimensionality of necessary RCs can be reduced. Our work shows more potential applications of the ITS-TAMD method as the efficient and powerful tool for the investigation of a broad range of interesting cases.
Efficient free energy calculations by combining two complementary tempering sampling methods
NASA Astrophysics Data System (ADS)
Xie, Liangxu; Shen, Lin; Chen, Zhe-Ning; Yang, Mingjun
2017-01-01
Although energy barriers can be efficiently crossed in the reaction coordinate (RC) guided sampling, this type of method suffers from identification of the correct RCs or requirements of high dimensionality of the defined RCs for a given system. If only the approximate RCs with significant barriers are used in the simulations, hidden energy barriers with small to medium height would exist in other degrees of freedom (DOFs) relevant to the target process and consequently cause the problem of insufficient sampling. To address the sampling in this so-called hidden barrier situation, here we propose an effective approach to combine temperature accelerated molecular dynamics (TAMD), an efficient RC-guided sampling method, with the integrated tempering sampling (ITS), a generalized ensemble sampling method. In this combined ITS-TAMD method, the sampling along the major RCs with high energy barriers is guided by TAMD and the sampling of the rest of the DOFs with lower but not negligible barriers is enhanced by ITS. The performance of ITS-TAMD to three systems in the processes with hidden barriers has been examined. In comparison to the standalone TAMD or ITS approach, the present hybrid method shows three main improvements. (1) Sampling efficiency can be improved at least five times even if in the presence of hidden energy barriers. (2) The canonical distribution can be more accurately recovered, from which the thermodynamic properties along other collective variables can be computed correctly. (3) The robustness of the selection of major RCs suggests that the dimensionality of necessary RCs can be reduced. Our work shows more potential applications of the ITS-TAMD method as the efficient and powerful tool for the investigation of a broad range of interesting cases.
The hidden costs of coastal hazards: Implications for risk assessment and mitigation
Kunreuther, H.; Platt, R.; Baruch, S.; Bernknopf, R.L.; Buckley, M.; Burkett, V.; Conrad, D.; Davidson, T.; Deutsch, K.; Geis, D.; Jannereth, M.; Knap, A.; Lane, H.; Ljung, G.; McCauley, M.; Mileti, D.; Miller, T.; Morrow, B.; Meyers, J.; Pielke, R.; Pratt, A.; Tripp, J.
2000-01-01
Society has limited hazard mitigation dollars to invest. Which actions will be most cost effective, considering the true range of impacts and costs incurred? In 1997, the H. John Heinz III Center for Science, Economics and the Environment began a two-year study with a panel of experts to help develop new strategies to identify and reduce the costs of weather-related hazards associated with rapidly increasing coastal development activities.The Hidden Costs of Coastal Hazards presents the panel's findings, offering the first in-depth study that considers the costs of coastal hazards to natural resources, social institutions, business, and the built environment. Using Hurricane Hugo, which struck South Carolina in 1989, as a case study, it provides for the first time information on the full range of economic costs caused by a major coastal hazard event. The book:describes and examines unreported, undocumented, and hidden costs such as losses due to business interruption, reduction in property values, interruption of social services, psychological trauma, damage to natural systems, and othersexamines the concepts of risk and vulnerability, and discusses conventional approaches to risk assessment and the emerging area of vulnerability assessmentrecommends a comprehensive framework for developing and implementing mitigation strategiesdocuments the human impact of Hurricane Hugo and provides insight from those who lived through it.The Hidden Costs of Coastal Hazards takes a structured approach to the problem of coastal hazards, offering a new framework for community-based hazard mitigation along with specific recommendations for implementation. Decisionmakers -- both policymakers and planners -- who are interested in coastal hazard issues will find the book a unique source of new information and insight, as will private-sector decisionmakers including lenders, investors, developers, and insurers of coastal property.
Discrete optimal control approach to a four-dimensional guidance problem near terminal areas
NASA Technical Reports Server (NTRS)
Nagarajan, N.
1974-01-01
Description of a computer-oriented technique to generate the necessary control inputs to guide an aircraft in a given time from a given initial state to a prescribed final state subject to the constraints on airspeed, acceleration, and pitch and bank angles of the aircraft. A discrete-time mathematical model requiring five state variables and three control variables is obtained, assuming steady wind and zero sideslip. The guidance problem is posed as a discrete nonlinear optimal control problem with a cost functional of Bolza form. A solution technique for the control problem is investigated, and numerical examples are presented. It is believed that this approach should prove to be useful in automated air traffic control schemes near large terminal areas.
Perceived unmet need and barriers to care amongst street-involved people who use illicit drugs.
Hyshka, Elaine; Anderson, Jalene Tayler; Wild, T Cameron
2017-05-01
Research on perceived unmet need for care for mental health and substance use problems focuses on general populations to the detriment of hidden populations. This study describes prevalence and correlates of perceived unmet need for care in a community-based sample of street-involved people who use illicit drugs and identifies barriers to care. A sample of 320 street-involved people who use drugs participated in a structured, interviewer-assisted survey in Edmonton, Canada. The survey included the Perceived Need for Care Questionnaire, which assessed unmet need for care for mental health and substance use problems across seven service types. Logistic regression examined the associations between perceived unmet need, extent of socioeconomic marginalisation and problem severity. Barriers underlying unmet service needs were also examined. Most (82%) participants reported unmet need for one or more services during the past year. Odds of reporting one or more unmet needs were elevated amongst participants reporting substantial housing instability (adjusted odds ratio = 2.37; 95% confidence interval 1.19-4.28) and amongst participants meeting criteria for drug dependence (adjusted odds ratio = 1.22; 95% confidence interval 1.03-1.50), even after adjustment for sociodemographic covariates. Structural, rather than motivational barriers were the most commonly reported reasons underlying unmet service needs. Street-involved people who use drugs experience very high rates of perceived unmet need for care for mental health and substance use problems. General population studies on perceived unmet need are insufficient for understanding needs and barriers to care in hidden populations.[Hyshka E, Anderson JT, Wild TC. Perceived unmet need and barriers to care amongst street-involved people who use illicit drugs. Drug Alcohol Rev 2017;36:295-304]. © 2016 Australasian Professional Society on Alcohol and other Drugs.
A psychosocial profile of adolescent pregnancy termination patients.
Ely, Gretchen E; Dulmus, Catherine N
2008-01-01
This study examined the psychosocial problems of a sample of adolescent women who presented for a pregnancy termination appointment at a family planning clinic located in the southeastern region of the United States. The sample consisted of 120 adolescent women, age 14-21 who were administered the Multidimensional Adolescent Assessment Scale (MAAS) while waiting for their pregnancy termination procedure. The MAAS is a self-administered instrument with multiple subscales that measure a variety of psychosocial problems. Results indicated that most subjects did not score in the clinical range on the various subscales, thus indicating respondents as overall being stable and healthy. This paper reviews the specific findings from the study and discusses implications for practice and future research directions on this understudied population.
NASA Astrophysics Data System (ADS)
Rustamov, Samir; Mustafayev, Elshan; Clements, Mark A.
2018-04-01
The context analysis of customer requests in a natural language call routing problem is investigated in the paper. One of the most significant problems in natural language call routing is a comprehension of client request. With the aim of finding a solution to this issue, the Hybrid HMM and ANFIS models become a subject to an examination. Combining different types of models (ANFIS and HMM) can prevent misunderstanding by the system for identification of user intention in dialogue system. Based on these models, the hybrid system may be employed in various language and call routing domains due to nonusage of lexical or syntactic analysis in classification process.
Committee opinion no. 507: human trafficking.
2011-09-01
Human trafficking is a widespread problem with estimates ranging from 14,000 to 50,000 individuals trafficked into the United States annually. This hidden population involves the commercial sex industry, agriculture, factories, hotel and restaurant businesses, domestic workers, marriage brokers, and some adoption firms. Because 80% of trafficked individuals are women and girls, women’s health care providers may better serve their diverse patient population by increasing their awareness of this problem. The exploitation of people of any race, gender, sexual orientation, or ethnicity is unacceptable at any time, in any place. The members of the American College of Obstetricians and Gynecologists should be aware of this problem and strive to recognize and assist their patients who are victims or who have been victims of human trafficking.
Total Quality Management: A Guide to Implementation
1989-08-01
Kaizen. New York: Random House. 1986. Ishikawa , Kaoru . Guide to Quality Control. Asian Productivity Organization. 1984. Ishikawa , Kaoru . What is Total...with the problems and the new management principles are based on the complexities of the new Systems Age. The theories of Deming, Juran, Ishikawa , and...Progress. Jun 1985. Miller, Jeffery G. and Thomas E. Vollmann. "The Hidden Factory." Harvard Business Review. Sep-Oct 1985. Shimoyamada, Kaoru . "The
ERIC Educational Resources Information Center
Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.
2010-01-01
The Monitoring the Future (MTF) study is an ongoing series of national surveys of American adolescents and adults that has provided the nation with a vital window into the important, but largely hidden, problem behaviors of illegal drug use, alcohol use, tobacco use, anabolic steroid use, and psychotherapeutic drug use. For more than a third of…
Proposed Test of Relative Phase as Hidden Variable in Quantum Mechanics
2012-01-01
implicitly due to its ubiquity in quantum theory , but searches for dependence of measurement outcome on other parameters have been lacking. For a two -state...implemen- tation for the specific case of an atomic two -state system with laser-induced fluores- cence for measurement. Keywords Quantum measurement...Measurement postulate · Born rule 1 Introduction 1.1 Problems with Quantum Measurement Quantum theory prescribes probabilities for outcomes of measurements
Lymphogranuloma venereum: a hidden emerging problem, Barcelona, 2011.
Vargas-Leguas, H; Garcia de Olalla, P; Arando, M; Armengol, P; Barbera, Mj; Vall, M; Vives, A; Martin-Ezquerra, G; Alsina, M; Blanco, J; Munoz, C; Caballero, E; Andreu, A; Ros, M; Gorrindo, P; Dominguez, A; Cayla, Ja
2012-01-12
From the beginning of 2007 until the end of 2011, 146 cases of lymphogranuloma venereum (LGV) were notified to the Barcelona Public Health Agency. Some 49% of them were diagnosed and reported in 2011, mainly in men who have sex with men. Almost half of them, 32 cases, were reported between July and September. This cluster represents the largest since 2004. This article presents the ongoing outbreak of LGV in Barcelona.
ERIC Educational Resources Information Center
Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.
2005-01-01
In 2004 the Monitoring the Future study marked its 30th year of conducting national surveys of substance use among American young people. Beginning with the first survey of high school seniors in 1975, the study has provided the nation with a window through which to view the important, but largely hidden, problem behaviors of illicit drug use,…
ERIC Educational Resources Information Center
Pihl, Ole
2015-01-01
How do architecture students experience the contradictions between the individual and the group at the Department of Architecture and Design of Aalborg University? The Problem-Based Learning model has been extensively applied to the department's degree programs in coherence with the Integrated Design Process, but is a group-based architecture and…
Attentional Selection in Object Recognition
1993-02-01
order. It also affects the choice of strategies in both the 24 A Computational Model of Attentional Selection filtering and arbiter stages. The set...such processing. In Treisman’s model this was hidden in the concept of the selection filter . Later computational models of attention tried to...This thesis presents a novel approach to the selection problem by propos. ing a computational model of visual attentional selection as a paradigm for
ERIC Educational Resources Information Center
Johnston, Lloyd D.; O'Malley, Patrick M.; Bachman, Jerald G.; Schulenberg, John E.
2010-01-01
The Monitoring the Future (MTF) study is an ongoing series of national surveys of American adolescents and adults that has provided the nation with a vital window into the important, but largely hidden, problem behaviors of illegal drug use, alcohol use, tobacco use, anabolic steroid use, and psychotherapeutic drug use. For more than a third of a…
Search protocols for hidden forensic objects beneath floors and within walls.
Ruffell, Alastair; Pringle, Jamie K; Forbes, Shari
2014-04-01
The burial of objects (human remains, explosives, weapons) below or behind concrete, brick, plaster or tiling may be associated with serious crime and are difficult locations to search. These are quite common forensic search scenarios but little has been published on them to-date. Most documented discoveries are accidental or from suspect/witness testimony. The problem in locating such hidden objects means a random or chance-based approach is not advisable. A preliminary strategy is presented here, based on previous studies, augmented by primary research where new technology or applications are required. This blend allows a rudimentary search workflow, from remote desktop study, to non-destructive investigation through to recommendations as to how the above may inform excavation, demonstrated here with a case study from a homicide investigation. Published case studies on the search for human remains demonstrate the problems encountered when trying to find and recover sealed-in and sealed-over locations. Established methods include desktop study, photography, geophysics and search dogs: these are integrated with new technology (LiDAR and laser scanning; photographic rectification; close-quarter aerial imagery; ground-penetrating radar on walls and gamma-ray/neutron activation radiography) to propose this possible search strategy. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Binary space partitioning trees and their uses
NASA Technical Reports Server (NTRS)
Bell, Bradley N.
1989-01-01
Binary Space Partitioning (BSP) trees have some qualities that make them useful in solving many graphics related problems. The purpose is to describe what a BSP tree is, and how it can be used to solve the problem of hidden surface removal, and constructive solid geometry. The BSP tree is based on the idea that a plane acting as a divider subdivides space into two parts with one being on the positive side and the other on the negative. A polygonal solid is then represented as the volume defined by the collective interior half spaces of the solid's bounding surfaces. The nature of how the tree is organized lends itself well for sorting polygons relative to an arbitrary point in 3 space. The speed at which the tree can be traversed for depth sorting is fast enough to provide hidden surface removal at interactive speeds. The fact that a BSP tree actually represents a polygonal solid as a bounded volume also makes it quite useful in performing the boolean operations used in constructive solid geometry. Due to the nature of the BSP tree, polygons can be classified as they are subdivided. The ability to classify polygons as they are subdivided can enhance the simplicity of implementing constructive solid geometry.
Nonlinear inversion of electrical resistivity imaging using pruning Bayesian neural networks
NASA Astrophysics Data System (ADS)
Jiang, Fei-Bo; Dai, Qian-Wei; Dong, Li
2016-06-01
Conventional artificial neural networks used to solve electrical resistivity imaging (ERI) inversion problem suffer from overfitting and local minima. To solve these problems, we propose to use a pruning Bayesian neural network (PBNN) nonlinear inversion method and a sample design method based on the K-medoids clustering algorithm. In the sample design method, the training samples of the neural network are designed according to the prior information provided by the K-medoids clustering results; thus, the training process of the neural network is well guided. The proposed PBNN, based on Bayesian regularization, is used to select the hidden layer structure by assessing the effect of each hidden neuron to the inversion results. Then, the hyperparameter α k , which is based on the generalized mean, is chosen to guide the pruning process according to the prior distribution of the training samples under the small-sample condition. The proposed algorithm is more efficient than other common adaptive regularization methods in geophysics. The inversion of synthetic data and field data suggests that the proposed method suppresses the noise in the neural network training stage and enhances the generalization. The inversion results with the proposed method are better than those of the BPNN, RBFNN, and RRBFNN inversion methods as well as the conventional least squares inversion.
Adaptive Online Sequential ELM for Concept Drift Tackling
Basaruddin, Chan
2016-01-01
A machine learning method needs to adapt to over time changes in the environment. Such changes are known as concept drift. In this paper, we propose concept drift tackling method as an enhancement of Online Sequential Extreme Learning Machine (OS-ELM) and Constructive Enhancement OS-ELM (CEOS-ELM) by adding adaptive capability for classification and regression problem. The scheme is named as adaptive OS-ELM (AOS-ELM). It is a single classifier scheme that works well to handle real drift, virtual drift, and hybrid drift. The AOS-ELM also works well for sudden drift and recurrent context change type. The scheme is a simple unified method implemented in simple lines of code. We evaluated AOS-ELM on regression and classification problem by using concept drift public data set (SEA and STAGGER) and other public data sets such as MNIST, USPS, and IDS. Experiments show that our method gives higher kappa value compared to the multiclassifier ELM ensemble. Even though AOS-ELM in practice does not need hidden nodes increase, we address some issues related to the increasing of the hidden nodes such as error condition and rank values. We propose taking the rank of the pseudoinverse matrix as an indicator parameter to detect “underfitting” condition. PMID:27594879
Robust Hidden Markov Model based intelligent blood vessel detection of fundus images.
Hassan, Mehdi; Amin, Muhammad; Murtza, Iqbal; Khan, Asifullah; Chaudhry, Asmatullah
2017-11-01
In this paper, we consider the challenging problem of detecting retinal vessel networks. Precise detection of retinal vessel networks is vital for accurate eye disease diagnosis. Most of the blood vessel tracking techniques may not properly track vessels in presence of vessels' occlusion. Owing to problem in sensor resolution or acquisition of fundus images, it is possible that some part of vessel may occlude. In this scenario, it becomes a challenging task to accurately trace these vital vessels. For this purpose, we have proposed a new robust and intelligent retinal vessel detection technique on Hidden Markov Model. The proposed model is able to successfully track vessels in the presence of occlusion. The effectiveness of the proposed technique is evaluated on publically available standard DRIVE dataset of the fundus images. The experiments show that the proposed technique not only outperforms the other state of the art methodologies of retinal blood vessels segmentation, but it is also capable of accurate occlusion handling in retinal vessel networks. The proposed technique offers better average classification accuracy, sensitivity, specificity, and area under the curve (AUC) of 95.7%, 81.0%, 97.0%, and 90.0% respectively, which shows the usefulness of the proposed technique. Copyright © 2017 Elsevier B.V. All rights reserved.
Dynamic airspace configuration algorithms for next generation air transportation system
NASA Astrophysics Data System (ADS)
Wei, Jian
The National Airspace System (NAS) is under great pressure to safely and efficiently handle the record-high air traffic volume nowadays, and will face even greater challenge to keep pace with the steady increase of future air travel demand, since the air travel demand is projected to increase to two to three times the current level by 2025. The inefficiency of traffic flow management initiatives causes severe airspace congestion and frequent flight delays, which cost billions of economic losses every year. To address the increasingly severe airspace congestion and delays, the Next Generation Air Transportation System (NextGen) is proposed to transform the current static and rigid radar based system to a dynamic and flexible satellite based system. New operational concepts such as Dynamic Airspace Configuration (DAC) have been under development to allow more flexibility required to mitigate the demand-capacity imbalances in order to increase the throughput of the entire NAS. In this dissertation, we address the DAC problem in the en route and terminal airspace under the framework of NextGen. We develop a series of algorithms to facilitate the implementation of innovative concepts relevant with DAC in both the en route and terminal airspace. We also develop a performance evaluation framework for comprehensive benefit analyses on different aspects of future sector design algorithms. First, we complete a graph based sectorization algorithm for DAC in the en route airspace, which models the underlying air route network with a weighted graph, converts the sectorization problem into the graph partition problem, partitions the weighted graph with an iterative spectral bipartition method, and constructs the sectors from the partitioned graph. The algorithm uses a graph model to accurately capture the complex traffic patterns of the real flights, and generates sectors with high efficiency while evenly distributing the workload among the generated sectors. We further improve the robustness and efficiency of the graph based DAC algorithm by incorporating the Multilevel Graph Partitioning (MGP) method into the graph model, and develop a MGP based sectorization algorithm for DAC in the en route airspace. In a comprehensive benefit analysis, the performance of the proposed algorithms are tested in numerical simulations with Enhanced Traffic Management System (ETMS) data. Simulation results demonstrate that the algorithmically generated sectorizations outperform the current sectorizations in different sectors for different time periods. Secondly, based on our experience with DAC in the en route airspace, we further study the sectorization problem for DAC in the terminal airspace. The differences between the en route and terminal airspace are identified, and their influence on the terminal sectorization is analyzed. After adjusting the graph model to better capture the unique characteristics of the terminal airspace and the requirements of terminal sectorization, we develop a graph based geometric sectorization algorithm for DAC in the terminal airspace. Moreover, the graph based model is combined with the region based sector design method to better handle the complicated geometric and operational constraints in the terminal sectorization problem. In the benefit analysis, we identify the contributing factors to terminal controller workload, define evaluation metrics, and develop a bebefit analysis framework for terminal sectorization evaluation. With the evaluation framework developed, we demonstrate the improvements on the current sectorizations with real traffic data collected from several major international airports in the U.S., and conduct a detailed analysis on the potential benefits of dynamic reconfiguration in the terminal airspace. Finally, in addition to the research on the macroscopic behavior of a large number of aircraft, we also study the dynamical behavior of individual aircraft from the perspective of traffic flow management. We formulate the mode-confusion problem as hybrid estimation problem, and develop a state estimation algorithm for the linear hybrid system with continuous-state-dependent transitions based on sparse observations. We also develop an estimated time of arrival prediction algorithm based on the state-dependent transition hybrid estimation algorithm, whose performance is demonstrated with simulations on the landing procedure following the Continuous Descend Approach (CDA) profile.
Hall, Deborah A; Guest, Hannah; Prendergast, Garreth; Plack, Christopher J; Francis, Susan T
2018-01-01
Background Rodent studies indicate that noise exposure can cause permanent damage to synapses between inner hair cells and high-threshold auditory nerve fibers, without permanently altering threshold sensitivity. These demonstrations of what is commonly known as hidden hearing loss have been confirmed in several rodent species, but the implications for human hearing are unclear. Objective Our Medical Research Council–funded program aims to address this unanswered question, by investigating functional consequences of the damage to the human peripheral and central auditory nervous system that results from cumulative lifetime noise exposure. Behavioral and neuroimaging techniques are being used in a series of parallel studies aimed at detecting hidden hearing loss in humans. The planned neuroimaging study aims to (1) identify central auditory biomarkers associated with hidden hearing loss; (2) investigate whether there are any additive contributions from tinnitus or diminished sound tolerance, which are often comorbid with hearing problems; and (3) explore the relation between subcortical functional magnetic resonance imaging (fMRI) measures and the auditory brainstem response (ABR). Methods Individuals aged 25 to 40 years with pure tone hearing thresholds ≤20 dB hearing level over the range 500 Hz to 8 kHz and no contraindications for MRI or signs of ear disease will be recruited into the study. Lifetime noise exposure will be estimated using an in-depth structured interview. Auditory responses throughout the central auditory system will be recorded using ABR and fMRI. Analyses will focus predominantly on correlations between lifetime noise exposure and auditory response characteristics. Results This paper reports the study protocol. The funding was awarded in July 2013. Enrollment for the study described in this protocol commenced in February 2017 and was completed in December 2017. Results are expected in 2018. Conclusions This challenging and comprehensive study will have the potential to impact diagnostic procedures for hidden hearing loss, enabling early identification of noise-induced auditory damage via the detection of changes in central auditory processing. Consequently, this will generate the opportunity to give personalized advice regarding provision of ear defense and monitoring of further damage, thus reducing the incidence of noise-induced hearing loss. PMID:29523503
Algorithm 937: MINRES-QLP for Symmetric and Hermitian Linear Equations and Least-Squares Problems.
Choi, Sou-Cheng T; Saunders, Michael A
2014-02-01
We describe algorithm MINRES-QLP and its FORTRAN 90 implementation for solving symmetric or Hermitian linear systems or least-squares problems. If the system is singular, MINRES-QLP computes the unique minimum-length solution (also known as the pseudoinverse solution), which generally eludes MINRES. In all cases, it overcomes a potential instability in the original MINRES algorithm. A positive-definite pre-conditioner may be supplied. Our FORTRAN 90 implementation illustrates a design pattern that allows users to make problem data known to the solver but hidden and secure from other program units. In particular, we circumvent the need for reverse communication. Example test programs input and solve real or complex problems specified in Matrix Market format. While we focus here on a FORTRAN 90 implementation, we also provide and maintain MATLAB versions of MINRES and MINRES-QLP.
Location-allocation models and new solution methodologies in telecommunication networks
NASA Astrophysics Data System (ADS)
Dinu, S.; Ciucur, V.
2016-08-01
When designing a telecommunications network topology, three types of interdependent decisions are combined: location, allocation and routing, which are expressed by the following design considerations: how many interconnection devices - consolidation points/concentrators should be used and where should they be located; how to allocate terminal nodes to concentrators; how should the voice, video or data traffic be routed and what transmission links (capacitated or not) should be built into the network. Including these three components of the decision into a single model generates a problem whose complexity makes it difficult to solve. A first method to address the overall problem is the sequential one, whereby the first step deals with the location-allocation problem and based on this solution the subsequent sub-problem (routing the network traffic) shall be solved. The issue of location and allocation in a telecommunications network, called "The capacitated concentrator location- allocation - CCLA problem" is based on one of the general location models on a network in which clients/demand nodes are the terminals and facilities are the concentrators. Like in a location model, each client node has a demand traffic, which must be served, and the facilities can serve these demands within their capacity limit. In this study, the CCLA problem is modeled as a single-source capacitated location-allocation model whose optimization objective is to determine the minimum network cost consisting of fixed costs for establishing the locations of concentrators, costs for operating concentrators and costs for allocating terminals to concentrators. The problem is known as a difficult combinatorial optimization problem for which powerful algorithms are required. Our approach proposes a Fuzzy Genetic Algorithm combined with a local search procedure to calculate the optimal values of the location and allocation variables. To confirm the efficiency of the proposed algorithm with respect to the quality of solutions, significant size test problems were considered: up to 100 terminal nodes and 50 concentrators on a 100 × 100 square grid. The performance of this hybrid intelligent algorithm was evaluated by measuring the quality of its solutions with respect to the following statistics: the standard deviation and the ratio of the best solution obtained.
Nakagawa, Yumiko; Sawada, Sachiko; Tomiyama, Takashi; Ueda, Yuki; Fujii, Kou; Takeshita, Kiyotaka; Kobayashi, Mitsuru; Isono, Osamu
2014-12-01
Electronic medical records(EMR)for home visits were introduced in October 2013 at our institution in order to ensure smooth cooperation between the hospital and clinic by sharing the details of a patient's medical record. A system was developed for remote desktop connections to the EMR terminal server(virtual server)with the use of an SSL-VPN. Mobile terminals and mobile printers were used. Four months after the start of this system, a survey was conducted for 41 home care professionals and other staff(physicians, nurses, and office staff). Home care staff indicated that they had problems with the system, including bad connections and operating conditions, and difficulties responding to problems when they arose. Other staff indicated that they were able to acquire patient information faster than with paper-based records. Future issues include improvements to the user-friendliness of the terminals and improved responses to problems when they occur.
Lauridsen, S M R; Norup, M S; Rossel, P J H
2007-12-01
Rationing healthcare is a difficult task, which includes preventing patients from accessing potentially beneficial treatments. Proponents of implicit rationing argue that politicians cannot resist pressure from strong patient groups for treatments and conclude that physicians should ration without informing patients or the public. The authors subdivide this specific programme of implicit rationing, or "hidden rationing", into local hidden rationing, unsophisticated global hidden rationing and sophisticated global hidden rationing. They evaluate the appropriateness of these methods of rationing from the perspectives of individual and political autonomy and conclude that local hidden rationing and unsophisticated global hidden rationing clearly violate patients' individual autonomy, that is, their right to participate in medical decision-making. While sophisticated global hidden rationing avoids this charge, the authors point out that it nonetheless violates the political autonomy of patients, that is, their right to engage in public affairs as citizens. A defence of any of the forms of hidden rationing is therefore considered to be incompatible with a defence of autonomy.
Clinical Holistic Medicine: A Psychological Theory of Dependency to Improve Quality of Life
Ventegodt, Søren; Morad, Mohammed; Kandel, Isack; Merrick, Joav
2004-01-01
In this paper, we suggest a psychological theory of dependency as an escape from feeling existential suffering and a poor quality of life. The ways in which human beings escape hidden existential pains are multiple. The wide range of dependency states seems to be the most common escape strategy used. If the patient can be guided into the hidden existential pain to feel, understand, and integrate it, we believe that dependency can be cured. The problem is that the patient must be highly motivated, sufficiently resourceful, and supported to want such a treatment that is inherently painful. Often, the family and surrounding world is suffering more than the dependent person himself, because the pattern of behavior the patient is dependent on makes him or her rather insensitive and unable to feel. If the patient is motivated, resourceful, and trusts his physician, recovery from even a severe state of dependency is not out of reach, if the holistic medical tools are applied wisely. The patient must find hidden resources to take action, then in therapy confront and feel old emotional pain, understand the source and inner logic of it, and finally learn to let go of negative attitudes and beliefs. In this way, the person can be healed and released of the emotional suffering and no longer be a slave to the dependency pattern. PMID:15349506
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vongehr, Sascha, E-mail: vongehr@usc.edu
There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability,more » and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs.« less
Radar HRRP Target Recognition Based on Stacked Autoencoder and Extreme Learning Machine
Liu, Yongxiang; Huo, Kai; Zhang, Zhongshuai
2018-01-01
A novel radar high-resolution range profile (HRRP) target recognition method based on a stacked autoencoder (SAE) and extreme learning machine (ELM) is presented in this paper. As a key component of deep structure, the SAE does not only learn features by making use of data, it also obtains feature expressions at different levels of data. However, with the deep structure, it is hard to achieve good generalization performance with a fast learning speed. ELM, as a new learning algorithm for single hidden layer feedforward neural networks (SLFNs), has attracted great interest from various fields for its fast learning speed and good generalization performance. However, ELM needs more hidden nodes than conventional tuning-based learning algorithms due to the random set of input weights and hidden biases. In addition, the existing ELM methods cannot utilize the class information of targets well. To solve this problem, a regularized ELM method based on the class information of the target is proposed. In this paper, SAE and the regularized ELM are combined to make full use of their advantages and make up for each of their shortcomings. The effectiveness of the proposed method is demonstrated by experiments with measured radar HRRP data. The experimental results show that the proposed method can achieve good performance in the two aspects of real-time and accuracy, especially when only a few training samples are available. PMID:29320453
Radar HRRP Target Recognition Based on Stacked Autoencoder and Extreme Learning Machine.
Zhao, Feixiang; Liu, Yongxiang; Huo, Kai; Zhang, Shuanghui; Zhang, Zhongshuai
2018-01-10
A novel radar high-resolution range profile (HRRP) target recognition method based on a stacked autoencoder (SAE) and extreme learning machine (ELM) is presented in this paper. As a key component of deep structure, the SAE does not only learn features by making use of data, it also obtains feature expressions at different levels of data. However, with the deep structure, it is hard to achieve good generalization performance with a fast learning speed. ELM, as a new learning algorithm for single hidden layer feedforward neural networks (SLFNs), has attracted great interest from various fields for its fast learning speed and good generalization performance. However, ELM needs more hidden nodes than conventional tuning-based learning algorithms due to the random set of input weights and hidden biases. In addition, the existing ELM methods cannot utilize the class information of targets well. To solve this problem, a regularized ELM method based on the class information of the target is proposed. In this paper, SAE and the regularized ELM are combined to make full use of their advantages and make up for each of their shortcomings. The effectiveness of the proposed method is demonstrated by experiments with measured radar HRRP data. The experimental results show that the proposed method can achieve good performance in the two aspects of real-time and accuracy, especially when only a few training samples are available.
The ``Folk Theorem'' on effective field theory: How does it fare in nuclear physics?
NASA Astrophysics Data System (ADS)
Rho, Mannque
2017-10-01
This is a brief history of what I consider as very important, some of which truly seminal, contributions made by young Korean nuclear theorists, mostly graduate students working on PhD thesis in 1990s and early 2000s, to nuclear effective field theory, nowadays heralded as the first-principle approach to nuclear physics. The theoretical framework employed is an effective field theory anchored on a single scale-invariant hidden local symmetric Lagrangian constructed in the spirit of Weinberg's "Folk Theorem" on effective field theory. The problems addressed are the high-precision calculations on the thermal np capture, the solar pp fusion process, the solar hep process — John Bahcall's challenge to nuclear theorists — and the quenching of g A in giant Gamow-Teller resonances and the whopping enhancement of first-forbidden beta transitions relevant in astrophysical processes. Extending adventurously the strategy to a wild uncharted domain in which a systematic implementation of the "theorem" is far from obvious, the same effective Lagrangian is applied to the structure of compact stars. A surprising, unexpected, result on the properties of massive stars, totally different from what has been obtained up to day in the literature, is predicted, such as the precocious onset of conformal sound velocity together with a hint for the possible emergence in dense matter of hidden symmetries such as scale symmetry and hidden local symmetry.
ERIC Educational Resources Information Center
Walsh, Janet
1982-01-01
Discusses issues related to possible health hazards associated with viewing video display terminals. Includes some findings of the 1979 NIOSH report on Potential Hazards of Video Display Terminals indicating level of radiation emitted is low and providing recommendations related to glare and back pain/muscular fatigue problems. (JN)
Scheduling real-time, periodic jobs using imprecise results
NASA Technical Reports Server (NTRS)
Liu, Jane W. S.; Lin, Kwei-Jay; Natarajan, Swaminathan
1987-01-01
A process is called a monotone process if the accuracy of its intermediate results is non-decreasing as more time is spent to obtain the result. The result produced by a monotone process upon its normal termination is the desired result; the error in this result is zero. External events such as timeouts or crashes may cause the process to terminate prematurely. If the intermediate result produced by the process upon its premature termination is saved and made available, the application may still find the result unusable and, hence, acceptable; such a result is said to be an imprecise one. The error in an imprecise result is nonzero. The problem of scheduling periodic jobs to meet deadlines on a system that provides the necessary programming language primitives and run-time support for processes to return imprecise results is discussed. This problem differs from the traditional scheduling problems since the scheduler may choose to terminate a task before it is completed, causing it to produce an acceptable but imprecise result. Consequently, the amounts of processor time assigned to tasks in a valid schedule can be less than the amounts of time required to complete the tasks. A meaningful formulation of this problem taking into account the quality of the overall result is discussed. Three algorithms for scheduling jobs for which the effects of errors in results produced in different periods are not cumulative are described, and their relative merits are evaluated.
Lessons Learned from Managing a Petabyte
DOE Office of Scientific and Technical Information (OSTI.GOV)
Becla, J
2005-01-20
The amount of data collected and stored by the average business doubles each year. Many commercial databases are already approaching hundreds of terabytes, and at this rate, will soon be managing petabytes. More data enables new functionality and capability, but the larger scale reveals new problems and issues hidden in ''smaller'' terascale environments. This paper presents some of these new problems along with implemented solutions in the framework of a petabyte dataset for a large High Energy Physics experiment. Through experience with two persistence technologies, a commercial database and a file-based approach, we expose format-independent concepts and issues prevalent atmore » this new scale of computing.« less
Quantum learning of classical stochastic processes: The completely positive realization problem
NASA Astrophysics Data System (ADS)
Monràs, Alex; Winter, Andreas
2016-01-01
Among several tasks in Machine Learning, a specially important one is the problem of inferring the latent variables of a system and their causal relations with the observed behavior. A paradigmatic instance of this is the task of inferring the hidden Markov model underlying a given stochastic process. This is known as the positive realization problem (PRP), [L. Benvenuti and L. Farina, IEEE Trans. Autom. Control 49(5), 651-664 (2004)] and constitutes a central problem in machine learning. The PRP and its solutions have far-reaching consequences in many areas of systems and control theory, and is nowadays an important piece in the broad field of positive systems theory. We consider the scenario where the latent variables are quantum (i.e., quantum states of a finite-dimensional system) and the system dynamics is constrained only by physical transformations on the quantum system. The observable dynamics is then described by a quantum instrument, and the task is to determine which quantum instrument — if any — yields the process at hand by iterative application. We take as a starting point the theory of quasi-realizations, whence a description of the dynamics of the process is given in terms of linear maps on state vectors and probabilities are given by linear functionals on the state vectors. This description, despite its remarkable resemblance with the hidden Markov model, or the iterated quantum instrument, is however devoid of any stochastic or quantum mechanical interpretation, as said maps fail to satisfy any positivity conditions. The completely positive realization problem then consists in determining whether an equivalent quantum mechanical description of the same process exists. We generalize some key results of stochastic realization theory, and show that the problem has deep connections with operator systems theory, giving possible insight to the lifting problem in quotient operator systems. Our results have potential applications in quantum machine learning, device-independent characterization and reverse-engineering of stochastic processes and quantum processors, and more generally, of dynamical processes with quantum memory [M. Guţă, Phys. Rev. A 83(6), 062324 (2011); M. Guţă and N. Yamamoto, e-print arXiv:1303.3771(2013)].
Fujita, Masahiko
2016-03-01
Lesions of the cerebellum result in large errors in movements. The cerebellum adaptively controls the strength and timing of motor command signals depending on the internal and external environments of movements. The present theory describes how the cerebellar cortex can control signals for accurate and timed movements. A model network of the cerebellar Golgi and granule cells is shown to be equivalent to a multiple-input (from mossy fibers) hierarchical neural network with a single hidden layer of threshold units (granule cells) that receive a common recurrent inhibition (from a Golgi cell). The weighted sum of the hidden unit signals (Purkinje cell output) is theoretically analyzed regarding the capability of the network to perform two types of universal function approximation. The hidden units begin firing as the excitatory inputs exceed the recurrent inhibition. This simple threshold feature leads to the first approximation theory, and the network final output can be any continuous function of the multiple inputs. When the input is constant, this output becomes stationary. However, when the recurrent unit activity is triggered to decrease or the recurrent inhibition is triggered to increase through a certain mechanism (metabotropic modulation or extrasynaptic spillover), the network can generate any continuous signals for a prolonged period of change in the activity of recurrent signals, as the second approximation theory shows. By incorporating the cerebellar capability of two such types of approximations to a motor system, in which learning proceeds through repeated movement trials with accompanying corrections, accurate and timed responses for reaching the target can be adaptively acquired. Simple models of motor control can solve the motor error vs. sensory error problem, as well as the structural aspects of credit (or error) assignment problem. Two physiological experiments are proposed for examining the delay and trace conditioning of eyelid responses, as well as saccade adaptation, to investigate this novel idea of cerebellar processing. Copyright © 2015 Elsevier Ltd. All rights reserved.
The Hidden Curriculum as Emancipatory and Non-Emancipatory Tools.
ERIC Educational Resources Information Center
Kanpol, Barry
Moral values implied in school practices and policies constitute the "hidden curriculum." Because the hidden curriculum may promote certain moral values to students, teachers are partially responsible for the moral education of students. A component of the hidden curriculum, institutional political resistance, concerns teacher opposition to…
Microwave spectroscopic observation of distinct electron solid phases in wide quantum wells
NASA Astrophysics Data System (ADS)
Hatke, A. T.; Liu, Yang; Magill, B. A.; Moon, B. H.; Engel, L. W.; Shayegan, M.; Pfeiffer, L. N.; West, K. W.; Baldwin, K. W.
2014-06-01
In high magnetic fields, two-dimensional electron systems can form a number of phases in which interelectron repulsion plays the central role, since the kinetic energy is frozen out by Landau quantization. These phases include the well-known liquids of the fractional quantum Hall effect, as well as solid phases with broken spatial symmetry and crystalline order. Solids can occur at the low Landau-filling termination of the fractional quantum Hall effect series but also within integer quantum Hall effects. Here we present microwave spectroscopy studies of wide quantum wells that clearly reveal two distinct solid phases, hidden within what in d.c. transport would be the zero diagonal conductivity of an integer quantum-Hall-effect state. Explanation of these solids is not possible with the simple picture of a Wigner solid of ordinary (quasi) electrons or holes.
NASA Astrophysics Data System (ADS)
Hatke, Anthony; Engel, Lloyd; Liu, Yang; Shayegan, Mansour; Pfeiffer, Loren; West, Ken; Baldwin, Kirk
2015-03-01
The termination of the low Landau filling factor (ν) fractional quantum Hall series for a single layer two dimensional system results in the formation of a pinned Wigner solid for ν < 1 / 5. In a wide quantum well the system can support a bilayer state in which interlayer and intralayer interactions become comparable, which is measured in traditional transport as an insulating state for ν < 1 / 2. We perform microwave spectroscopic studies of this bilayer state and observe that this insulator exhibits a resonance, a signature of a solid phase. Additionally, we find that as we increase the density of the well at fixed ν this bilayer solid exhibits multiple sharp reductions in the resonance amplitude vs ν. This behavior is characteristic of multiple phase transitions, which remain hidden from dc transport measurements.
NASA Technical Reports Server (NTRS)
1972-01-01
This film shows the landing and the three lunar traverses in the highland region of the moon, near the crater descartes. It includes an astronaut's eye view from the rover, lunar grand prix, discovery of the house-sized rock, lunar lift-off and eva 173,000 miles above the earth. Microphones and cameras in mission control record the emergency problem solving during the prelanding crisis and the reactions of scientists on earth as the astronauts explore the moon.
NASA Astrophysics Data System (ADS)
Tao, C.-S.; Chen, S.-W.; Li, Y.-Z.; Xiao, S.-P.
2017-09-01
Land cover classification is an important application for polarimetric synthetic aperture radar (PolSAR) data utilization. Rollinvariant polarimetric features such as H / Ani / α / Span are commonly adopted in PolSAR land cover classification. However, target orientation diversity effect makes PolSAR images understanding and interpretation difficult. Only using the roll-invariant polarimetric features may introduce ambiguity in the interpretation of targets' scattering mechanisms and limit the followed classification accuracy. To address this problem, this work firstly focuses on hidden polarimetric feature mining in the rotation domain along the radar line of sight using the recently reported uniform polarimetric matrix rotation theory and the visualization and characterization tool of polarimetric coherence pattern. The former rotates the acquired polarimetric matrix along the radar line of sight and fully describes the rotation characteristics of each entry of the matrix. Sets of new polarimetric features are derived to describe the hidden scattering information of the target in the rotation domain. The latter extends the traditional polarimetric coherence at a given rotation angle to the rotation domain for complete interpretation. A visualization and characterization tool is established to derive new polarimetric features for hidden information exploration. Then, a classification scheme is developed combing both the selected new hidden polarimetric features in rotation domain and the commonly used roll-invariant polarimetric features with a support vector machine (SVM) classifier. Comparison experiments based on AIRSAR and multi-temporal UAVSAR data demonstrate that compared with the conventional classification scheme which only uses the roll-invariant polarimetric features, the proposed classification scheme achieves both higher classification accuracy and better robustness. For AIRSAR data, the overall classification accuracy with the proposed classification scheme is 94.91 %, while that with the conventional classification scheme is 93.70 %. Moreover, for multi-temporal UAVSAR data, the averaged overall classification accuracy with the proposed classification scheme is up to 97.08 %, which is much higher than the 87.79 % from the conventional classification scheme. Furthermore, for multitemporal PolSAR data, the proposed classification scheme can achieve better robustness. The comparison studies also clearly demonstrate that mining and utilization of hidden polarimetric features and information in the rotation domain can gain the added benefits for PolSAR land cover classification and provide a new vision for PolSAR image interpretation and application.
Modular thought in the circuit analysis
NASA Astrophysics Data System (ADS)
Wang, Feng
2018-04-01
Applied to solve the problem of modular thought, provides a whole for simplification's method, the complex problems have become of, and the study of circuit is similar to the above problems: the complex connection between components, make the whole circuit topic solution seems to be more complex, and actually components the connection between the have rules to follow, this article mainly tells the story of study on the application of the circuit modular thought. First of all, this paper introduces the definition of two-terminal network and the concept of two-terminal network equivalent conversion, then summarizes the common source resistance hybrid network modular approach, containing controlled source network modular processing method, lists the common module, typical examples analysis.
ERIC Educational Resources Information Center
Nickerson, Gord
1991-01-01
Describes the use and applications of the communications program Telenet for remote log-in, a basic interactive resource sharing service that enables users to connect to any machine on the Internet and conduct a session. The Virtual Terminal--the central component of Telenet--is also described, as well as problems with terminals, services…
Photoacoustic imaging of hidden dental caries by using a fiber-based probing system
NASA Astrophysics Data System (ADS)
Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji
2017-04-01
Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.
Asamitsu, Kaori; Hirokawa, Takatsugu; Okamoto, Takashi
2017-01-01
In this study, we applied molecular dynamics (MD) simulation to analyze the dynamic behavior of the Tat/CycT1/CDK9 tri-molecular complex and revealed the structural changes of P-TEFb upon Tat binding. We found that Tat could deliberately change the local flexibility of CycT1. Although the structural coordinates of the H1 and H2 helices did not substantially change, H1', H2', and H3' exhibited significant changes en masse. Consequently, the CycT1 residues involved in Tat binding, namely Tat-recognition residues (TRRs), lost their flexibility with the addition of Tat to P-TEFb. In addition, we clarified the structural variation of CDK9 in complex with CycT1 in the presence or absence of Tat. Interestingly, Tat addition significantly reduced the structural variability of the T-loop, thus consolidating the structural integrity of P-TEFb. Finally, we deciphered the formation of the hidden catalytic cavity of CDK9 upon Tat binding. MD simulation revealed that the PITALRE signature sequence of CDK9 flips the inactive kinase cavity of CDK9 into the active form by connecting with Thr186, which is crucial for its activity, thus presumably recruiting the substrate peptide such as the C-terminal domain of RNA pol II. These findings provide vital information for the development of effective novel anti-HIV drugs with CDK9 catalytic activity as the target.
The dynamic response of Kennicott Glacier, Alaska, USA, to the Hidden Creek Lake outburst flood
Anderson, R. Scott; Walder, J.S.; Anderson, S.P.; Trabant, D.C.; Fountain, A.G.
2005-01-01
Glacier sliding is commonly linked with elevated water pressure at the glacier bed. Ice surface motion during a 3 week period encompassing an outburst of ice-dammed Hidden Creek Lake (HCL) at Kennicott Glacier, Alaska, USA, showed enhanced sliding during the flood. Two stakes, 1.2 km from HCL, revealed increased speed in two episodes, both associated with uplift of the ice surface relative to the trajectory of bed-parallel motion. Uplift of the surface began 12 days before the flood, initially stabilizing at a value of 0.25 m. Two days after lake drainage began, further uplift (reaching 0.4 m) occurred while surface speed peaked at 1.2 m d-1. Maximum surface uplift coincided with peak discharge from HCL, high water level in a down-glacier ice-marginal basin, and low solute concentrations in the Kennicott River. Each of these records is consistent with high subglacial water pressure. We interpret the ice surface motion as arising from sliding up backs of bumps on the bed, which enlarges cavities and produces bed separation. The outburst increased water pressure over a broad region, promoting sliding, inhibiting cavity closure, and blocking drainage of solute-rich water from the distributed system. Pressure drop upon termination of the outburst drained water from and depressurized the distributed system, reducing sliding speeds. Expanded cavities then collapsed with a 1 day time-scale set by the local ice thickness.
Hidden magnetism and quantum criticality in the heavy fermion superconductor CeRhIn5.
Park, Tuson; Ronning, F; Yuan, H Q; Salamon, M B; Movshovich, R; Sarrao, J L; Thompson, J D
2006-03-02
With only a few exceptions that are well understood, conventional superconductivity does not coexist with long-range magnetic order (for example, ref. 1). Unconventional superconductivity, on the other hand, develops near a phase boundary separating magnetically ordered and magnetically disordered phases. A maximum in the superconducting transition temperature T(c) develops where this boundary extrapolates to zero Kelvin, suggesting that fluctuations associated with this magnetic quantum-critical point are essential for unconventional superconductivity. Invariably, though, unconventional superconductivity masks the magnetic phase boundary when T < T(c), preventing proof of a magnetic quantum-critical point. Here we report specific-heat measurements of the pressure-tuned unconventional superconductor CeRhIn5 in which we find a line of quantum-phase transitions induced inside the superconducting state by an applied magnetic field. This quantum-critical line separates a phase of coexisting antiferromagnetism and superconductivity from a purely unconventional superconducting phase, and terminates at a quantum tetracritical point where the magnetic field completely suppresses superconductivity. The T --> 0 K magnetic field-pressure phase diagram of CeRhIn5 is well described with a theoretical model developed to explain field-induced magnetism in the high-T(c) copper oxides, but in which a clear delineation of quantum-phase boundaries has not been possible. These experiments establish a common relationship among hidden magnetism, quantum criticality and unconventional superconductivity in copper oxides and heavy-electron systems such as CeRhIn5.
TERMINAL ILLNESS IN AN INDIAN SETTING: PROBLEMS OF COMMUNICATION
Khanna, R.; Singh, R.P.N.
1988-01-01
SUMMARY A study of 50 terminally ill cancer patients revealed that 52% were uninformed regarding their diagnosis and prognosis. In almost all cases the relatives had been adequately informed. No less than 82% of the terminally ill patients showed an awareness of the fatal prognosis. Most of the patients found the communication with the doctor and the relatives as unsatisfactory. Comparing this group with another group of non-terminal medically ill patients showed striking differences between the two groups. The findings are compared with those reported from the West and the implications of the above observations discussed. PMID:21927320
Fernandes, Carlos A. H.; Pazin, Wallance M.; Dreyer, Thiago R.; Bicev, Renata N.; Cavalcante, Walter L. G.; Fortes-Dias, Consuelo L.; Ito, Amando S.; Oliveira, Cristiano L. P.; Fernandez, Roberto Morato; Fontes, Marcos R. M.
2017-01-01
Crotoxin (CTX) is the main neurotoxin found in Crotalus durissus rattlesnake venoms being composed by a nontoxic and non-enzymatic component (CA) and a toxic phospholipase A2 (CB). Previous crystallographic structures of CTX and CB provided relevant insights: (i) CTX structure showed a 1:1 molecular ratio between CA and CB, presenting three tryptophan residues in the CA/CB interface and one exposed to solvent; (ii) CB structure displayed a tetrameric conformation. This study aims to provide further information on the CTX mechanism of action by several biophysical methods. Our data show that isolated CB can in fact form tetramers in solution; however, these tetramers can be dissociated by CA titration. Furthermore, CTX exhibits a strong reduction in fluorescence intensity and lifetime compared with isolated CA and CB, suggesting that all tryptophan residues in CTX may be hidden by the CA/CB interface. By companying spectroscopy fluorescence and SAXS data, we obtained a new structural model for the CTX heterodimer in which all tryptophans are located in the interface, and the N-terminal region of CB is largely exposed to the solvent. Based on this model, we propose a toxic mechanism of action for CTX, involving the interaction of N-terminal region of CB with the target before CA dissociation. PMID:28256632
Fernandes, Carlos A H; Pazin, Wallance M; Dreyer, Thiago R; Bicev, Renata N; Cavalcante, Walter L G; Fortes-Dias, Consuelo L; Ito, Amando S; Oliveira, Cristiano L P; Fernandez, Roberto Morato; Fontes, Marcos R M
2017-03-03
Crotoxin (CTX) is the main neurotoxin found in Crotalus durissus rattlesnake venoms being composed by a nontoxic and non-enzymatic component (CA) and a toxic phospholipase A 2 (CB). Previous crystallographic structures of CTX and CB provided relevant insights: (i) CTX structure showed a 1:1 molecular ratio between CA and CB, presenting three tryptophan residues in the CA/CB interface and one exposed to solvent; (ii) CB structure displayed a tetrameric conformation. This study aims to provide further information on the CTX mechanism of action by several biophysical methods. Our data show that isolated CB can in fact form tetramers in solution; however, these tetramers can be dissociated by CA titration. Furthermore, CTX exhibits a strong reduction in fluorescence intensity and lifetime compared with isolated CA and CB, suggesting that all tryptophan residues in CTX may be hidden by the CA/CB interface. By companying spectroscopy fluorescence and SAXS data, we obtained a new structural model for the CTX heterodimer in which all tryptophans are located in the interface, and the N-terminal region of CB is largely exposed to the solvent. Based on this model, we propose a toxic mechanism of action for CTX, involving the interaction of N-terminal region of CB with the target before CA dissociation.
Estimation of effective connectivity via data-driven neural modeling
Freestone, Dean R.; Karoly, Philippa J.; Nešić, Dragan; Aram, Parham; Cook, Mark J.; Grayden, David B.
2014-01-01
This research introduces a new method for functional brain imaging via a process of model inversion. By estimating parameters of a computational model, we are able to track effective connectivity and mean membrane potential dynamics that cannot be directly measured using electrophysiological measurements alone. The ability to track the hidden aspects of neurophysiology will have a profound impact on the way we understand and treat epilepsy. For example, under the assumption the model captures the key features of the cortical circuits of interest, the framework will provide insights into seizure initiation and termination on a patient-specific basis. It will enable investigation into the effect a particular drug has on specific neural populations and connectivity structures using minimally invasive measurements. The method is based on approximating brain networks using an interconnected neural population model. The neural population model is based on a neural mass model that describes the functional activity of the brain, capturing the mesoscopic biophysics and anatomical structure. The model is made subject-specific by estimating the strength of intra-cortical connections within a region and inter-cortical connections between regions using a novel Kalman filtering method. We demonstrate through simulation how the framework can be used to track the mechanisms involved in seizure initiation and termination. PMID:25506315
The 1980 Aircraft Safety and Operating Problems, Part 2
NASA Technical Reports Server (NTRS)
Stickle, J. W. (Compiler)
1981-01-01
Terminal area operations, avionics and human factors, atmospheric environment, and operating problems and potential solutions are discussed. Other topics include flight experiences, ground operations, and acoustics and noise reduction.
Distributed intelligent urban environment monitoring system
NASA Astrophysics Data System (ADS)
Du, Jinsong; Wang, Wei; Gao, Jie; Cong, Rigang
2018-02-01
The current environmental pollution and destruction have developed into a world-wide major social problem that threatens human survival and development. Environmental monitoring is the prerequisite and basis of environmental governance, but overall, the current environmental monitoring system is facing a series of problems. Based on the electrochemical sensor, this paper designs a small, low-cost, easy to layout urban environmental quality monitoring terminal, and multi-terminal constitutes a distributed network. The system has been small-scale demonstration applications and has confirmed that the system is suitable for large-scale promotion
Maximum principle for a stochastic delayed system involving terminal state constraints.
Wen, Jiaqiang; Shi, Yufeng
2017-01-01
We investigate a stochastic optimal control problem where the controlled system is depicted as a stochastic differential delayed equation; however, at the terminal time, the state is constrained in a convex set. We firstly introduce an equivalent backward delayed system depicted as a time-delayed backward stochastic differential equation. Then a stochastic maximum principle is obtained by virtue of Ekeland's variational principle. Finally, applications to a state constrained stochastic delayed linear-quadratic control model and a production-consumption choice problem are studied to illustrate the main obtained result.
;height:auto;overflow:hidden}.poc_table .top_row{background-color:#eee;height:auto;overflow:hidden}.poc_table ;background-color:#FFF;height:auto;overflow:hidden;border-top:1px solid #ccc}.poc_table .main_row .name :200px;padding:5px;height:auto;overflow:hidden}.tli_grey_box{background-color:#eaeaea;text-align:center
Game-theoretic cooperativity in networks of self-interested units
NASA Astrophysics Data System (ADS)
Barto, Andrew G.
1986-08-01
The behavior of theoretical neural networks is often described in terms of competition and cooperation. I present an approach to network learning that is related to game and team problems in which competition and cooperation have more technical meanings. I briefly describe the application of stochastic learning automata to game and team problems and then present an adaptive element that is a synthesis of aspects of stochastic learning automata and typical neuron-like adaptive elements. These elements act as self-interested agents that work toward improving their performance with respect to their individual preference orderings. Networks of these elements can solve a variety of team decision problems, some of which take the form of layered networks in which the ``hidden units'' become appropriate functional components as they attempt to improve their own payoffs.
Neural architecture design based on extreme learning machine.
Bueno-Crespo, Andrés; García-Laencina, Pedro J; Sancho-Gómez, José-Luis
2013-12-01
Selection of the optimal neural architecture to solve a pattern classification problem entails to choose the relevant input units, the number of hidden neurons and its corresponding interconnection weights. This problem has been widely studied in many research works but their solutions usually involve excessive computational cost in most of the problems and they do not provide a unique solution. This paper proposes a new technique to efficiently design the MultiLayer Perceptron (MLP) architecture for classification using the Extreme Learning Machine (ELM) algorithm. The proposed method provides a high generalization capability and a unique solution for the architecture design. Moreover, the selected final network only retains those input connections that are relevant for the classification task. Experimental results show these advantages. Copyright © 2013 Elsevier Ltd. All rights reserved.
Natural hidden antibodies reacting with DNA or cardiolipin bind to thymocytes and evoke their death.
Zamulaeva, I A; Lekakh, I V; Kiseleva, V I; Gabai, V L; Saenko, A S; Shevchenko, A S; Poverenny, A M
1997-08-18
Both free and hidden natural antibodies to DNA or cardiolipin were obtained from immunoglobulins of a normal donor. The free antibodies reacting with DNA or cardiolipin were isolated by means of affinity chromatography. Antibodies occurring in an hidden state were disengaged from the depleted immunoglobulins by ion-exchange chromatography and were then affinity-isolated on DNA or cardiolipin sorbents. We used flow cytometry to study the ability of free and hidden antibodies to bind to rat thymocytes. Simultaneously, plasma membrane integrity was tested by propidium iodide (PI) exclusion. The hidden antibodies reacted with 65.2 +/- 10.9% of the thymocytes and caused a fast plasma membrane disruption. Cells (28.7 +/- 7.1%) were stained with PI after incubation with the hidden antibodies for 1 h. The free antibodies bound to a very small fraction of the thymocytes and did not evoke death as compared to control without antibodies. The possible reason for the observed effects is difference in reactivity of the free and hidden antibodies to phospholipids. While free antibodies reacted preferentially with phosphotidylcholine, hidden antibodies reacted with cardiolipin and phosphotidylserine.
Whitcomb, Tiffany L
2014-01-01
The hidden curriculum is characterized by information that is tacitly conveyed to and among students about the cultural and moral environment in which they find themselves. Although the hidden curriculum is often defined as a distinct entity, tacit information is conveyed to students throughout all aspects of formal and informal curricula. This unconsciously communicated knowledge has been identified across a wide spectrum of educational environments and is known to have lasting and powerful impacts, both positive and negative. Recently, medical education research on the hidden curriculum of becoming a doctor has come to the forefront as institutions struggle with inconsistencies between formal and hidden curricula that hinder the practice of patient-centered medicine. Similarly, the complex ethical questions that arise during the practice and teaching of veterinary medicine have the potential to cause disagreement between what the institution sets out to teach and what is actually learned. However, the hidden curriculum remains largely unexplored for this field. Because the hidden curriculum is retained effectively by students, elucidating its underlying messages can be a key component of program refinement. A review of recent literature about the hidden curriculum in a variety of fields, including medical education, will be used to explore potential hidden curricula in veterinary medicine and draw attention to the need for further investigation.
NASA Astrophysics Data System (ADS)
Schoess, Jeffrey N.; Seifert, Greg; Paul, Clare A.
1996-05-01
The smart aircraft fastener evaluation (SAFE) system is an advanced structural health monitoring effort to detect and characterize corrosion in hidden and inaccessible locations of aircraft structures. Hidden corrosion is the number one logistics problem for the U.S. Air Force, with an estimated maintenance cost of $700M per year in 1990 dollars. The SAFE system incorporates a solid-state electrochemical microsensor and smart sensor electronics in the body of a Hi-Lok aircraft fastener to process and autonomously report corrosion status to aircraft maintenance personnel. The long-term payoff for using SAFE technology will be in predictive maintenance for aging aircraft and rotorcraft systems, fugitive emissions applications such as control valves, chemical pipeline vessels, and industrial boilers. Predictive maintenance capability, service, and repair will replace the current practice of scheduled maintenance to substantially reduce operational costs. A summary of the SAFE concept, laboratory test results, and future field test plans is presented.
NASA Astrophysics Data System (ADS)
Aquilanti, Vincenzo; Marinelli, Dimitri; Marzuoli, Annalisa
2013-05-01
The action of the quantum mechanical volume operator, introduced in connection with a symmetric representation of the three-body problem and recently recognized to play a fundamental role in discretized quantum gravity models, can be given as a second-order difference equation which, by a complex phase change, we turn into a discrete Schrödinger-like equation. The introduction of discrete potential-like functions reveals the surprising crucial role here of hidden symmetries, first discovered by Regge for the quantum mechanical 6j symbols; insight is provided into the underlying geometric features. The spectrum and wavefunctions of the volume operator are discussed from the viewpoint of the Hamiltonian evolution of an elementary ‘quantum of space’, and a transparent asymptotic picture of the semiclassical and classical regimes emerges. The definition of coordinates adapted to the Regge symmetry is exploited for the construction of a novel set of discrete orthogonal polynomials, characterizing the oscillatory components of torsion-like modes.
NASA Astrophysics Data System (ADS)
Xiong, Yan; Reichenbach, Stephen E.
1999-01-01
Understanding of hand-written Chinese characters is at such a primitive stage that models include some assumptions about hand-written Chinese characters that are simply false. So Maximum Likelihood Estimation (MLE) may not be an optimal method for hand-written Chinese characters recognition. This concern motivates the research effort to consider alternative criteria. Maximum Mutual Information Estimation (MMIE) is an alternative method for parameter estimation that does not derive its rationale from presumed model correctness, but instead examines the pattern-modeling problem in automatic recognition system from an information- theoretic point of view. The objective of MMIE is to find a set of parameters in such that the resultant model allows the system to derive from the observed data as much information as possible about the class. We consider MMIE for recognition of hand-written Chinese characters using on a simplified hidden Markov Random Field. MMIE provides improved performance improvement over MLE in this application.
Utterance independent bimodal emotion recognition in spontaneous communication
NASA Astrophysics Data System (ADS)
Tao, Jianhua; Pan, Shifeng; Yang, Minghao; Li, Ya; Mu, Kaihui; Che, Jianfeng
2011-12-01
Emotion expressions sometimes are mixed with the utterance expression in spontaneous face-to-face communication, which makes difficulties for emotion recognition. This article introduces the methods of reducing the utterance influences in visual parameters for the audio-visual-based emotion recognition. The audio and visual channels are first combined under a Multistream Hidden Markov Model (MHMM). Then, the utterance reduction is finished by finding the residual between the real visual parameters and the outputs of the utterance related visual parameters. This article introduces the Fused Hidden Markov Model Inversion method which is trained in the neutral expressed audio-visual corpus to solve the problem. To reduce the computing complexity the inversion model is further simplified to a Gaussian Mixture Model (GMM) mapping. Compared with traditional bimodal emotion recognition methods (e.g., SVM, CART, Boosting), the utterance reduction method can give better results of emotion recognition. The experiments also show the effectiveness of our emotion recognition system when it was used in a live environment.
NASA Astrophysics Data System (ADS)
Attaluri, Pavan K.; Chen, Zhengxin; Weerakoon, Aruna M.; Lu, Guoqing
Multiple criteria decision making (MCDM) has significant impact in bioinformatics. In the research reported here, we explore the integration of decision tree (DT) and Hidden Markov Model (HMM) for subtype prediction of human influenza A virus. Infection with influenza viruses continues to be an important public health problem. Viral strains of subtype H3N2 and H1N1 circulates in humans at least twice annually. The subtype detection depends mainly on the antigenic assay, which is time-consuming and not fully accurate. We have developed a Web system for accurate subtype detection of human influenza virus sequences. The preliminary experiment showed that this system is easy-to-use and powerful in identifying human influenza subtypes. Our next step is to examine the informative positions at the protein level and extend its current functionality to detect more subtypes. The web functions can be accessed at http://glee.ist.unomaha.edu/.
Passive acoustic leak detection for sodium cooled fast reactors using hidden Markov models
DOE Office of Scientific and Technical Information (OSTI.GOV)
Riber Marklund, A.; Kishore, S.; Prakash, V.
2015-07-01
Acoustic leak detection for steam generators of sodium fast reactors have been an active research topic since the early 1970's and several methods have been tested over the years. Inspired by its success in the field of automatic speech recognition, we here apply hidden Markov models (HMM) in combination with Gaussian mixture models (GMM) to the problem. To achieve this, we propose a new feature calculation scheme, based on the temporal evolution of the power spectral density (PSD) of the signal. Using acoustic signals recorded during steam/water injection experiments done at the Indira Gandhi Centre for Atomic Research (IGCAR), themore » proposed method is tested. We perform parametric studies on the HMM+GMM model size and demonstrate that the proposed method a) performs well without a priori knowledge of injection noise, b) can incorporate several noise models and c) has an output distribution that simplifies false alarm rate control. (authors)« less
Identifying influential user communities on the social network
NASA Astrophysics Data System (ADS)
Hu, Weishu; Gong, Zhiguo; Hou U, Leong; Guo, Jingzhi
2015-10-01
Nowadays social network services have been popularly used in electronic commerce systems. Users on the social network can develop different relationships based on their common interests and activities. In order to promote the business, it is interesting to explore hidden relationships among users developed on the social network. Such knowledge can be used to locate target users for different advertisements and to provide effective product recommendations. In this paper, we define and study a novel community detection problem that is to discover the hidden community structure in large social networks based on their common interests. We observe that the users typically pay more attention to those users who share similar interests, which enable a way to partition the users into different communities according to their common interests. We propose two algorithms to detect influential communities using common interests in large social networks efficiently and effectively. We conduct our experimental evaluation using a data set from Epinions, which demonstrates that our method achieves 4-11.8% accuracy improvement over the state-of-the-art method.
Making better decisions in groups
Frith, Chris D.
2017-01-01
We review the literature to identify common problems of decision-making in individuals and groups. We are guided by a Bayesian framework to explain the interplay between past experience and new evidence, and the problem of exploring the space of hypotheses about all the possible states that the world could be in and all the possible actions that one could take. There are strong biases, hidden from awareness, that enter into these psychological processes. While biases increase the efficiency of information processing, they often do not lead to the most appropriate action. We highlight the advantages of group decision-making in overcoming biases and searching the hypothesis space for good models of the world and good solutions to problems. Diversity of group members can facilitate these achievements, but diverse groups also face their own problems. We discuss means of managing these pitfalls and make some recommendations on how to make better group decisions. PMID:28878973
Pre-service teachers’ challenges in presenting mathematical problems
NASA Astrophysics Data System (ADS)
Desfitri, R.
2018-01-01
The purpose of this study was to analyzed how pre-service teachers prepare and assigned tasks or assignments in teaching practice situations. This study was also intended to discuss about kind of tasks or assignments they gave to students. Participants of this study were 15 selected pre-service mathematics teachers from mathematics education department who took part on microteaching class as part of teaching preparation program. Based on data obtained, it was occasionally found that there were hidden errors on questions or tasks assigned by pre-service teachers which might lead their students not to be able to reach a logical or correct answer. Although some answers might seem to be true, they were illogical or unfavourable. It is strongly recommended that pre-service teachers be more careful when posing mathematical problems so that students do not misunderstand the problems or the concepts, since both teachers and students were sometimes unaware of errors in problems being worked on.
What if ? On alternative conceptual models and the problem of their implementation
NASA Astrophysics Data System (ADS)
Neuberg, Jurgen
2015-04-01
Seismic and other monitoring techniques rely on a set of conceptual models on the base of which data sets can be interpreted. In order to do this on an operational level in volcano observatories these models need to be tested and ready for an interpretation in a timely manner. Once established, scientists in charge advising stakeholders and decision makers often stick firmly to these models to avoid confusion by giving alternative versions of interpretations to non-experts. This talk gives an overview of widely accepted conceptual models to interpret seismic and deformation data, and highlights in a few case studies some of the arising problems. Aspects covered include knowledge transfer between research institutions and observatories, data sharing, the problem of up-taking advice, and some hidden problems which turn out to be much more critical in assessing volcanic hazard than the actual data interpretation.
Learning and optimization with cascaded VLSI neural network building-block chips
NASA Technical Reports Server (NTRS)
Duong, T.; Eberhardt, S. P.; Tran, M.; Daud, T.; Thakoor, A. P.
1992-01-01
To demonstrate the versatility of the building-block approach, two neural network applications were implemented on cascaded analog VLSI chips. Weights were implemented using 7-b multiplying digital-to-analog converter (MDAC) synapse circuits, with 31 x 32 and 32 x 32 synapses per chip. A novel learning algorithm compatible with analog VLSI was applied to the two-input parity problem. The algorithm combines dynamically evolving architecture with limited gradient-descent backpropagation for efficient and versatile supervised learning. To implement the learning algorithm in hardware, synapse circuits were paralleled for additional quantization levels. The hardware-in-the-loop learning system allocated 2-5 hidden neurons for parity problems. Also, a 7 x 7 assignment problem was mapped onto a cascaded 64-neuron fully connected feedback network. In 100 randomly selected problems, the network found optimal or good solutions in most cases, with settling times in the range of 7-100 microseconds.
Algorithm 937: MINRES-QLP for Symmetric and Hermitian Linear Equations and Least-Squares Problems
Choi, Sou-Cheng T.; Saunders, Michael A.
2014-01-01
We describe algorithm MINRES-QLP and its FORTRAN 90 implementation for solving symmetric or Hermitian linear systems or least-squares problems. If the system is singular, MINRES-QLP computes the unique minimum-length solution (also known as the pseudoinverse solution), which generally eludes MINRES. In all cases, it overcomes a potential instability in the original MINRES algorithm. A positive-definite pre-conditioner may be supplied. Our FORTRAN 90 implementation illustrates a design pattern that allows users to make problem data known to the solver but hidden and secure from other program units. In particular, we circumvent the need for reverse communication. Example test programs input and solve real or complex problems specified in Matrix Market format. While we focus here on a FORTRAN 90 implementation, we also provide and maintain MATLAB versions of MINRES and MINRES-QLP. PMID:25328255
Heating up the Galaxy with hidden photons
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dubovsky, Sergei; Hernández-Chifflet, Guzmán, E-mail: dubovsky@nyu.edu, E-mail: ghc236@nyu.edu
2015-12-01
We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the waymore » down to the hidden photon masses of order 10{sup −20} eV.« less
Heating up the Galaxy with hidden photons
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dubovsky, Sergei; Hernández-Chifflet, Guzmán; Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300
2015-12-29
We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the waymore » down to the hidden photon masses of order 10{sup −20} eV.« less
Efficient dispatching in a terminal city network
DOT National Transportation Integrated Search
2001-01-01
This report describes new optimization and simulation tools to address several problems in transportation, specifically driver dispatching and tour formation in full truckload trucking. In this segment of transportation industry, one of the problems ...
NASA Technical Reports Server (NTRS)
Athans, M.
1974-01-01
A design concept of the dynamic control of aircraft in the near terminal area is discussed. An arbitrary set of nominal air routes, with possible multiple merging points, all leading to a single runway, is considered. The system allows for the automated determination of acceleration/deceleration of aircraft along the nominal air routes, as well as for the automated determination of path-stretching delay maneuvers. In addition to normal operating conditions, the system accommodates: (1) variable commanded separations over the outer marker to allow for takeoffs and between successive landings and (2) emergency conditions under which aircraft in distress have priority. The system design is based on a combination of three distinct optimal control problems involving a standard linear-quadratic problem, a parameter optimization problem, and a minimum-time rendezvous problem.
Bergren, Martha Dewey
2004-10-01
School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it is a problem, how it is transmitted to a personal or business computer, how to prevent spyware infestation, and how to delete it.
Connectionism and Compositional Semantics
1989-05-01
can use their hidden layers to learn difficult discriminations. such as panty or the Penzias two clumps/three clumps problem, where the output is...sauce." For novel sentences that are similar to the training sentences (e.g., train on "the girl hit the boy," test on -the boy hit the girl "), the...overridden by semantic considerations. as in this example from Wendy Lehnert (personal communicanon): (5) John saw the girl with the telescope in a red
NASA Astrophysics Data System (ADS)
Wang, Jinlong; Feng, Shuo; Wu, Qihui; Zheng, Xueqiang; Xu, Yuhua; Ding, Guoru
2014-12-01
Cognitive radio (CR) is a promising technology that brings about remarkable improvement in spectrum utilization. To tackle the hidden terminal problem, cooperative spectrum sensing (CSS) which benefits from the spatial diversity has been studied extensively. Since CSS is vulnerable to the attacks initiated by malicious secondary users (SUs), several secure CSS schemes based on Dempster-Shafer theory have been proposed. However, the existing works only utilize the current difference of SUs, such as the difference in SNR or similarity degree, to evaluate the trustworthiness of each SU. As the current difference is only one-sided and sometimes inaccurate, the statistical information contained in each SU's historical behavior should not be overlooked. In this article, we propose a robust CSS scheme based on Dempster-Shafer theory and trustworthiness degree calculation. It is carried out in four successive steps, which are basic probability assignment (BPA), trustworthiness degree calculation, selection and adjustment of BPA, and combination by Dempster-Shafer rule, respectively. Our proposed scheme evaluates the trustworthiness degree of SUs from both current difference aspect and historical behavior aspect and exploits Dempster-Shafer theory's potential to establish a `soft update' approach for the reputation value maintenance. It can not only differentiate malicious SUs from honest ones based on their historical behaviors but also reserve the current difference for each SU to achieve a better real-time performance. Abundant simulation results have validated that the proposed scheme outperforms the existing ones under the impact of different attack patterns and different number of malicious SUs.
Eating disorders: a hidden phenomenon in outpatient mental health?
Fursland, Anthea; Watson, Hunna J
2014-05-01
Eating disorders are common but underdiagnosed illnesses. Help-seeking for co-occurring issues, such as anxiety and depression, are common. To identify the prevalence of eating problems, using the SCOFF, and eating disorders when screening positive on the SCOFF (i.e., ≥2), among patients seeking help for anxiety and depression at a community-based mental health service. Patients (N = 260) consecutively referred and assessed for anxiety and depression treatment were administered the SCOFF screening questionnaire and a semi-structured standardized diagnostic interview during routine intake. 18.5% (48/260) scored ≥2 on the SCOFF, indicating eating problems. Of these, 41% (19/48) met criteria for an eating disorder. Thus, overall, 7.3% (19/260) of the sample met criteria for a DSM-IV eating disorder. Those scoring ≥2 on the SCOFF were more likely to: be female (p = 0.001), younger (p = 0.003), and have a history of self-harm (p < 0.001). This study confirms that eating disorders are a hidden phenomenon in general outpatient mental health. By using a standardized diagnostic interview to establish diagnosis rather than self- or staff-report, the study builds on limited previous findings. The naturalistic study setting shows that screening for eating disorders can be easily built into routine intake practice, and successfully identifies treatment need. Copyright © 2013 Wiley Periodicals, Inc.
Yorozu, Ayanori; Moriguchi, Toshiki; Takahashi, Masaki
2015-09-04
Falling is a common problem in the growing elderly population, and fall-risk assessment systems are needed for community-based fall prevention programs. In particular, the timed up and go test (TUG) is the clinical test most often used to evaluate elderly individual ambulatory ability in many clinical institutions or local communities. This study presents an improved leg tracking method using a laser range sensor (LRS) for a gait measurement system to evaluate the motor function in walk tests, such as the TUG. The system tracks both legs and measures the trajectory of both legs. However, both legs might be close to each other, and one leg might be hidden from the sensor. This is especially the case during the turning motion in the TUG, where the time that a leg is hidden from the LRS is longer than that during straight walking and the moving direction rapidly changes. These situations are likely to lead to false tracking and deteriorate the measurement accuracy of the leg positions. To solve these problems, a novel data association considering gait phase and a Catmull-Rom spline-based interpolation during the occlusion are proposed. From the experimental results with young people, we confirm that the proposed methods can reduce the chances of false tracking. In addition, we verify the measurement accuracy of the leg trajectory compared to a three-dimensional motion analysis system (VICON).
Modeling volatility using state space models.
Timmer, J; Weigend, A S
1997-08-01
In time series problems, noise can be divided into two categories: dynamic noise which drives the process, and observational noise which is added in the measurement process, but does not influence future values of the system. In this framework, we show that empirical volatilities (the squared relative returns of prices) exhibit a significant amount of observational noise. To model and predict their time evolution adequately, we estimate state space models that explicitly include observational noise. We obtain relaxation times for shocks in the logarithm of volatility ranging from three weeks (for foreign exchange) to three to five months (for stock indices). In most cases, a two-dimensional hidden state is required to yield residuals that are consistent with white noise. We compare these results with ordinary autoregressive models (without a hidden state) and find that autoregressive models underestimate the relaxation times by about two orders of magnitude since they do not distinguish between observational and dynamic noise. This new interpretation of the dynamics of volatility in terms of relaxators in a state space model carries over to stochastic volatility models and to GARCH models, and is useful for several problems in finance, including risk management and the pricing of derivative securities. Data sets used: Olsen & Associates high frequency DEM/USD foreign exchange rates (8 years). Nikkei 225 index (40 years). Dow Jones Industrial Average (25 years).
"It's Not Always What It Seems": Exploring the Hidden Curriculum within a Doctoral Program
ERIC Educational Resources Information Center
Foot, Rachel Elizabeth
2017-01-01
The purpose of this qualitative, naturalistic study was to explore the ways in which hidden curriculum might influence doctoral student success. Two questions guided the study: (a) How do doctoral students experience the hidden curriculum? (b) What forms of hidden curricula can be identified in a PhD program? Data were collected from twelve…
Doja, Asif; Bould, M Dylan; Clarkin, Chantalle; Eady, Kaylee; Sutherland, Stephanie; Writer, Hilary
2016-04-01
The hidden and informal curricula refer to learning in response to unarticulated processes and constraints, falling outside the formal medical curriculum. The hidden curriculum has been identified as requiring attention across all levels of learning. We sought to assess the knowledge and perceptions of the hidden and informal curricula across the continuum of learning at a single institution. Focus groups were held with undergraduate and postgraduate learners and faculty to explore knowledge and perceptions relating to the hidden and informal curricula. Thematic analysis was conducted both inductively by research team members and deductively using questions structured by the existing literature. Participants highlighted several themes related to the presence of the hidden and informal curricula in medical training and practice, including: the privileging of some specialties over others; the reinforcement of hierarchies within medicine; and a culture of tolerance towards unprofessional behaviors. Participants acknowledged the importance of role modeling in the development of professional identities and discussed the deterioration in idealism that occurs. Common issues pertaining to the hidden curriculum exist across all levels of learners, including faculty. Increased awareness of these issues could allow for the further development of methods to address learning within the hidden curriculum.
Doja, Asif; Bould, M Dylan; Clarkin, Chantalle; Eady, Kaylee; Sutherland, Stephanie; Writer, Hilary
2016-01-01
The hidden and informal curricula refer to learning in response to unarticulated processes and constraints, falling outside the formal medical curriculum. The hidden curriculum has been identified as requiring attention across all levels of learning. We sought to assess the knowledge and perceptions of the hidden and informal curricula across the continuum of learning at a single institution. Focus groups were held with undergraduate and postgraduate learners and faculty to explore knowledge and perceptions relating to the hidden and informal curricula. Thematic analysis was conducted both inductively by research team members and deductively using questions structured by the existing literature. Participants highlighted several themes related to the presence of the hidden and informal curricula in medical training and practice, including: the privileging of some specialties over others; the reinforcement of hierarchies within medicine; and a culture of tolerance towards unprofessional behaviors. Participants acknowledged the importance of role modeling in the development of professional identities and discussed the deterioration in idealism that occurs. Common issues pertaining to the hidden curriculum exist across all levels of learners, including faculty. Increased awareness of these issues could allow for the further development of methods to address learning within the hidden curriculum.
Hidden Farmworker Labor Camps in North Carolina: An Indicator of Structural Vulnerability
Summers, Phillip; Quandt, Sara A.; Talton, Jennifer W.; Galván, Leonardo
2015-01-01
Objectives. We used geographic information systems (GIS) to delineate whether farmworker labor camps were hidden and to determine whether hidden camps differed from visible camps in terms of physical and resident characteristics. Methods. We collected data using observation, interview, and public domain GIS data for 180 farmworker labor camps in east central North Carolina. A hidden camp was defined as one that was at least 0.15 miles from an all-weather road or located behind natural or manufactured objects. Hidden camps were compared with visible camps in terms of physical and resident characteristics. Results. More than one third (37.8%) of the farmworker labor camps were hidden. Hidden camps were significantly larger (42.7% vs 17.0% with 21 or more residents; P ≤ .001; and 29.4% vs 13.5% with 3 or more dwellings; P = .002) and were more likely to include barracks (50% vs 19.6%; P ≤ .001) than were visible camps. Conclusions. Poor housing conditions in farmworker labor camps often go unnoticed because they are hidden in the rural landscape, increasing farmworker vulnerability. Policies that promote greater community engagement with farmworker labor camp residents to reduce structural vulnerability should be considered. PMID:26469658
NASA Technical Reports Server (NTRS)
Grayson, R. L.
1981-01-01
This study of Aviation Safety Reporting System reports suggests that benefits should accure from implementation of discrete address beacon system data link. The phase enhanced terminal information system service is expected to provide better terminal information than present systems by improving currency and accuracy. In the exchange of air traffic control messages, discrete address insures that only the intended recipient receives and acts on a specific message. Visual displays and printer copy of messages should mitigate many of the reported problems associated with voice communications. The problems that remain unaffected include error in addressing the intended recipient and messages whose content is wrong but are otherwise correct as to format and reasonableness.
Ergonomic Training for Tomorrow's Office.
ERIC Educational Resources Information Center
Gross, Clifford M.; Chapnik, Elissa Beth
1987-01-01
The authors focus on issues related to the continual use of video display terminals in the office, including safety and health regulations, potential health problems, and the role of training in minimizing work-related health problems. (CH)
Basics of identification measurement technology
NASA Astrophysics Data System (ADS)
Klikushin, Yu N.; Kobenko, V. Yu; Stepanov, P. P.
2018-01-01
All available algorithms and suitable for pattern recognition do not give 100% guarantee, therefore there is a field of scientific night activity in this direction, studies are relevant. It is proposed to develop existing technologies for pattern recognition in the form of application of identification measurements. The purpose of the study is to identify the possibility of recognizing images using identification measurement technologies. In solving problems of pattern recognition, neural networks and hidden Markov models are mainly used. A fundamentally new approach to the solution of problems of pattern recognition based on the technology of identification signal measurements (IIS) is proposed. The essence of IIS technology is the quantitative evaluation of the shape of images using special tools and algorithms.
How virtue ethics informs medical professionalism.
McCammon, Susan D; Brody, Howard
2012-12-01
We argue that a turn toward virtue ethics as a way of understanding medical professionalism represents both a valuable corrective and a missed opportunity. We look at three ways in which a closer appeal to virtue ethics could help address current problems or issues in professionalism education-first, balancing professionalism training with demands for professional virtues as a prerequisite; second, preventing demands for the demonstrable achievement of competencies from working against ideal professionalism education as lifelong learning; and third, avoiding temptations to dismiss moral distress as a mere "hidden curriculum" problem. As a further demonstration of how best to approach a lifelong practice of medical virtue, we will examine altruism as a mean between the extremes of self-sacrifice and selfishness.
Infrared thermographic detection of buried grave sites
NASA Astrophysics Data System (ADS)
Weil, Gary J.; Graf, Richard J.
1992-04-01
Since time began, people have been born and people have died. For a variety of reasons grave sites have had to be located and investigated. These reasons have included legal, criminal, religious, construction and even simple curiosity problems. Destructive testing methods such as shovels and backhoes, have traditionally been used to determine grave site locations in fields, under pavements, and behind hidden locations. These existing techniques are slow, inconvenient, dirty, destructive, visually obtrusive, irritating to relatives, explosive to the media and expensive. A new, nondestructive, non-contact technique, infrared thermography has been developed to address these problems. This paper will describe how infrared thermography works and will be illustrated by several case histories.
Predicting Premature Termination within a Randomized Controlled Trial for Binge-Eating Patients
ERIC Educational Resources Information Center
Fluckiger, Christoph; Meyer, Andrea; Wampold, Bruce E.; Gassmann, Daniel; Messerli-Burgy, Nadine; Munsch, Simone
2011-01-01
Understanding the dropout rates of efficacious forms of psychotherapy for patients with binge eating disorder (BED) is an unsolved problem within this increasing population. Up until now the role of psychotherapy process characteristics as predictors of premature termination has not been investigated in the BED literature. Within a randomized…
A hidden curriculum: gambling and problem gambling among high school students in Auckland.
Sullivan, Sean
2005-12-01
Participation in gambling by young people aged 13-18 years. During 2001, prior to the passing of legislation to minimise gambling harm, more than 500 students from six high schools completed a survey of their participation in gambling during the previous 12 months, and completed three problem gambling screens. Gambling, including under-age gambling, was a common event. Up to one in five were identified as at risk for problem gambling on at least one screen. Students who were non-European, or were from low socioeconomic areas, were more likely to be at risk for problem gambling. Help for gambling problems was preferred from friends and family rather than others, while inclusion of information in the education curriculum about risk of gambling problems was supported. The survey provided evidence for pre-legislation baseline gambling behaviour, and risk for problem gambling, of students attending high schools in Auckland. Levels of risk for problem gambling paralleled the elevated risk found for youth in many countries. Raising awareness, through a school curriculum, of risk for gambling problems among adolescents may be explored as a strategy to reduce the high levels of risk for gambling problems identified.
Zipf exponent of trajectory distribution in the hidden Markov model
NASA Astrophysics Data System (ADS)
Bochkarev, V. V.; Lerner, E. Yu
2014-03-01
This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.
Identification of related gene/protein names based on an HMM of name variations.
Yeganova, L; Smith, L; Wilbur, W J
2004-04-01
Gene and protein names follow few, if any, true naming conventions and are subject to great variation in different occurrences of the same name. This gives rise to two important problems in natural language processing. First, can one locate the names of genes or proteins in free text, and second, can one determine when two names denote the same gene or protein? The first of these problems is a special case of the problem of named entity recognition, while the second is a special case of the problem of automatic term recognition (ATR). We study the second problem, that of gene or protein name variation. Here we describe a system which, given a query gene or protein name, identifies related gene or protein names in a large list. The system is based on a dynamic programming algorithm for sequence alignment in which the mutation matrix is allowed to vary under the control of a fully trainable hidden Markov model.
Poernomo, Alvin; Kang, Dae-Ki
2018-08-01
Training a deep neural network with a large number of parameters often leads to overfitting problem. Recently, Dropout has been introduced as a simple, yet effective regularization approach to combat overfitting in such models. Although Dropout has shown remarkable results on many deep neural network cases, its actual effect on CNN has not been thoroughly explored. Moreover, training a Dropout model will significantly increase the training time as it takes longer time to converge than a non-Dropout model with the same architecture. To deal with these issues, we address Biased Dropout and Crossmap Dropout, two novel approaches of Dropout extension based on the behavior of hidden units in CNN model. Biased Dropout divides the hidden units in a certain layer into two groups based on their magnitude and applies different Dropout rate to each group appropriately. Hidden units with higher activation value, which give more contributions to the network final performance, will be retained by a lower Dropout rate, while units with lower activation value will be exposed to a higher Dropout rate to compensate the previous part. The second approach is Crossmap Dropout, which is an extension of the regular Dropout in convolution layer. Each feature map in a convolution layer has a strong correlation between each other, particularly in every identical pixel location in each feature map. Crossmap Dropout tries to maintain this important correlation yet at the same time break the correlation between each adjacent pixel with respect to all feature maps by applying the same Dropout mask to all feature maps, so that all pixels or units in equivalent positions in each feature map will be either dropped or active during training. Our experiment with various benchmark datasets shows that our approaches provide better generalization than the regular Dropout. Moreover, our Biased Dropout takes faster time to converge during training phase, suggesting that assigning noise appropriately in hidden units can lead to an effective regularization. Copyright © 2018 Elsevier Ltd. All rights reserved.
Practical solutions for reducing container ships' waiting times at ports using simulation model
NASA Astrophysics Data System (ADS)
Sheikholeslami, Abdorreza; Ilati, Gholamreza; Yeganeh, Yones Eftekhari
2013-12-01
The main challenge for container ports is the planning required for berthing container ships while docked in port. Growth of containerization is creating problems for ports and container terminals as they reach their capacity limits of various resources which increasingly leads to traffic and port congestion. Good planning and management of container terminal operations reduces waiting time for liner ships. Reducing the waiting time improves the terminal's productivity and decreases the port difficulties. Two important keys to reducing waiting time with berth allocation are determining suitable access channel depths and increasing the number of berths which in this paper are studied and analyzed as practical solutions. Simulation based analysis is the only way to understand how various resources interact with each other and how they are affected in the berthing time of ships. We used the Enterprise Dynamics software to produce simulation models due to the complexity and nature of the problems. We further present case study for berth allocation simulation of the biggest container terminal in Iran and the optimum access channel depth and the number of berths are obtained from simulation results. The results show a significant reduction in the waiting time for container ships and can be useful for major functions in operations and development of container ship terminals.
NASA Astrophysics Data System (ADS)
Chakraborty, S.; Banerjee, A.; Gupta, S. K. S.; Christensen, P. R.; Papandreou-Suppappola, A.
2017-12-01
Multitemporal observations acquired frequently by satellites with short revisit periods such as the Moderate Resolution Imaging Spectroradiometer (MODIS), is an important source for modeling land cover. Due to the inherent seasonality of the land cover, harmonic modeling reveals hidden state parameters characteristic to it, which is used in classifying different land cover types and in detecting changes due to natural or anthropogenic factors. In this work, we use an eight day MODIS composite to create a Normalized Difference Vegetation Index (NDVI) time-series of ten years. Improved hidden parameter estimates of the nonlinear harmonic NDVI model are obtained using the Particle Filter (PF), a sequential Monte Carlo estimator. The nonlinear estimation based on PF is shown to improve parameter estimation for different land cover types compared to existing techniques that use the Extended Kalman Filter (EKF), due to linearization of the harmonic model. As these parameters are representative of a given land cover, its applicability in near real-time detection of land cover change is also studied by formulating a metric that captures parameter deviation due to change. The detection methodology is evaluated by considering change as a rare class problem. This approach is shown to detect change with minimum delay. Additionally, the degree of change within the change perimeter is non-uniform. By clustering the deviation in parameters due to change, this spatial variation in change severity is effectively mapped and validated with high spatial resolution change maps of the given regions.
Kim, Jihun; Kim, Jonghong; Jang, Gil-Jin; Lee, Minho
2017-03-01
Deep learning has received significant attention recently as a promising solution to many problems in the area of artificial intelligence. Among several deep learning architectures, convolutional neural networks (CNNs) demonstrate superior performance when compared to other machine learning methods in the applications of object detection and recognition. We use a CNN for image enhancement and the detection of driving lanes on motorways. In general, the process of lane detection consists of edge extraction and line detection. A CNN can be used to enhance the input images before lane detection by excluding noise and obstacles that are irrelevant to the edge detection result. However, training conventional CNNs requires considerable computation and a big dataset. Therefore, we suggest a new learning algorithm for CNNs using an extreme learning machine (ELM). The ELM is a fast learning method used to calculate network weights between output and hidden layers in a single iteration and thus, can dramatically reduce learning time while producing accurate results with minimal training data. A conventional ELM can be applied to networks with a single hidden layer; as such, we propose a stacked ELM architecture in the CNN framework. Further, we modify the backpropagation algorithm to find the targets of hidden layers and effectively learn network weights while maintaining performance. Experimental results confirm that the proposed method is effective in reducing learning time and improving performance. Copyright © 2016 Elsevier Ltd. All rights reserved.
Visual one-shot learning as an 'anti-camouflage device': a novel morphing paradigm.
Ishikawa, Tetsuo; Mogi, Ken
2011-09-01
Once people perceive what is in the hidden figure such as Dallenbach's cow and Dalmatian, they seldom seem to come back to the previous state when they were ignorant of the answer. This special type of learning process can be accomplished in a short time, with the effect of learning lasting for a long time (visual one-shot learning). Although it is an intriguing cognitive phenomenon, the lack of the control of difficulty of stimuli presented has been a problem in research. Here we propose a novel paradigm to create new hidden figures systematically by using a morphing technique. Through gradual changes from a blurred and binarized two-tone image to a blurred grayscale image of the original photograph including objects in a natural scene, spontaneous one-shot learning can occur at a certain stage of morphing when a sufficient amount of information is restored to the degraded image. A negative correlation between confidence levels and reaction times is observed, giving support to the fluency theory of one-shot learning. The correlation between confidence ratings and correct recognition rates indicates that participants had an accurate introspective ability (metacognition). The learning effect could be tested later by verifying whether or not the target object was recognized quicker in the second exposure. The present method opens a way for a systematic production of "good" hidden figures, which can be used to demystify the nature of visual one-shot learning.
A traveling-salesman-based approach to aircraft scheduling in the terminal area
NASA Technical Reports Server (NTRS)
Luenberger, Robert A.
1988-01-01
An efficient algorithm is presented, based on the well-known algorithm for the traveling salesman problem, for scheduling aircraft arrivals into major terminal areas. The algorithm permits, but strictly limits, reassigning an aircraft from its initial position in the landing order. This limitation is needed so that no aircraft or aircraft category is unduly penalized. Results indicate, for the mix of arrivals investigated, a potential increase in capacity in the 3 to 5 percent range. Furthermore, it is shown that the computation time for the algorithm grows only linearly with problem size.
Dewey, Rebecca Susan; Hall, Deborah A; Guest, Hannah; Prendergast, Garreth; Plack, Christopher J; Francis, Susan T
2018-03-09
Rodent studies indicate that noise exposure can cause permanent damage to synapses between inner hair cells and high-threshold auditory nerve fibers, without permanently altering threshold sensitivity. These demonstrations of what is commonly known as hidden hearing loss have been confirmed in several rodent species, but the implications for human hearing are unclear. Our Medical Research Council-funded program aims to address this unanswered question, by investigating functional consequences of the damage to the human peripheral and central auditory nervous system that results from cumulative lifetime noise exposure. Behavioral and neuroimaging techniques are being used in a series of parallel studies aimed at detecting hidden hearing loss in humans. The planned neuroimaging study aims to (1) identify central auditory biomarkers associated with hidden hearing loss; (2) investigate whether there are any additive contributions from tinnitus or diminished sound tolerance, which are often comorbid with hearing problems; and (3) explore the relation between subcortical functional magnetic resonance imaging (fMRI) measures and the auditory brainstem response (ABR). Individuals aged 25 to 40 years with pure tone hearing thresholds ≤20 dB hearing level over the range 500 Hz to 8 kHz and no contraindications for MRI or signs of ear disease will be recruited into the study. Lifetime noise exposure will be estimated using an in-depth structured interview. Auditory responses throughout the central auditory system will be recorded using ABR and fMRI. Analyses will focus predominantly on correlations between lifetime noise exposure and auditory response characteristics. This paper reports the study protocol. The funding was awarded in July 2013. Enrollment for the study described in this protocol commenced in February 2017 and was completed in December 2017. Results are expected in 2018. This challenging and comprehensive study will have the potential to impact diagnostic procedures for hidden hearing loss, enabling early identification of noise-induced auditory damage via the detection of changes in central auditory processing. Consequently, this will generate the opportunity to give personalized advice regarding provision of ear defense and monitoring of further damage, thus reducing the incidence of noise-induced hearing loss. ©Rebecca Susan Dewey, Deborah A Hall, Hannah Guest, Garreth Prendergast, Christopher J Plack, Susan T Francis. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 09.03.2018.
Chromosome ends: different sequences may provide conserved functions.
Louis, Edward J; Vershinin, Alexander V
2005-07-01
The structures of specific chromosome regions, centromeres and telomeres, present a number of puzzles. As functions performed by these regions are ubiquitous and essential, their DNA, proteins and chromatin structure are expected to be conserved. Recent studies of centromeric DNA from human, Drosophila and plant species have demonstrated that a hidden universal centromere-specific sequence is highly unlikely. The DNA of telomeres is more conserved consisting of a tandemly repeated 6-8 bp Arabidopsis-like sequence in a majority of organisms as diverse as protozoan, fungi, mammals and plants. However, there are alternatives to short DNA repeats at the ends of chromosomes and for telomere elongation by telomerase. Here we focus on the similarities and diversity that exist among the structural elements, DNA sequences and proteins, that make up terminal domains (telomeres and subtelomeres), and how organisms use these in different ways to fulfil the functions of end-replication and end-protection. Copyright (c) 2005 Wiley Periodicals, Inc.
Peroxisomal lactate dehydrogenase is generated by translational readthrough in mammals
Schueren, Fabian; Lingner, Thomas; George, Rosemol; Hofhuis, Julia; Dickel, Corinna; Gärtner, Jutta; Thoms, Sven
2014-01-01
Translational readthrough gives rise to low abundance proteins with C-terminal extensions beyond the stop codon. To identify functional translational readthrough, we estimated the readthrough propensity (RTP) of all stop codon contexts of the human genome by a new regression model in silico, identified a nucleotide consensus motif for high RTP by using this model, and analyzed all readthrough extensions in silico with a new predictor for peroxisomal targeting signal type 1 (PTS1). Lactate dehydrogenase B (LDHB) showed the highest combined RTP and PTS1 probability. Experimentally we show that at least 1.6% of the total cellular LDHB is targeted to the peroxisome by a conserved hidden PTS1. The readthrough-extended lactate dehydrogenase subunit LDHBx can also co-import LDHA, the other LDH subunit, into peroxisomes. Peroxisomal LDH is conserved in mammals and likely contributes to redox equivalent regeneration in peroxisomes. DOI: http://dx.doi.org/10.7554/eLife.03640.001 PMID:25247702
Two neural network algorithms for designing optimal terminal controllers with open final time
NASA Technical Reports Server (NTRS)
Plumer, Edward S.
1992-01-01
Multilayer neural networks, trained by the backpropagation through time algorithm (BPTT), have been used successfully as state-feedback controllers for nonlinear terminal control problems. Current BPTT techniques, however, are not able to deal systematically with open final-time situations such as minimum-time problems. Two approaches which extend BPTT to open final-time problems are presented. In the first, a neural network learns a mapping from initial-state to time-to-go. In the second, the optimal number of steps for each trial run is found using a line-search. Both methods are derived using Lagrange multiplier techniques. This theoretical framework is used to demonstrate that the derived algorithms are direct extensions of forward/backward sweep methods used in N-stage optimal control. The two algorithms are tested on a Zermelo problem and the resulting trajectories compare favorably to optimal control results.
A composite model for the 750 GeV diphoton excess
Harigaya, Keisuke; Nomura, Yasunori
2016-03-14
We study a simple model in which the recently reported 750 GeV diphoton excess arises from a composite pseudo Nambu-Goldstone boson — hidden pion — produced by gluon fusion and decaying into two photons. The model only introduces an extra hidden gauge group at the TeV scale with a vectorlike quark in the bifundamental representation of the hidden and standard model gauge groups. We calculate the masses of all the hidden pions and analyze their experimental signatures and constraints. We find that two colored hidden pions must be near the current experimental limits, and hence are probed in the nearmore » future. We study physics of would-be stable particles — the composite states that do not decay purely by the hidden and standard model gauge dynamics — in detail, including constraints from cosmology. We discuss possible theoretical structures above the TeV scale, e.g. conformal dynamics and supersymmetry, and their phenomenological implications. We also discuss an extension of the minimal model in which there is an extra hidden quark that is singlet under the standard model and has a mass smaller than the hidden dynamical scale. This provides two standard model singlet hidden pions that can both be viewed as diphoton/diboson resonances produced by gluon fusion. We discuss several scenarios in which these (and other) resonances can be used to explain various excesses seen in the LHC data.« less
Merton's problem for an investor with a benchmark in a Barndorff-Nielsen and Shephard market.
Lennartsson, Jan; Lindberg, Carl
2015-01-01
To try to outperform an externally given benchmark with known weights is the most common equity mandate in the financial industry. For quantitative investors, this task is predominantly approached by optimizing their portfolios consecutively over short time horizons with one-period models. We seek in this paper to provide a theoretical justification to this practice when the underlying market is of Barndorff-Nielsen and Shephard type. This is done by verifying that an investor who seeks to maximize her expected terminal exponential utility of wealth in excess of her benchmark will in fact use an optimal portfolio equivalent to the one-period Markowitz mean-variance problem in continuum under the corresponding Black-Scholes market. Further, we can represent the solution to the optimization problem as in Feynman-Kac form. Hence, the problem, and its solution, is analogous to Merton's classical portfolio problem, with the main difference that Merton maximizes expected utility of terminal wealth, not wealth in excess of a benchmark.
Radio for hidden-photon dark matter detection
Chaudhuri, Saptarshi; Graham, Peter W.; Irwin, Kent; ...
2015-10-08
We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled “hidden electric field,” oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that the observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Ourmore » “straw man” setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies, there is an upper limit to the useful size of a single resonator set by 1/ν. However, many resonators may be multiplexed within a hidden-photon coherence length to increase the sensitivity in this regime. Hidden-photon dark matter has an enormous range of possible frequencies, but current experiments search only over a few narrow pieces of that range. As a result, we find the potential sensitivity of our proposal is many orders of magnitude beyond current limits over an extensive range of frequencies, from 100 Hz up to 700 GHz and potentially higher.« less
Multi-terminal pipe routing by Steiner minimal tree and particle swarm optimisation
NASA Astrophysics Data System (ADS)
Liu, Qiang; Wang, Chengen
2012-08-01
Computer-aided design of pipe routing is of fundamental importance for complex equipments' developments. In this article, non-rectilinear branch pipe routing with multiple terminals that can be formulated as a Euclidean Steiner Minimal Tree with Obstacles (ESMTO) problem is studied in the context of an aeroengine-integrated design engineering. Unlike the traditional methods that connect pipe terminals sequentially, this article presents a new branch pipe routing algorithm based on the Steiner tree theory. The article begins with a new algorithm for solving the ESMTO problem by using particle swarm optimisation (PSO), and then extends the method to the surface cases by using geodesics to meet the requirements of routing non-rectilinear pipes on the surfaces of aeroengines. Subsequently, the adaptive region strategy and the basic visibility graph method are adopted to increase the computation efficiency. Numeral computations show that the proposed routing algorithm can find satisfactory routing layouts while running in polynomial time.
Inter-Fork Strand Annealing causes genomic deletions during the termination of DNA replication.
Morrow, Carl A; Nguyen, Michael O; Fower, Andrew; Wong, Io Nam; Osman, Fekret; Bryer, Claire; Whitby, Matthew C
2017-06-06
Problems that arise during DNA replication can drive genomic alterations that are instrumental in the development of cancers and many human genetic disorders. Replication fork barriers are a commonly encountered problem, which can cause fork collapse and act as hotspots for replication termination. Collapsed forks can be rescued by homologous recombination, which restarts replication. However, replication restart is relatively slow and, therefore, replication termination may frequently occur by an active fork converging on a collapsed fork. We find that this type of non-canonical fork convergence in fission yeast is prone to trigger deletions between repetitive DNA sequences via a mechanism we call Inter-Fork Strand Annealing (IFSA) that depends on the recombination proteins Rad52, Exo1 and Mus81, and is countered by the FANCM-related DNA helicase Fml1. Based on our findings, we propose that IFSA is a potential threat to genomic stability in eukaryotes.
NASA Technical Reports Server (NTRS)
Hague, D. S.; Vanderburg, J. D.
1977-01-01
A vehicle geometric definition based upon quadrilateral surface elements to produce realistic pictures of an aerospace vehicle. The PCSYS programs can be used to visually check geometric data input, monitor geometric perturbations, and to visualize the complex spatial inter-relationships between the internal and external vehicle components. PCSYS has two major component programs. The between program, IMAGE, draws a complex aerospace vehicle pictorial representation based on either an approximate but rapid hidden line algorithm or without any hidden line algorithm. The second program, HIDDEN, draws a vehicle representation using an accurate but time consuming hidden line algorithm.
The reported effects of bullying on burn-surviving children.
Rimmer, Ruth B; Foster, Kevin N; Bay, Curtis R; Floros, Jim; Rutter, Cindy; Bosch, Jim; Wadsworth, Michelle M; Caruso, Daniel M
2007-01-01
There is a trend of increasing childhood aggression in America, which has been tied to bullying. Although there is growing research concerning bullying in the general pediatric population, there are limited data on bullying and its effects on children with disfigurements and physical limitations. This study was conducted to assess burned children's experience with bullying. A pretest was administered regarding experience with bullying and teasing. A curriculum regarding bullying, which incorporated the Harry Potter and the Sorcerer's Stone movie, was presented. After reviewing bullying depicted in the film and participating in a class regarding bullying, children were invited to complete a survey regarding their experience with bullying. A total of 61% of these children reported being bullied at school; 25% reported experiencing headaches or stomachaches due to bullying, and 12% reported staying home from school. Nearly 25% reported bullying as a big problem. Of those with visible scars (55%), a full 68% reported bullying as a problem, versus 54% with hidden scars (P < .05). However, those with visible scars were no more likely to tell an adult (54%) than those without (56%). Children were much more willing to disclose personal bullying experiences after participating in the class (57%) than before (45%) (P < .01). This study revealed that bullying impacts many burn-injured children and has negative effects on their physical and mental well-being. Many children (with visible or hidden scars) did not seek adult intervention for the problem. Participation in a bullying course appears to give children a forum that increases their willingness to disclose personal bullying experiences and can provide them with prevention information and a safe place to seek help.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Farina, Marco; Pappadopulo, Duccio; Ruderman, Joshua T.
A hidden sector with a mass gap undergoes an epoch of cannibalism if number changing interactions are active when the temperature drops below the mass of the lightest hidden particle. During cannibalism, the hidden sector temperature decreases only logarithmically with the scale factor. We consider the possibility that dark matter resides in a hidden sector that underwent cannibalism, and has relic density set by the freeze-out of two-to-two annihilations. We identify three novel phases, depending on the behavior of the hidden sector when dark matter freezes out. During the cannibal phase, dark matter annihilations decouple while the hidden sector ismore » cannibalizing. During the chemical phase, only two-to-two interactions are active and the total number of hidden particles is conserved. During the one way phase, the dark matter annihilation products decay out of equilibrium, suppressing the production of dark matter from inverse annihilations. We map out the distinct phenomenology of each phase, which includes a boosted dark matter annihilation rate, new relativistic degrees of freedom, warm dark matter, and observable distortions to the spectrum of the cosmic microwave background.« less
Phases of cannibal dark matter
NASA Astrophysics Data System (ADS)
Farina, Marco; Pappadopulo, Duccio; Ruderman, Joshua T.; Trevisan, Gabriele
2016-12-01
A hidden sector with a mass gap undergoes an epoch of cannibalism if number changing interactions are active when the temperature drops below the mass of the lightest hidden particle. During cannibalism, the hidden sector temperature decreases only logarithmically with the scale factor. We consider the possibility that dark matter resides in a hidden sector that underwent cannibalism, and has relic density set by the freeze-out of two-to-two annihilations. We identify three novel phases, depending on the behavior of the hidden sector when dark matter freezes out. During the cannibal phase, dark matter annihilations decouple while the hidden sector is cannibalizing. During the chemical phase, only two-to-two interactions are active and the total number of hidden particles is conserved. During the one way phase, the dark matter annihilation products decay out of equilibrium, suppressing the production of dark matter from inverse annihilations. We map out the distinct phenomenology of each phase, which includes a boosted dark matter annihilation rate, new relativistic degrees of freedom, warm dark matter, and observable distortions to the spectrum of the cosmic microwave background.
Phases of cannibal dark matter
Farina, Marco; Pappadopulo, Duccio; Ruderman, Joshua T.; ...
2016-12-13
A hidden sector with a mass gap undergoes an epoch of cannibalism if number changing interactions are active when the temperature drops below the mass of the lightest hidden particle. During cannibalism, the hidden sector temperature decreases only logarithmically with the scale factor. We consider the possibility that dark matter resides in a hidden sector that underwent cannibalism, and has relic density set by the freeze-out of two-to-two annihilations. We identify three novel phases, depending on the behavior of the hidden sector when dark matter freezes out. During the cannibal phase, dark matter annihilations decouple while the hidden sector ismore » cannibalizing. During the chemical phase, only two-to-two interactions are active and the total number of hidden particles is conserved. During the one way phase, the dark matter annihilation products decay out of equilibrium, suppressing the production of dark matter from inverse annihilations. We map out the distinct phenomenology of each phase, which includes a boosted dark matter annihilation rate, new relativistic degrees of freedom, warm dark matter, and observable distortions to the spectrum of the cosmic microwave background.« less
Generalization and capacity of extensively large two-layered perceptrons.
Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido
2002-09-01
The generalization ability and storage capacity of a treelike two-layered neural network with a number of hidden units scaling as the input dimension is examined. The mapping from the input to the hidden layer is via Boolean functions; the mapping from the hidden layer to the output is done by a perceptron. The analysis is within the replica framework where an order parameter characterizing the overlap between two networks in the combined space of Boolean functions and hidden-to-output couplings is introduced. The maximal capacity of such networks is found to scale linearly with the logarithm of the number of Boolean functions per hidden unit. The generalization process exhibits a first-order phase transition from poor to perfect learning for the case of discrete hidden-to-output couplings. The critical number of examples per input dimension, alpha(c), at which the transition occurs, again scales linearly with the logarithm of the number of Boolean functions. In the case of continuous hidden-to-output couplings, the generalization error decreases according to the same power law as for the perceptron, with the prefactor being different.
Sound Science: Taking Action with Acoustics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sinha, Dipen
2014-07-16
From tin whistles to sonic booms, sound waves interact with each other and with the medium through which they travel. By observing these interactions, we can identify substances that are hidden in sealed containers and obtain images of buried objects. By manipulating the ability of sound to push matter around, we can create novel structures and unique materials. Join the Lab's own sound hound, Dipen Sinha, as he describes how he uses fundamental research in acoustics for solving problems in industry, security and health.
Sound Science: Taking Action with Acoustics
Sinha, Dipen
2018-01-16
From tin whistles to sonic booms, sound waves interact with each other and with the medium through which they travel. By observing these interactions, we can identify substances that are hidden in sealed containers and obtain images of buried objects. By manipulating the ability of sound to push matter around, we can create novel structures and unique materials. Join the Lab's own sound hound, Dipen Sinha, as he describes how he uses fundamental research in acoustics for solving problems in industry, security and health.
Inference of Stochastic Nonlinear Oscillators with Applications to Physiological Problems
NASA Technical Reports Server (NTRS)
Smelyanskiy, Vadim N.; Luchinsky, Dmitry G.
2004-01-01
A new method of inferencing of coupled stochastic nonlinear oscillators is described. The technique does not require extensive global optimization, provides optimal compensation for noise-induced errors and is robust in a broad range of dynamical models. We illustrate the main ideas of the technique by inferencing a model of five globally and locally coupled noisy oscillators. Specific modifications of the technique for inferencing hidden degrees of freedom of coupled nonlinear oscillators is discussed in the context of physiological applications.
Effect of design selection on response surface performance
NASA Technical Reports Server (NTRS)
Carpenter, William C.
1993-01-01
Artificial neural nets and polynomial approximations were used to develop response surfaces for several test problems. Based on the number of functional evaluations required to build the approximations and the number of undetermined parameters associated with the approximations, the performance of the two types of approximations was found to be comparable. A rule of thumb is developed for determining the number of nodes to be used on a hidden layer of an artificial neural net and the number of designs needed to train an approximation is discussed.
Development and application of deep convolutional neural network in target detection
NASA Astrophysics Data System (ADS)
Jiang, Xiaowei; Wang, Chunping; Fu, Qiang
2018-04-01
With the development of big data and algorithms, deep convolution neural networks with more hidden layers have more powerful feature learning and feature expression ability than traditional machine learning methods, making artificial intelligence surpass human level in many fields. This paper first reviews the development and application of deep convolutional neural networks in the field of object detection in recent years, then briefly summarizes and ponders some existing problems in the current research, and the future development of deep convolutional neural network is prospected.
Hidden order in crackling noise during peeling of an adhesive tape.
Kumar, Jagadish; Ciccotti, M; Ananthakrishna, G
2008-04-01
We address the longstanding problem of recovering dynamical information from noisy acoustic emission signals arising from peeling of an adhesive tape subject to constant traction velocity. Using the phase space reconstruction procedure we demonstrate the deterministic chaotic dynamics by establishing the existence of correlation dimension as also a positive Lyapunov exponent in a midrange of traction velocities. The results are explained on the basis of the model that also emphasizes the deterministic origin of acoustic emission by clarifying its connection to stick-slip dynamics.
Optimal Integration of Departures and Arrivals in Terminal Airspace
NASA Technical Reports Server (NTRS)
Xue, Min; Zelinski, Shannon Jean
2013-01-01
Coordination of operations with spatially and temporally shared resources, such as route segments, fixes, and runways, improves the efficiency of terminal airspace management. Problems in this category are, in general, computationally difficult compared to conventional scheduling problems. This paper presents a fast time algorithm formulation using a non-dominated sorting genetic algorithm (NSGA). It was first applied to a test problem introduced in existing literature. An experiment with a test problem showed that new methods can solve the 20 aircraft problem in fast time with a 65% or 440 second delay reduction using shared departure fixes. In order to test its application in a more realistic and complicated problem, the NSGA algorithm was applied to a problem in LAX terminal airspace, where interactions between 28% of LAX arrivals and 10% of LAX departures are resolved by spatial separation in current operations, which may introduce unnecessary delays. In this work, three types of separations - spatial, temporal, and hybrid separations - were formulated using the new algorithm. The hybrid separation combines both temporal and spatial separations. Results showed that although temporal separation achieved less delay than spatial separation with a small uncertainty buffer, spatial separation outperformed temporal separation when the uncertainty buffer was increased. Hybrid separation introduced much less delay than both spatial and temporal approaches. For a total of 15 interacting departures and arrivals, when compared to spatial separation, the delay reduction of hybrid separation varied between 11% or 3.1 minutes and 64% or 10.7 minutes corresponding to an uncertainty buffer from 0 to 60 seconds. Furthermore, as a comparison with the NSGA algorithm, a First-Come-First-Serve based heuristic method was implemented for the hybrid separation. Experiments showed that the results from the NSGA algorithm have 9% to 42% less delay than the heuristic method with varied uncertainty buffer sizes.
A Multivariate Analysis of Termination Status in a Rural Community Mental Health Center.
ERIC Educational Resources Information Center
Tutin, Judith; Kessler, Marc
It has been estimated that the most pressing problem in community mental health care clinics is dropout, defined as unilateral termination by the client without therapist approval. To clarify the nature of dropout patients, 133 outpatient records at a rural community mental health center were examined over a one year period. Variables expected to…
Terminal Stage Leukemia: Integrating Art Therapy and Family Process.
ERIC Educational Resources Information Center
Teufel, Emily Scudder
1995-01-01
Through art therapy, children express symbolically what they will not or cannot express emotionally to those close to them, and some children have the added stress of family problems that are magnified due to the situation. Presents the case history of a nine-year-old girl in the terminal stages of leukemia whose artwork symbolized family unity.…
Diameter-Constrained Steiner Tree
NASA Astrophysics Data System (ADS)
Ding, Wei; Lin, Guohui; Xue, Guoliang
Given an edge-weighted undirected graph G = (V,E,c,w), where each edge e ∈ E has a cost c(e) and a weight w(e), a set S ⊆ V of terminals and a positive constant D 0, we seek a minimum cost Steiner tree where all terminals appear as leaves and its diameter is bounded by D 0. Note that the diameter of a tree represents the maximum weight of path connecting two different leaves in the tree. Such problem is called the minimum cost diameter-constrained Steiner tree problem. This problem is NP-hard even when the topology of Steiner tree is fixed. In present paper we focus on this restricted version and present a fully polynomial time approximation scheme (FPTAS) for computing a minimum cost diameter-constrained Steiner tree under a fixed topology.
Out of Reach, Out of Mind? Infants' Comprehension of References to Hidden Inaccessible Objects.
Osina, Maria A; Saylor, Megan M; Ganea, Patricia A
2017-09-01
This study investigated the nature of infants' difficulty understanding references to hidden inaccessible objects. Twelve-month-old infants (N = 32) responded to the mention of objects by looking at, pointing at, or approaching them when the referents were visible or accessible, but not when they were hidden and inaccessible (Experiment I). Twelve-month-olds (N = 16) responded robustly when a container with the hidden referent was moved from a previously inaccessible position to an accessible position before the request, but failed to respond when the reverse occurred (Experiment II). This suggests that infants might be able to track the hidden object's dislocations and update its accessibility as it changes. Knowing the hidden object is currently inaccessible inhibits their responding. Older, 16-month-old (N = 17) infants' performance was not affected by object accessibility. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.
Optimal Integration of Departure and Arrivals in Terminal Airspace
NASA Technical Reports Server (NTRS)
Xue, Min; Zelinski, Shannon Jean
2012-01-01
Coordination of operations with spatially and temporally shared resources such as route segments, fixes, and runways improves the efficiency of terminal airspace management. Problems in this category include scheduling and routing, thus they are normally difficult to solve compared with pure scheduling problems. In order to reduce the computational time, a fast time algorithm formulation using a non-dominated sorting genetic algorithm (NSGA) was introduced in this work and applied to a test case based on existing literature. The experiment showed that new method can solve the whole problem in fast time instead of solving sub-problems sequentially with a window technique. The results showed a 60% or 406 second delay reduction was achieved by sharing departure fixes (more details on the comparison with MILP results will be presented in the final paper). Furthermore, the NSGA algorithm was applied to a problem in LAX terminal airspace, where interactions between 28% of LAX arrivals and 10% of LAX departures are resolved by spatial segregation, which may introduce unnecessary delays. In this work, spatial segregation, temporal segregation, and hybrid segregation were formulated using the new algorithm. Results showed that spatial and temporal segregation approaches achieved similar delay. Hybrid segregation introduced much less delay than the other two approaches. For a total of 9 interacting departures and arrivals, delay reduction varied from 4 minutes to 6.4 minutes corresponding flight time uncertainty from 0 to 60 seconds. Considering the amount of flights that could be affected, total annual savings with hybrid segregation would be significant.
Turabián, J L; Pérez Franco, B
2016-01-01
Multiple morbidity seems to be "infinite" and so is not easy to make useful decisions. A new concept is introduced: the "master problems", as a qualitative method to facilitate the exit from this maze of multiple morbidity. Metaphors from the art world have been used to teach this concept. These "master problems" generally remain hidden and can only "unravel" between the interstices of multiple morbidity, when the details of the system that defines the problem are explained. A problem with "energy" or a "master problem" is complex, multiple and dramatic or theatrical--everything in the clinical history history make us look into that particular question. It is what gives us a blow to the stomach, which causes our hearts to beat faster, that moves us on many levels, which has a high "density of emotions", human elements, social symbols, and opens solutions in a patient. Copyright © 2015 Sociedad Española de Médicos de Atención Primaria (SEMERGEN). Publicado por Elsevier España, S.L.U. All rights reserved.
Wei, Qinglai; Liu, Derong; Lin, Qiao
In this paper, a novel local value iteration adaptive dynamic programming (ADP) algorithm is developed to solve infinite horizon optimal control problems for discrete-time nonlinear systems. The focuses of this paper are to study admissibility properties and the termination criteria of discrete-time local value iteration ADP algorithms. In the discrete-time local value iteration ADP algorithm, the iterative value functions and the iterative control laws are both updated in a given subset of the state space in each iteration, instead of the whole state space. For the first time, admissibility properties of iterative control laws are analyzed for the local value iteration ADP algorithm. New termination criteria are established, which terminate the iterative local ADP algorithm with an admissible approximate optimal control law. Finally, simulation results are given to illustrate the performance of the developed algorithm.In this paper, a novel local value iteration adaptive dynamic programming (ADP) algorithm is developed to solve infinite horizon optimal control problems for discrete-time nonlinear systems. The focuses of this paper are to study admissibility properties and the termination criteria of discrete-time local value iteration ADP algorithms. In the discrete-time local value iteration ADP algorithm, the iterative value functions and the iterative control laws are both updated in a given subset of the state space in each iteration, instead of the whole state space. For the first time, admissibility properties of iterative control laws are analyzed for the local value iteration ADP algorithm. New termination criteria are established, which terminate the iterative local ADP algorithm with an admissible approximate optimal control law. Finally, simulation results are given to illustrate the performance of the developed algorithm.
Quantum learning of classical stochastic processes: The completely positive realization problem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Monràs, Alex; Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543; Winter, Andreas
2016-01-15
Among several tasks in Machine Learning, a specially important one is the problem of inferring the latent variables of a system and their causal relations with the observed behavior. A paradigmatic instance of this is the task of inferring the hidden Markov model underlying a given stochastic process. This is known as the positive realization problem (PRP), [L. Benvenuti and L. Farina, IEEE Trans. Autom. Control 49(5), 651–664 (2004)] and constitutes a central problem in machine learning. The PRP and its solutions have far-reaching consequences in many areas of systems and control theory, and is nowadays an important piece inmore » the broad field of positive systems theory. We consider the scenario where the latent variables are quantum (i.e., quantum states of a finite-dimensional system) and the system dynamics is constrained only by physical transformations on the quantum system. The observable dynamics is then described by a quantum instrument, and the task is to determine which quantum instrument — if any — yields the process at hand by iterative application. We take as a starting point the theory of quasi-realizations, whence a description of the dynamics of the process is given in terms of linear maps on state vectors and probabilities are given by linear functionals on the state vectors. This description, despite its remarkable resemblance with the hidden Markov model, or the iterated quantum instrument, is however devoid of any stochastic or quantum mechanical interpretation, as said maps fail to satisfy any positivity conditions. The completely positive realization problem then consists in determining whether an equivalent quantum mechanical description of the same process exists. We generalize some key results of stochastic realization theory, and show that the problem has deep connections with operator systems theory, giving possible insight to the lifting problem in quotient operator systems. Our results have potential applications in quantum machine learning, device-independent characterization and reverse-engineering of stochastic processes and quantum processors, and more generally, of dynamical processes with quantum memory [M. Guţă, Phys. Rev. A 83(6), 062324 (2011); M. Guţă and N. Yamamoto, e-print http://arxiv.org/abs/1303.3771 (2013)].« less
Termination of psychoanalysis and September 11.
Brenner, Ira
2006-07-01
In the United States, the last illusion of safety from problems in distant parts of the world was shattered on September 11, 2001. Psychoanalysts are in a unique position to both experience and examine how such a man-made social disaster becomes internalized and affects one's psychic reality by studying the effects of that day on patients already engaged in a psychoanalytic process. The author hypothesizes that in one such case, that of Mr. N, the termination phase was significantly affected. Furthermore, Mr. N's reaction to reading the analyst's clinical write-up further influenced the termination phase.
Learning and inference in a nonequilibrium Ising model with hidden nodes.
Dunn, Benjamin; Roudi, Yasser
2013-02-01
We study inference and reconstruction of couplings in a partially observed kinetic Ising model. With hidden spins, calculating the likelihood of a sequence of observed spin configurations requires performing a trace over the configurations of the hidden ones. This, as we show, can be represented as a path integral. Using this representation, we demonstrate that systematic approximate inference and learning rules can be derived using dynamical mean-field theory. Although naive mean-field theory leads to an unstable learning rule, taking into account Gaussian corrections allows learning the couplings involving hidden nodes. It also improves learning of the couplings between the observed nodes compared to when hidden nodes are ignored.
Study of Mobile GIS Application on the Field of GPR in the Road Disease Detection
NASA Astrophysics Data System (ADS)
Liao, Q.; Yang, F.
2013-12-01
With the reflection principle of pulsed electromagnetic waves, ground penetrating radar (GPR) is available to measure depth of the pavement layer, reflecting different hidden danger underground. Currently, GPR has been widely used in road engineering with the constantly improved ability of detection and diagnosis to road diseases. The sum of road disease data of a region, a city, and even a wider range will be a very informative database, so we need a more convenient way to achieve data query intuitively. As mobile internet develops continuously, application of mobile terminal device plays a more important role in information platform. Mobile GIS, with smartphone as its terminal, is supported by the mobile Internet, GPS or base station as its positioning method. In this article, based on Android Platform and using C/S pattern, the LBS application of road diseases information which integrates Baidu Map API and database technology was discussed. After testing, it can display and query the real-time and historical road diseases data, the classification of data on a phone intuitively and easily. Because of the location technique and high portability of smart phone, the spot investigations of road diseases become easier. Though, the system needs further improvement, especially with the improving of the mobile phone performance, the system can also add the function of analysis to the disease data, thus forming a set of service system with more applicable.
Hägerhed-Engman, L; Sigsgaard, T; Samuelson, I; Sundell, J; Janson, S; Bornehag, C-G
2009-06-01
There are consistent findings on associations between asthma and allergy symptoms and residential mold and moisture. However, definitions of 'dampness' in studies are diverse because of differences in climate and building construction. Few studies have estimated mold problems inside the building structure by odor assessments. In a nested case-control study of 400 Swedish children, observations and measurements were performed in their homes by inspectors, and the children were examined by physicians for diagnoses of asthma, eczema, and rhinitis. In conclusion, we found an association between moldy odor along the skirting board and allergic symptoms among children, mainly rhinitis. No associations with any of the allergic symptoms were found for discoloured stains, 'floor dampness' or a general mold odor in the room. A moldy odor along the skirting board can be a proxy for hidden moisture problem inside the outer wall construction or in the foundation construction. There are indications that such dampness problems increase the risk for sensitization but the interpretation of data in respect of sensitization is difficult as about 80% of the children with rhinitis were sensitized. Furthermore, low ventilation rate in combination with moldy odor along the skirting board further increased the risk for three out of four studied outcomes, indicating that the ventilation rate is an effect modifier for indoor pollutants. This study showed that mold odor at the skirting board level is strongly associated with allergic symptoms among children. Such odor at that specific place can be seen as a proxy for some kind of hidden moisture or mold problem in the building structure, such as the foundation or wooden ground beam. In houses with odor along the skirting board, dismantling of the structure is required for an investigation of possible moisture damage, measurements, and choice of actions. In homes with low ventilation in combination with mold odor along the skirting board, there was even a higher risk of health effects. This emphasizes the need for the appropriate remediation as this is an ever increasing problem in poorly ventilated houses that are damp.
Life imitating art: depictions of the hidden curriculum in medical television programs.
Stanek, Agatha; Clarkin, Chantalle; Bould, M Dylan; Writer, Hilary; Doja, Asif
2015-09-26
The hidden curriculum represents influences occurring within the culture of medicine that indirectly alter medical professionals' interactions, beliefs and clinical practices throughout their training. One approach to increase medical student awareness of the hidden curriculum is to provide them with readily available examples of how it is enacted in medicine; as such the purpose of this study was to examine depictions of the hidden curriculum in popular medical television programs. One full season of ER, Grey's Anatomy and Scrubs were selected for review. A summative content analysis was performed to ascertain the presence of depictions of the hidden curriculum, as well as to record the type, frequency and quality of examples. A second reviewer also viewed a random selection of episodes from each series to establish coding reliability. The most prevalent themes across all television programs were: the hierarchical nature of medicine; challenges during transitional stages in medicine; the importance of role modeling; patient dehumanization; faking or overstating one's capabilities; unprofessionalism; the loss of idealism; and difficulties with work-life balance. The hidden curriculum is frequently depicted in popular medical television shows. These examples of the hidden curriculum could serve as a valuable teaching resource in undergraduate medical programs.
Uncovering hidden nodes in complex networks in the presence of noise
Su, Ri-Qi; Lai, Ying-Cheng; Wang, Xiao; Do, Younghae
2014-01-01
Ascertaining the existence of hidden objects in a complex system, objects that cannot be observed from the external world, not only is curiosity-driven but also has significant practical applications. Generally, uncovering a hidden node in a complex network requires successful identification of its neighboring nodes, but a challenge is to differentiate its effects from those of noise. We develop a completely data-driven, compressive-sensing based method to address this issue by utilizing complex weighted networks with continuous-time oscillatory or discrete-time evolutionary-game dynamics. For any node, compressive sensing enables accurate reconstruction of the dynamical equations and coupling functions, provided that time series from this node and all its neighbors are available. For a neighboring node of the hidden node, this condition cannot be met, resulting in abnormally large prediction errors that, counterintuitively, can be used to infer the existence of the hidden node. Based on the principle of differential signal, we demonstrate that, when strong noise is present, insofar as at least two neighboring nodes of the hidden node are subject to weak background noise only, unequivocal identification of the hidden node can be achieved. PMID:24487720
Nurse faculty experiences in problem-based learning: an interpretive phenomenologic analysis.
Paige, Jane B; Smith, Regina O
2013-01-01
This study explored the nurse faculty experience of participating in a problem-based learning (PBL) faculty development program. Utilizing PBL as a pedagogical method requires a paradigm shift in the way faculty think about teaching, learning, and the teacher-student relationship. An interpretive phenomenological analysis approach was used to explore the faculty experience in a PBL development program. Four themes emerged: change in perception of the teacher-student relationship, struggle in letting go, uncertainty, and valuing PBL as a developmental process. Epistemic doubt happens when action and intent toward the PBL teaching perspective do not match underlying beliefs. Findings from this study call for ongoing administrative support for education on PBL while faculty take time to uncover hidden epistemological beliefs.
Solving the quantum many-body problem with artificial neural networks
NASA Astrophysics Data System (ADS)
Carleo, Giuseppe; Troyer, Matthias
2017-02-01
The challenge posed by the many-body problem in quantum physics originates from the difficulty of describing the nontrivial correlations encoded in the exponential complexity of the many-body wave function. Here we demonstrate that systematic machine learning of the wave function can reduce this complexity to a tractable computational form for some notable cases of physical interest. We introduce a variational representation of quantum states based on artificial neural networks with a variable number of hidden neurons. A reinforcement-learning scheme we demonstrate is capable of both finding the ground state and describing the unitary time evolution of complex interacting quantum systems. Our approach achieves high accuracy in describing prototypical interacting spins models in one and two dimensions.
On integrability of the Killing equation
NASA Astrophysics Data System (ADS)
Houri, Tsuyoshi; Tomoda, Kentaro; Yasui, Yukinori
2018-04-01
Killing tensor fields have been thought of as describing the hidden symmetry of space(-time) since they are in one-to-one correspondence with polynomial first integrals of geodesic equations. Since many problems in classical mechanics can be formulated as geodesic problems in curved space and spacetime, solving the defining equation for Killing tensor fields (the Killing equation) is a powerful way to integrate equations of motion. Thus it has been desirable to formulate the integrability conditions of the Killing equation, which serve to determine the number of linearly independent solutions and also to restrict the possible forms of solutions tightly. In this paper, we show the prolongation for the Killing equation in a manner that uses Young symmetrizers. Using the prolonged equations, we provide the integrability conditions explicitly.
Mathematical characterization of mechanical behavior of porous frictional granular media
NASA Technical Reports Server (NTRS)
Chung, T. J.; Lee, J. K.
1972-01-01
A new definition of loading and unloading along the yield surface of Roscoe and Burland is introduced. This is achieved by noting that the strain-hardening parameter in the plastic potential function is deduced from the yield locus equation of Roscoe and Burland. The analytical results are compared with the experimental results for plate-bearing and cone-penetrometer problems and close agreements are demonstrated. The wheel-soil interaction is studied under dynamic loading. The rate-dependent plasticity or viscoelastoplastic behavior is considered. This is accomplished by the internal (hidden) variables associated with time-dependent viscous properties directly superimposed with inelastic behavior governed by the yield criteria of Roscoe and Burland. Effects of inertia and energy dissipation are properly accounted for. Example problems are presented.
Closed-form recursive formula for an optimal tracker with terminal constraints
NASA Technical Reports Server (NTRS)
Juang, J.-N.; Turner, J. D.; Chun, H. M.
1984-01-01
Feedback control laws are derived for a class of optimal finite time tracking problems with terminal constraints. Analytical solutions are obtained for the feedback gain and the closed-loop response trajectory. Such formulations are expressed in recursive forms so that a real-time computer implementation becomes feasible. Two examples are given to illustrate the validity and usefulness of the formulations.
NASA Technical Reports Server (NTRS)
Dwyer, John P.
1994-01-01
This research and development program comprised two efforts: the development of guidelines for the design of automated systems, with particular emphasis on automation design that takes advantage of contextual information, and the concept-level design of a crew aiding system, the Terminal Area Navigation Decision Aiding Mediator (TANDAM). This concept outlines a system capable of organizing navigation and communication information and assisting the crew in executing the operations required in descent and approach. In service of this endeavor, problem definition activities were conducted that identified terminal area navigation and operational familiarization exercises addressing the terminal area navigation problem. Both airborne and ground-based (ATC) elements of aircraft control were extensively researched. The TANDAM system concept was then specified, and the crew interface and associated systems described. Additionally, three descent and approach scenarios were devised in order to illustrate the principal functions of the TANDAM system concept in relation to the crew, the aircraft, and ATC. A plan for the evaluation of the TANDAM system was established. The guidelines were developed based on reviews of relevant literature, and on experience gained in the design effort.
Support program for women suffering grief after termination of pregnancy: A pilot study.
Sriarporn, Punpilai; Turale, Sue; Lordee, Nuananong; Liamtrirat, Sawanee; Hanpra, Wasana; Kanthino, Authid
2017-03-01
In this study, we preliminarily examined the effects of the Informational and Emotional Support Program for Women after Pregnancy Termination in 30 Thai women. A literature review and House's theory of social support informed the program content, which consisted of the following elements: (i) an evaluation of grief; (ii) an analysis of the problems and needs of each woman; (iii) informational and emotional support tailored to individual problems and needs; (iv) telephone support; and (v) an exit phone interview. The Grief Questionnaire for Women after Pregnancy Termination was used to measure changes in the grief levels of participants. The data were analyzed using descriptive statistics and the contingency coefficient. At the completion of the study, the participants' average grief score had decreased from the prior grief score and was in the moderate to low range. These preliminary findings indicate that the support program can be effective in real-life situations in Thailand to assist women who are grieving after the termination of pregnancy. Our findings highlight the need for nursing and emotional support to be provided to help Thai women after the TOP. © 2016 John Wiley & Sons Australia, Ltd.
Domestic horses send signals to humans when they face with an unsolvable task.
Ringhofer, Monamie; Yamamoto, Shinya
2017-05-01
Some domestic animals are thought to be skilled at social communication with humans due to the process of domestication. Horses, being in close relationship with humans, similar to dogs, might be skilled at communication with humans. Previous studies have indicated that they are sensitive to bodily signals and the attentional state of humans; however, there are few studies that investigate communication with humans and responses to the knowledge state of humans. Our first question was whether and how horses send signals to their potentially helpful but ignorant caretakers in a problem-solving situation where a food item was hidden in a bucket that was accessible only to the caretakers. We then examined whether horses alter their behaviours on the basis of the caretakers' knowledge of where the food was hidden. We found that horses communicated to their caretakers using visual and tactile signals. The signalling behaviour of the horses significantly increased in conditions where the caretakers had not seen the hiding of the food. These results suggest that horses alter their communicative behaviour towards humans in accordance with humans' knowledge state.
Variables in psychology: a critique of quantitative psychology.
Toomela, Aaro
2008-09-01
Mind is hidden from direct observation; it can be studied only by observing behavior. Variables encode information about behaviors. There is no one-to-one correspondence between behaviors and mental events underlying the behaviors, however. In order to understand mind it would be necessary to understand exactly what information is represented in variables. This aim cannot be reached after variables are already encoded. Therefore, statistical data analysis can be very misleading in studies aimed at understanding mind that underlies behavior. In this article different kinds of information that can be represented in variables are described. It is shown how informational ambiguity of variables leads to problems of theoretically meaningful interpretation of the results of statistical data analysis procedures in terms of hidden mental processes. Reasons are provided why presence of dependence between variables does not imply causal relationship between events represented by variables and absence of dependence between variables cannot rule out the causal dependence of events represented by variables. It is concluded that variable-psychology has a very limited range of application for the development of a theory of mind-psychology.
Feature to prototype transition in neural networks
NASA Astrophysics Data System (ADS)
Krotov, Dmitry; Hopfield, John
Models of associative memory with higher order (higher than quadratic) interactions, and their relationship to neural networks used in deep learning are discussed. Associative memory is conventionally described by recurrent neural networks with dynamical convergence to stable points. Deep learning typically uses feedforward neural nets without dynamics. However, a simple duality relates these two different views when applied to problems of pattern classification. From the perspective of associative memory such models deserve attention because they make it possible to store a much larger number of memories, compared to the quadratic case. In the dual description, these models correspond to feedforward neural networks with one hidden layer and unusual activation functions transmitting the activities of the visible neurons to the hidden layer. These activation functions are rectified polynomials of a higher degree rather than the rectified linear functions used in deep learning. The network learns representations of the data in terms of features for rectified linear functions, but as the power in the activation function is increased there is a gradual shift to a prototype-based representation, the two extreme regimes of pattern recognition known in cognitive psychology. Simons Center for Systems Biology.
Speakable and Unspeakable in Quantum Mechanics
NASA Astrophysics Data System (ADS)
Bell, J. S.; Aspect, Introduction by Alain
2004-06-01
List of papers on quantum philosophy by J. S. Bell; Preface; Acknowledgements; Introduction by Alain Aspect; 1. On the problem of hidden variables in quantum mechanics; 2. On the Einstein-Rosen-Podolsky paradox; 3. The moral aspects of quantum mechanics; 4. Introduction to the hidden-variable question; 5. Subject and object; 6. On wave packet reduction in the Coleman-Hepp model; 7. The theory of local beables; 8. Locality in quantum mechanics: reply to critics; 9. How to teach special relativity; 10. Einstein-Podolsky-Rosen experiments; 11. The measurement theory of Everett and de Broglie's pilot wave; 12. Free variables and local causality; 13. Atomic-cascade photons and quantum-mechanical nonlocality; 14. de Broglie-Bohm delayed choice double-slit experiments and density matrix; 15. Quantum mechanics for cosmologists; 16. Bertlmann's socks and the nature of reality; 17. On the impossible pilot wave; 18. Speakable and unspeakable in quantum mechanics; 19. Beables for quantum field theory; 20. Six possible worlds of quantum mechanics; 21. EPR correlations and EPR distributions; 22. Are there quantum jumps?; 23. Against 'measurement'; 24. La Nouvelle cuisine.
Short-term prediction of chaotic time series by using RBF network with regression weights.
Rojas, I; Gonzalez, J; Cañas, A; Diaz, A F; Rojas, F J; Rodriguez, M
2000-10-01
We propose a framework for constructing and training a radial basis function (RBF) neural network. The structure of the gaussian functions is modified using a pseudo-gaussian function (PG) in which two scaling parameters sigma are introduced, which eliminates the symmetry restriction and provides the neurons in the hidden layer with greater flexibility with respect to function approximation. We propose a modified PG-BF (pseudo-gaussian basis function) network in which the regression weights are used to replace the constant weights in the output layer. For this purpose, a sequential learning algorithm is presented to adapt the structure of the network, in which it is possible to create a new hidden unit and also to detect and remove inactive units. A salient feature of the network systems is that the method used for calculating the overall output is the weighted average of the output associated with each receptive field. The superior performance of the proposed PG-BF system over the standard RBF are illustrated using the problem of short-term prediction of chaotic time series.
A new learning paradigm: learning using privileged information.
Vapnik, Vladimir; Vashist, Akshay
2009-01-01
In the Afterword to the second edition of the book "Estimation of Dependences Based on Empirical Data" by V. Vapnik, an advanced learning paradigm called Learning Using Hidden Information (LUHI) was introduced. This Afterword also suggested an extension of the SVM method (the so called SVM(gamma)+ method) to implement algorithms which address the LUHI paradigm (Vapnik, 1982-2006, Sections 2.4.2 and 2.5.3 of the Afterword). See also (Vapnik, Vashist, & Pavlovitch, 2008, 2009) for further development of the algorithms. In contrast to the existing machine learning paradigm where a teacher does not play an important role, the advanced learning paradigm considers some elements of human teaching. In the new paradigm along with examples, a teacher can provide students with hidden information that exists in explanations, comments, comparisons, and so on. This paper discusses details of the new paradigm and corresponding algorithms, introduces some new algorithms, considers several specific forms of privileged information, demonstrates superiority of the new learning paradigm over the classical learning paradigm when solving practical problems, and discusses general questions related to the new ideas.
Widdas, W F; Baker, G F
2004-01-01
The physical chemistry of water at nanometre dimensions was used to explain the conformational changes and water breaking properties of the glucose transporter protein (GLUTI) in human erythrocytes more than ten years ago. The energy for this hidden work arises from cycles of evaporation and condensation of water within the cells but was several times larger than resting metabolism. Physical chemical principles can quantify the hidden work done and demonstrate that a significant source of energy is available, which is free of the metabolic energy derived from the hydrolysis of ATP. Therefore, a more widespread biological use of this "free" energy source was probable and a working hypothesis, which applied this energy to supplement the work derived from ATP hydrolysis in muscle, was proposed. The scheme gives a complete explanation for the unexpected and novel findings in skeletal muscle reported from Italy. The problem of using two energy sources and the novel properties of water at nanometer dimensions as they would apply in muscle are briefly discussed but they merit further interdisciplinary studies.
Online Sequential Projection Vector Machine with Adaptive Data Mean Update
Chen, Lin; Jia, Ji-Ting; Zhang, Qiong; Deng, Wan-Yu; Wei, Wei
2016-01-01
We propose a simple online learning algorithm especial for high-dimensional data. The algorithm is referred to as online sequential projection vector machine (OSPVM) which derives from projection vector machine and can learn from data in one-by-one or chunk-by-chunk mode. In OSPVM, data centering, dimension reduction, and neural network training are integrated seamlessly. In particular, the model parameters including (1) the projection vectors for dimension reduction, (2) the input weights, biases, and output weights, and (3) the number of hidden nodes can be updated simultaneously. Moreover, only one parameter, the number of hidden nodes, needs to be determined manually, and this makes it easy for use in real applications. Performance comparison was made on various high-dimensional classification problems for OSPVM against other fast online algorithms including budgeted stochastic gradient descent (BSGD) approach, adaptive multihyperplane machine (AMM), primal estimated subgradient solver (Pegasos), online sequential extreme learning machine (OSELM), and SVD + OSELM (feature selection based on SVD is performed before OSELM). The results obtained demonstrated the superior generalization performance and efficiency of the OSPVM. PMID:27143958
Forecasting daily streamflow using online sequential extreme learning machines
NASA Astrophysics Data System (ADS)
Lima, Aranildo R.; Cannon, Alex J.; Hsieh, William W.
2016-06-01
While nonlinear machine methods have been widely used in environmental forecasting, in situations where new data arrive continually, the need to make frequent model updates can become cumbersome and computationally costly. To alleviate this problem, an online sequential learning algorithm for single hidden layer feedforward neural networks - the online sequential extreme learning machine (OSELM) - is automatically updated inexpensively as new data arrive (and the new data can then be discarded). OSELM was applied to forecast daily streamflow at two small watersheds in British Columbia, Canada, at lead times of 1-3 days. Predictors used were weather forecast data generated by the NOAA Global Ensemble Forecasting System (GEFS), and local hydro-meteorological observations. OSELM forecasts were tested with daily, monthly or yearly model updates. More frequent updating gave smaller forecast errors, including errors for data above the 90th percentile. Larger datasets used in the initial training of OSELM helped to find better parameters (number of hidden nodes) for the model, yielding better predictions. With the online sequential multiple linear regression (OSMLR) as benchmark, we concluded that OSELM is an attractive approach as it easily outperformed OSMLR in forecast accuracy.
A substantial amount of hidden magnetic energy in the quiet Sun.
Bueno, J Trujillo; Shchukina, N; Ramos, A Asensio
2004-07-15
Deciphering and understanding the small-scale magnetic activity of the quiet solar photosphere should help to solve many of the key problems of solar and stellar physics, such as the magnetic coupling to the outer atmosphere and the coronal heating. At present, we can see only approximately 1 per cent of the complex magnetism of the quiet Sun, which highlights the need to develop a reliable way to investigate the remaining 99 per cent. Here we report three-dimensional radiative transfer modelling of scattering polarization in atomic and molecular lines that indicates the presence of hidden, mixed-polarity fields on subresolution scales. Combining this modelling with recent observational data, we find a ubiquitous tangled magnetic field with an average strength of approximately 130 G, which is much stronger in the intergranular regions of solar surface convection than in the granular regions. So the average magnetic energy density in the quiet solar photosphere is at least two orders of magnitude greater than that derived from simplistic one-dimensional investigations, and sufficient to balance radiative energy losses from the solar chromosphere.
Variance Estimation, Design Effects, and Sample Size Calculations for Respondent-Driven Sampling
2006-01-01
Hidden populations, such as injection drug users and sex workers, are central to a number of public health problems. However, because of the nature of these groups, it is difficult to collect accurate information about them, and this difficulty complicates disease prevention efforts. A recently developed statistical approach called respondent-driven sampling improves our ability to study hidden populations by allowing researchers to make unbiased estimates of the prevalence of certain traits in these populations. Yet, not enough is known about the sample-to-sample variability of these prevalence estimates. In this paper, we present a bootstrap method for constructing confidence intervals around respondent-driven sampling estimates and demonstrate in simulations that it outperforms the naive method currently in use. We also use simulations and real data to estimate the design effects for respondent-driven sampling in a number of situations. We conclude with practical advice about the power calculations that are needed to determine the appropriate sample size for a study using respondent-driven sampling. In general, we recommend a sample size twice as large as would be needed under simple random sampling. PMID:16937083
Online Sequential Projection Vector Machine with Adaptive Data Mean Update.
Chen, Lin; Jia, Ji-Ting; Zhang, Qiong; Deng, Wan-Yu; Wei, Wei
2016-01-01
We propose a simple online learning algorithm especial for high-dimensional data. The algorithm is referred to as online sequential projection vector machine (OSPVM) which derives from projection vector machine and can learn from data in one-by-one or chunk-by-chunk mode. In OSPVM, data centering, dimension reduction, and neural network training are integrated seamlessly. In particular, the model parameters including (1) the projection vectors for dimension reduction, (2) the input weights, biases, and output weights, and (3) the number of hidden nodes can be updated simultaneously. Moreover, only one parameter, the number of hidden nodes, needs to be determined manually, and this makes it easy for use in real applications. Performance comparison was made on various high-dimensional classification problems for OSPVM against other fast online algorithms including budgeted stochastic gradient descent (BSGD) approach, adaptive multihyperplane machine (AMM), primal estimated subgradient solver (Pegasos), online sequential extreme learning machine (OSELM), and SVD + OSELM (feature selection based on SVD is performed before OSELM). The results obtained demonstrated the superior generalization performance and efficiency of the OSPVM.
The Politics of the Hidden Curriculum
ERIC Educational Resources Information Center
Giroux, Henry A.
1977-01-01
Schools teach much more than the traditional curriculum. They also teach a "hidden curriculum"--those unstated norms, values, and beliefs promoting hierarchic and authoritarian social relations that are transmitted to students through the underlying educational structure. Discusses the effects of the "hidden curriculum" on the…
Birefringence and hidden photons
NASA Astrophysics Data System (ADS)
Arza, Ariel; Gamboa, J.
2018-05-01
We study a model where photons interact with hidden photons and millicharged particles through a kinetic mixing term. Particularly, we focus on vacuum birefringence effects and we find a bound for the millicharged parameter assuming that hidden photons are a piece of the local dark matter density.
ERIC Educational Resources Information Center
Bessent, E. Wailand; And Others
Provided in the manual are background material, problems, and worksheets designed for graduate students involved in a computer assisted instruction (CAI) approach to supervisor training. Included are a faculty handbook for a simulated school in a mythical community, a practice problem to familiarize the student with terminal operation, and eight…
ERIC Educational Resources Information Center
Maguin, Eugene; And Others
1994-01-01
Examined the effectiveness of an intervention program to prevent conduct problems among the preschool sons of 104 alcoholic fathers. The 10-month intervention combined parent training and marital counseling and had significant positive effects on the children's negative, prosocial, and affective behavior at program termination. Only the prosocial…
Gholami, Behnood; Phan, Timothy S; Haddad, Wassim M; Cason, Andrew; Mullis, Jerry; Price, Levi; Bailey, James M
2018-06-01
- Acute respiratory failure is one of the most common problems encountered in intensive care units (ICU) and mechanical ventilation is the mainstay of supportive therapy for such patients. A mismatch between ventilator delivery and patient demand is referred to as patient-ventilator asynchrony (PVA). An important hurdle in addressing PVA is the lack of a reliable framework for continuously and automatically monitoring the patient and detecting various types of PVA. - The problem of replicating human expertise of waveform analysis for detecting cycling asynchrony (i.e., delayed termination, premature termination, or none) was investigated in a pilot study involving 11 patients in the ICU under invasive mechanical ventilation. A machine learning framework is used to detect cycling asynchrony based on waveform analysis. - A panel of five experts with experience in PVA evaluated a total of 1377 breath cycles from 11 mechanically ventilated critical care patients. The majority vote was used to label each breath cycle according to cycling asynchrony type. The proposed framework accurately detected the presence or absence of cycling asynchrony with sensitivity (specificity) of 89% (99%), 94% (98%), and 97% (93%) for delayed termination, premature termination, and no cycling asynchrony, respectively. The system showed strong agreement with human experts as reflected by the kappa coefficients of 0.90, 0.91, and 0.90 for delayed termination, premature termination, and no cycling asynchrony, respectively. - The pilot study establishes the feasibility of using a machine learning framework to provide waveform analysis equivalent to an expert human. Copyright © 2018 Elsevier Ltd. All rights reserved.
Hidden vorticity in binary Bose-Einstein condensates
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brtka, Marijana; Gammal, Arnaldo; Malomed, Boris A.
We consider a binary Bose-Einstein condensate (BEC) described by a system of two-dimensional (2D) Gross-Pitaevskii equations with the harmonic-oscillator trapping potential. The intraspecies interactions are attractive, while the interaction between the species may have either sign. The same model applies to the copropagation of bimodal beams in photonic-crystal fibers. We consider a family of trapped hidden-vorticity (HV) modes in the form of bound states of two components with opposite vorticities S{sub 1,2}={+-}1, the total angular momentum being zero. A challenging problem is the stability of the HV modes. By means of a linear-stability analysis and direct simulations, stability domains aremore » identified in a relevant parameter plane. In direct simulations, stable HV modes feature robustness against large perturbations, while unstable ones split into fragments whose number is identical to the azimuthal index of the fastest growing perturbation eigenmode. Conditions allowing for the creation of the HV modes in the experiment are discussed too. For comparison, a similar but simpler problem is studied in an analytical form, viz., the modulational instability of an HV state in a one-dimensional (1D) system with periodic boundary conditions (this system models a counterflow in a binary BEC mixture loaded into a toroidal trap or a bimodal optical beam coupled into a cylindrical shell). We demonstrate that the stabilization of the 1D HV modes is impossible, which stresses the significance of the stabilization of the HV modes in the 2D setting.« less
Aircraft Safety and Operating Problems. [conference
NASA Technical Reports Server (NTRS)
1976-01-01
Results of NASA research in the field of aircraft safety and operating problems are discussed. Topics include: (1) terminal area operations, (2) flight dynamics and control; (3) ground operations; (4) atmospheric environment; (5) structures and materials; (6) powerplants; (7) noise; and (8) human factors engineering.
Implications of the measured angular anisotropy at the hidden order transition of URu2Si2
NASA Astrophysics Data System (ADS)
Chandra, P.; Coleman, P.; Flint, R.; Trinh, J.; Ramirez, A. P.
2018-05-01
The heavy fermion compound URu2Si2 continues to attract great interest due to the long-unidentified nature of the hidden order that develops below 17.5 K. Here we discuss the implications of an angular survey of the linear and nonlinear susceptibility of URu2Si2 in the vicinity of the hidden order transition [1]. While the anisotropic nature of spin fluctuations and low-temperature quasiparticles was previously established, our recent results suggest that the order parameter itself has intrinsic Ising anisotropy, and that moreover this anisotropy extends far above the hidden order transition. Consistency checks and subsequent questions for future experimental and theoretical studies of hidden order are discussed.
Optimal satisfaction degree in energy harvesting cognitive radio networks
NASA Astrophysics Data System (ADS)
Li, Zan; Liu, Bo-Yang; Si, Jiang-Bo; Zhou, Fu-Hui
2015-12-01
A cognitive radio (CR) network with energy harvesting (EH) is considered to improve both spectrum efficiency and energy efficiency. A hidden Markov model (HMM) is used to characterize the imperfect spectrum sensing process. In order to maximize the whole satisfaction degree (WSD) of the cognitive radio network, a tradeoff between the average throughput of the secondary user (SU) and the interference to the primary user (PU) is analyzed. We formulate the satisfaction degree optimization problem as a mixed integer nonlinear programming (MINLP) problem. The satisfaction degree optimization problem is solved by using differential evolution (DE) algorithm. The proposed optimization problem allows the network to adaptively achieve the optimal solution based on its required quality of service (Qos). Numerical results are given to verify our analysis. Project supported by the National Natural Science Foundation of China (Grant No. 61301179), the Doctorial Programs Foundation of the Ministry of Education of China (Grant No. 20110203110011), and the 111 Project (Grant No. B08038).
Securing the User's Work Environment
NASA Technical Reports Server (NTRS)
Cardo, Nicholas P.
2004-01-01
High performance computing at the Numerical Aerospace Simulation Facility at NASA Ames Research Center includes C90's, J90's and Origin 2000's. Not only is it necessary to protect these systems from outside attacks, but also to provide a safe working environment on the systems. With the right tools, security anomalies in the user s work environment can be deleted and corrected. Validating proper ownership of files against user s permissions, will reduce the risk of inadvertent data compromise. The detection of extraneous directories and files hidden amongst user home directories is important for identifying potential compromises. The first runs of these utilities detected over 350,000 files with problems. With periodic scans, automated correction of problems takes only minutes. Tools for detecting these types of problems as well as their development techniques will be discussed with emphasis on consistency, portability and efficiency for both UNICOS and IRIX.
Health impacts and research ethics in female trafficking.
Dhital, S R; Aro, R A; Sapkota, K
2011-04-01
Female trafficking is a social and public health problem, associated with physical and sexual abuse, psychological trauma, injuries from violence, sexually transmitted infections, adverse reproductive outcomes and substance misuse. It faces several challenges ranging from the hidden nature of the problem to ethical and human rights issues. The objectives of this paper are to analyze health impact of trafficking; ethical and research issues and anti-trafficking strategies in the Nepalese context. We collected published and unpublished data assessing the public health, ethical burden and research needs from different sources. Trafficked female involved in sex-industry that face grave situation as depicted and it might a reservoir of sexually transmitted diseases. Ethical issues related to survey of assessing the burden are difficult to carry out. The best ways to prevent and control these problems are to enhance anti- trafficking laws and raise awareness, empower and mobilize females and establish organizational capacity.
NASA Astrophysics Data System (ADS)
Uvarov, I. V.; Postnikov, A. V.; Svetovoy, V. B.
2016-03-01
Lack of fast and strong microactuators is a well-recognized problem in MEMS community. Electrochemical actuators can develop high pressure but they are notoriously slow. Water electrolysis produced by short voltage pulses of alternating polarity can overcome the problem of slow gas termination. Here we demonstrate an actuation regime, for which the gas pressure is relaxed just for 10 μs or so. The actuator consists of a microchamber filled with the electrolyte and covered with a flexible membrane. The membrane bends outward when the pressure in the chamber increases. Fast termination of gas and high pressure developed in the chamber are related to a high density of nanobubbles in the chamber. The physical processes happening in the chamber are discussed so as problems that have to be resolved for practical applications of this actuation regime. The actuator can be used as a driving engine for microfluidics.
Hidden attractors in dynamical systems
NASA Astrophysics Data System (ADS)
Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh
2016-06-01
Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.
Nanoporous membranes with electrochemically switchable, chemically stabilized ionic selectivity
NASA Astrophysics Data System (ADS)
Small, Leo J.; Wheeler, David R.; Spoerke, Erik D.
2015-10-01
Nanopore size, shape, and surface charge all play important roles in regulating ionic transport through nanoporous membranes. The ability to control these parameters in situ provides a means to create ion transport systems tunable in real time. Here, we present a new strategy to address this challenge, utilizing three unique electrochemically switchable chemistries to manipulate the terminal functional group and control the resulting surface charge throughout ensembles of gold plated nanopores in ion-tracked polycarbonate membranes 3 cm2 in area. We demonstrate the diazonium mediated surface functionalization with (1) nitrophenyl chemistry, (2) quinone chemistry, and (3) previously unreported trimethyl lock chemistry. Unlike other works, these chemistries are chemically stabilized, eliminating the need for a continuously applied gate voltage to maintain a given state and retain ionic selectivity. The effect of surface functionalization and nanopore geometry on selective ion transport through these functionalized membranes is characterized in aqueous solutions of sodium chloride at pH = 5.7. The nitrophenyl surface allows for ionic selectivity to be irreversibly switched in situ from cation-selective to anion-selective upon reduction to an aminophenyl surface. The quinone-terminated surface enables reversible changes between no ionic selectivity and a slight cationic selectivity. Alternatively, the trimethyl lock allows ionic selectivity to be reversibly switched by up to a factor of 8, approaching ideal selectivity, as a carboxylic acid group is electrochemically revealed or hidden. By varying the pore shape from cylindrical to conical, it is demonstrated that a controllable directionality can be imparted to the ionic selectivity. Combining control of nanopore geometry with stable, switchable chemistries facilitates superior control of molecular transport across the membrane, enabling tunable ion transport systems.Nanopore size, shape, and surface charge all play important roles in regulating ionic transport through nanoporous membranes. The ability to control these parameters in situ provides a means to create ion transport systems tunable in real time. Here, we present a new strategy to address this challenge, utilizing three unique electrochemically switchable chemistries to manipulate the terminal functional group and control the resulting surface charge throughout ensembles of gold plated nanopores in ion-tracked polycarbonate membranes 3 cm2 in area. We demonstrate the diazonium mediated surface functionalization with (1) nitrophenyl chemistry, (2) quinone chemistry, and (3) previously unreported trimethyl lock chemistry. Unlike other works, these chemistries are chemically stabilized, eliminating the need for a continuously applied gate voltage to maintain a given state and retain ionic selectivity. The effect of surface functionalization and nanopore geometry on selective ion transport through these functionalized membranes is characterized in aqueous solutions of sodium chloride at pH = 5.7. The nitrophenyl surface allows for ionic selectivity to be irreversibly switched in situ from cation-selective to anion-selective upon reduction to an aminophenyl surface. The quinone-terminated surface enables reversible changes between no ionic selectivity and a slight cationic selectivity. Alternatively, the trimethyl lock allows ionic selectivity to be reversibly switched by up to a factor of 8, approaching ideal selectivity, as a carboxylic acid group is electrochemically revealed or hidden. By varying the pore shape from cylindrical to conical, it is demonstrated that a controllable directionality can be imparted to the ionic selectivity. Combining control of nanopore geometry with stable, switchable chemistries facilitates superior control of molecular transport across the membrane, enabling tunable ion transport systems. Electronic supplementary information (ESI) available: Experimental procedures, synthesis, and characterization of molecules 1, 2 and 3. Explanation of the electrochemical method for approximating nanopore diameter. Additional XPS spectra. See DOI: 10.1039/C5NR02939B
2014-03-27
asymptotically equal. Carlsson shows that the problem is solved by treating each subregion Ri as a traveling salesman problem (TSP) with a set of points that...terminal state to the goal. If no- travel zones are repre- sented as the union of regions Akx > Bk, the coverage problem can be expressed as an IP [14...3 1.2 Problem Statement
An Elementary Algorithm for Autonomous Air Terminal Merging and Interval Management
NASA Technical Reports Server (NTRS)
White, Allan L.
2017-01-01
A central element of air traffic management is the safe merging and spacing of aircraft during the terminal area flight phase. This paper derives and examines an algorithm for the merging and interval managing problem for Standard Terminal Arrival Routes. It describes a factor analysis for performance based on the distribution of arrivals, the operating period of the terminal, and the topology of the arrival routes; then presents results from a performance analysis and from a safety analysis for a realistic topology based on typical routes for a runway at Phoenix International Airport. The heart of the safety analysis is a statistical derivation on how to conduct a safety analysis for a local simulation when the safety requirement is given for the entire airspace.
Test report for twinax cable (Rockwell type MB0150-051). [effects of mismatched termination
NASA Technical Reports Server (NTRS)
Doland, G. D.
1978-01-01
A controlled impedance twisted pair shielded cable was tested to determine the frequency response and effects of mismatched termination. It was found that a long length of this cable, about 100 feet, exhibited a frequency sensitive attenuation roll-off greater than 1.5 db down at 5 MHz. It was also determined that improper termination resulted in losses of 1/2 to 1 db within the frequency range of 200 KHz to greater than 1-1/2 MHz. The test results indicate a possible problem where mismatched connectors are used in video signal cables.
Human factors in aviation: Terminal control area boundary conflicts
NASA Technical Reports Server (NTRS)
Monan, William P.
1989-01-01
Air-to-air conflicts in the vicinity of Terminal Control Area (TCA) boundaries were studied to obtain a better understanding of the causal dynamics of these events with particular focus on human factor issues. The study dataset consisted of 381 Instrument Flight Rules/Visual Flight Rules (IFR/VFR) traffic conflicts in airspace layers above TCA ceiling and below TCA floors; 213 reports of incursions in TCA terminal airspace by VFR aircraft, of which 123 resulted in conflicts; and an additional set of reports describing problems with Air Traffic Control (ATC) services in and around TCAs. Results and conclusions are detailed.
The Hidden Curriculum in Distance Education: An Updated View.
ERIC Educational Resources Information Center
Anderson, Terry
2001-01-01
Addressing recent criticism of distance education, explores the distinctive hidden curriculum (supposed "real" agenda) of distance education, focusing on both its positive and negative expressions. Also offers an updated view of the hidden curriculum of traditional, campus-based education, grounded in an emerging worldwide context of broadening…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-14
... ENVIRONMENTAL PROTECTION AGENCY [FRL-9631-3] Notice of Proposed Settlement Agreement and Opportunity for Public Comment: Hidden Lane Landfill Superfund Site ACTION: Notice. SUMMARY: In accordance... (``DOJ'') on behalf of EPA, in connection with the Hidden Lane Landfill Superfund Site, Sterling, Loudoun...
Hidden Curriculum as One of Current Issue of Curriculum
ERIC Educational Resources Information Center
Alsubaie, Merfat Ayesh
2015-01-01
There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…
Hidden Variable Theories and Quantum Nonlocality
ERIC Educational Resources Information Center
Boozer, A. D.
2009-01-01
We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…
Building Simple Hidden Markov Models. Classroom Notes
ERIC Educational Resources Information Center
Ching, Wai-Ki; Ng, Michael K.
2004-01-01
Hidden Markov models (HMMs) are widely used in bioinformatics, speech recognition and many other areas. This note presents HMMs via the framework of classical Markov chain models. A simple example is given to illustrate the model. An estimation method for the transition probabilities of the hidden states is also discussed.
Seuss's Butter Battle Book: Is There Hidden Harm?
ERIC Educational Resources Information Center
Van Cleaf, David W.; Martin, Rita J.
1986-01-01
Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in…
Comment on 'All quantum observables in a hidden-variable model must commute simultaneously'
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nagata, Koji
Malley discussed [Phys. Rev. A 69, 022118 (2004)] that all quantum observables in a hidden-variable model for quantum events must commute simultaneously. In this comment, we discuss that Malley's theorem is indeed valid for the hidden-variable theoretical assumptions, which were introduced by Kochen and Specker. However, we give an example that the local hidden-variable (LHV) model for quantum events preserves noncommutativity of quantum observables. It turns out that Malley's theorem is not related to the LHV model for quantum events, in general.
Late psychological sequelae of abortion: questions from a primary care perspective.
Butler, C
1996-10-01
Research strongly supports the view that pregnancy termination is seldom associated with adverse psychological sequelae in the short to medium term, but experience shows that there is a small group of women who experience long and intense suffering. This is a report of the cases of two women who presented with psychological problems associated with a termination 19 and 5 years earlier.
ERIC Educational Resources Information Center
Hall, Sean B.
2012-01-01
Swift and Greenberg (2012) observed that variables influencing the decision to drop out fluctuate according to the primary presenting problem, the amount of structure in therapy, the length of treatment, and the clinical setting. Due to these reports, researchers may focus on predictors of premature termination (PT) in treatment settings where the…
Generalized gradient algorithm for trajectory optimization
NASA Technical Reports Server (NTRS)
Zhao, Yiyuan; Bryson, A. E.; Slattery, R.
1990-01-01
The generalized gradient algorithm presented and verified as a basis for the solution of trajectory optimization problems improves the performance index while reducing path equality constraints, and terminal equality constraints. The algorithm is conveniently divided into two phases, of which the first, 'feasibility' phase yields a solution satisfying both path and terminal constraints, while the second, 'optimization' phase uses the results of the first phase as initial guesses.
A guidance law for hypersonic descent to a point
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eisler, G.R.; Hull, D.G.
1992-05-01
A neighboring external control problem is formulated for a hypersonic glider to execute a maximum-terminal-velocity descent to a stationary target. The resulting two-part, feedback control scheme initially solves a nonlinear algebraic problem to generate a nominal trajectory to the target altitude. Secondly, a neighboring optimal path computation about the nominal provides a lift and side-force perturbations necessary to achieve the target downrange and crossrange. On-line feedback simulations of the proposed scheme and a form of proportional navigation are compared with an off-line parameter optimization method. The neighboring optimal terminal velocity compares very well with the parameter optimization solution and ismore » far superior to proportional navigation. 8 refs.« less
A guidance law for hypersonic descent to a point
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eisler, G.R.; Hull, D.G.
1992-01-01
A neighboring external control problem is formulated for a hypersonic glider to execute a maximum-terminal-velocity descent to a stationary target. The resulting two-part, feedback control scheme initially solves a nonlinear algebraic problem to generate a nominal trajectory to the target altitude. Secondly, a neighboring optimal path computation about the nominal provides a lift and side-force perturbations necessary to achieve the target downrange and crossrange. On-line feedback simulations of the proposed scheme and a form of proportional navigation are compared with an off-line parameter optimization method. The neighboring optimal terminal velocity compares very well with the parameter optimization solution and ismore » far superior to proportional navigation. 8 refs.« less
Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels
Son, In Keun; Mao, Shiwen; Hur, Seung Min
2009-01-01
We study the problem of how to alleviate the exposed terminal effect in multi-hop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that sched-ules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multi-hop wireless networks. PMID:22408556
Holland, J; Smith, C; Childs, P A; Holland, A J
1997-02-01
We identified two patients in a 12-month period who presented with cutaneous infection and secondary lymph node involvement from atypical mycobacterial infection after minor gardening injuries. One patient had a coinfection with Nocardia asteroides. Both patients required multiple surgical interventions, despite appropriate antibiotic therapy, before resolution of the disease. The course of the infection was characterized by chronic relapses with complete healing at 12 to 18 months after the original injury. The identification and management of this clinical problem are reviewed.
A comparison of polynomial approximations and artificial neural nets as response surfaces
NASA Technical Reports Server (NTRS)
Carpenter, William C.; Barthelemy, Jean-Francois M.
1992-01-01
Artificial neural nets and polynomial approximations were used to develop response surfaces for several test problems. Based on the number of functional evaluations required to build the approximations and the number of undetermined parameters associated with the approximations, the performance of the two types of approximations was found to be comparable. A rule of thumb is developed for determining the number of nodes to be used on a hidden layer of an artificial neural net, and the number of designs needed to train an approximation is discussed.
Protecting the axion with local baryon number
NASA Astrophysics Data System (ADS)
Duerr, Michael; Schmidt-Hoberg, Kai; Unwin, James
2018-05-01
The Peccei-Quinn (PQ) solution to the Strong CP Problem is expected to fail unless the global symmetry U(1)PQ is protected from Planck-scale operators up to high mass dimension. Suitable protection can be achieved if the PQ symmetry is an automatic consequence of some gauge symmetry. We highlight that if baryon number is promoted to a gauge symmetry, the exotic fermions needed for anomaly cancellation can elegantly provide an implementation of the Kim-Shifman-Vainshtein-Zakharov 'hidden axion' mechanism with a PQ symmetry protected from Planck-scale physics.
What Is Going on Inside the Arrows? Discovering the Hidden Springs in Causal Models
Murray-Watters, Alexander; Glymour, Clark
2016-01-01
Using Gebharter's (2014) representation, we consider aspects of the problem of discovering the structure of unmeasured sub-mechanisms when the variables in those sub-mechanisms have not been measured. Exploiting an early insight of Sober's (1998), we provide a correct algorithm for identifying latent, endogenous structure—sub-mechanisms—for a restricted class of structures. The algorithm can be merged with other methods for discovering causal relations among unmeasured variables, and feedback relations between measured variables and unobserved causes can sometimes be learned. PMID:27313331
Increased taxon sampling reveals thousands of hidden orthologs in flatworms
2017-01-01
Gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the gene complement of an organism consists of hidden orthologs, i.e., those with no apparent homology to sequenced animal lineages—mistakenly considered new genes—but actually representing rapidly evolving orthologs or undetected paralogs. Here, we describe Leapfrog, a simple automated BLAST pipeline that leverages increased taxon sampling to overcome long evolutionary distances and identify putative hidden orthologs in large transcriptomic databases by transitive homology. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3427 putative hidden orthologs, some unidentified by OrthoFinder and HaMStR, two common orthogroup inference algorithms. Unexpectedly, we do not observe a correlation between the number of putative hidden orthologs in a lineage and its “average” evolutionary rate. Hidden orthologs do not show unusual sequence composition biases that might account for systematic errors in sequence similarity searches. Instead, gene duplication with divergence of one paralog and weak positive selection appear to underlie hidden orthology in Platyhelminthes. By using Leapfrog, we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g., planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire in flatworms, qualifying the impact of gene losses and gains in gene complement evolution. PMID:28400424
Hafferty, Frederic W; Martimianakis, Maria Athina
2017-11-07
In this Commentary, the authors explore the scoping review by Lawrence and colleagues by challenging their conclusion that with over 25 years' worth of "ambiguous and seemingly ubiquitous use" of the hidden curriculum construct in health professions education scholarship, it is time to either move to a more uniform definitional foundation or abandon the term altogether. The commentary authors counter these remedial propositions by foregrounding the importance of theoretical diversity and the conceptual richness afforded when the hidden curriculum construct is used as an entry point for studying the interstitial space between the formal and a range of other-than-formal domains of learning. Further, they document how tightly-delimited scoping strategies fail to capture the wealth of educational scholarship that operates within a hidden curriculum framework, including "hidden" hidden curriculum articles, studies that employ alternative constructs, and investigations that target important tacit socio-cultural influences on learners and faculty without formally deploying the term. They offer examples of how the hidden curriculum construct, while undergoing significant transformation in its application within the field of health professions education, has created the conceptual foundation for the application of a number of critical perspectives that make visible the field's political investments in particular forms of knowing and associated practices. Finally, the commentary authors invite readers to consider the methodological promise afforded by conceptual heterogeneity, particularly strands of scholarship that resituate the hidden curriculum concept within the magically expansive dance of social relationships, social learning, and social life that form the learning environments of health professions education.
FIMP dark matter freeze-in gauge mediation and hidden sector
NASA Astrophysics Data System (ADS)
Tsao, Kuo-Hsing
2018-07-01
We explore the dark matter freeze-in mechanism within the gauge mediation framework, which involves a hidden feebly interacting massive particle (FIMP) coupling feebly with the messenger fields while the messengers are still in the thermal bath. The FIMP is the fermionic component of the pseudo-moduli in a generic metastable supersymmetry (SUSY) breaking model and resides in the hidden sector. The relic abundance and the mass of the FIMP are determined by the SUSY breaking scale and the feeble coupling. The gravitino, which is the canonical dark matter candidate in the gauge mediation framework, contributes to the dark matter relic abundance along with the freeze-in of the FIMP. The hidden sector thus becomes two-component with both the FIMP and gravitino lodging in the SUSY breaking hidden sector. We point out that the ratio between the FIMP and the gravitino is determined by how SUSY breaking is communicated to the messengers. In particular when the FIMP dominates the hidden sector, the gravitino becomes the minor contributor in the hidden sector. Meanwhile, the neutralino is assumed to be both the weakly interacting massive particle dark matter candidate in the freeze-out mechanism and the lightest observable SUSY particle. We further find out the neutralino has the sub-leading contribution to the current dark matter relic density in the parameter space of our freeze-in gauge mediation model. Our result links the SUSY breaking scale in the gauge mediation framework with the FIMP freeze-in production rate leading to a natural and predicting scenario for the studies of the dark matter in the hidden sector.
What Should We Do With a Hidden Curriculum When We Fine One?
ERIC Educational Resources Information Center
Martin, Jane R.
1976-01-01
A hidden curriculum consists of those learning states of a setting that are either unintended or intended but not openly acknowledged to the learners in the setting unless the learners are aware of them. Consciousness-raising may be the best weapon of individuals who are subject to hidden curricula. (Author/MLF)
ERIC Educational Resources Information Center
Hubbard, Barry
2010-01-01
Understanding the influential factors at work within an online learning environment is a growing area of interest. Hidden or implicit expectations, skill sets, knowledge, and social process can help or hinder student achievement, belief systems, and persistence. This qualitative study investigated how hidden curricular issues transpired in an…
The Hidden Reason Behind Children's Misbehavior.
ERIC Educational Resources Information Center
Nystul, Michael S.
1986-01-01
Discusses hidden reason theory based on the assumptions that: (1) the nature of people is positive; (2) a child's most basic psychological need is involvement; and (3) a child has four possible choices in life (good somebody, good nobody, bad somebody, or severely mentally ill.) A three step approach for implementing hidden reason theory is…
Student Teaching: A Hidden Wholeness
ERIC Educational Resources Information Center
Bowman, Richard F.
2007-01-01
Productive student teachers lead learning by emergently sensing and honoring the hidden wholeness of life in classrooms. That hidden wholeness mirrors seven contextual concerns which learners reflect upon in the everydayness of classroom life: What are we going to do in class today? What am I going to have to do in class? What counts in today's…
2008-03-01
vivipara Hidden flower Cryptantha crassisepala Hidden flower Cryptantha fulvocanescens James’s hidden flower Cryptantha jamesii Buffalo gourd...pumila Bigbract verbena ta Verbena bractea Banana yucca ta Yucca bacca Soapweed yucca Yucca glauca Rocky Mountain zinnia Zinnia grandiflora A-9
Driving style recognition method using braking characteristics based on hidden Markov model
Wu, Chaozhong; Lyu, Nengchao; Huang, Zhen
2017-01-01
Since the advantage of hidden Markov model in dealing with time series data and for the sake of identifying driving style, three driving style (aggressive, moderate and mild) are modeled reasonably through hidden Markov model based on driver braking characteristics to achieve efficient driving style. Firstly, braking impulse and the maximum braking unit area of vacuum booster within a certain time are collected from braking operation, and then general braking and emergency braking characteristics are extracted to code the braking characteristics. Secondly, the braking behavior observation sequence is used to describe the initial parameters of hidden Markov model, and the generation of the hidden Markov model for differentiating and an observation sequence which is trained and judged by the driving style is introduced. Thirdly, the maximum likelihood logarithm could be implied from the observable parameters. The recognition accuracy of algorithm is verified through experiments and two common pattern recognition algorithms. The results showed that the driving style discrimination based on hidden Markov model algorithm could realize effective discriminant of driving style. PMID:28837580
A possible loophole in the theorem of Bell.
Hess, K; Philipp, W
2001-12-04
The celebrated inequalities of Bell are based on the assumption that local hidden parameters exist. When combined with conflicting experimental results, these inequalities appear to prove that local hidden parameters cannot exist. This contradiction suggests to many that only instantaneous action at a distance can explain the Einstein, Podolsky, and Rosen type of experiments. We show that, in addition to the assumption that hidden parameters exist, Bell tacitly makes a variety of other assumptions that contribute to his being able to obtain the desired contradiction. For instance, Bell assumes that the hidden parameters do not depend on time and are governed by a single probability measure independent of the analyzer settings. We argue that the exclusion of time has neither a physical nor a mathematical basis but is based on Bell's translation of the concept of Einstein locality into the language of probability theory. Our additional set of local hidden variables includes time-like correlated parameters and a generalized probability density. We prove that our extended space of local hidden variables does not permit Bell-type proofs to go forward.
Photoacoustic imaging of hidden dental caries by using a bundle of hollow optical fibers
NASA Astrophysics Data System (ADS)
Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji
2018-02-01
Photoacoustic imaging system using a bundle of hollow-optical fibers to detect hidden dental caries is proposed. Firstly, we fabricated a hidden caries model with a brown pigment simulating a common color of caries lesion. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating Nd:YAG laser light with a 532 nm wavelength to occlusal surface of model tooth. We calculated by Fourier transform and found that the waveform from the carious part provides frequency components of approximately from 0.5 to 1.2 MHz. Then a photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for clinical applications. From intensity map of frequency components in 0.5-1.2 MHz, photoacoustic images of hidden caries in the simulated samples were successfully obtained.
On the LHC sensitivity for non-thermalised hidden sectors
NASA Astrophysics Data System (ADS)
Kahlhoefer, Felix
2018-04-01
We show under rather general assumptions that hidden sectors that never reach thermal equilibrium in the early Universe are also inaccessible for the LHC. In other words, any particle that can be produced at the LHC must either have been in thermal equilibrium with the Standard Model at some point or must be produced via the decays of another hidden sector particle that has been in thermal equilibrium. To reach this conclusion, we parametrise the cross section connecting the Standard Model to the hidden sector in a very general way and use methods from linear programming to calculate the largest possible number of LHC events compatible with the requirement of non-thermalisation. We find that even the HL-LHC cannot possibly produce more than a few events with energy above 10 GeV involving states from a non-thermalised hidden sector.
NASA Astrophysics Data System (ADS)
Idris, N. H.; Salim, N. A.; Othman, M. M.; Yasin, Z. M.
2018-03-01
This paper presents the Evolutionary Programming (EP) which proposed to optimize the training parameters for Artificial Neural Network (ANN) in predicting cascading collapse occurrence due to the effect of protection system hidden failure. The data has been collected from the probability of hidden failure model simulation from the historical data. The training parameters of multilayer-feedforward with backpropagation has been optimized with objective function to minimize the Mean Square Error (MSE). The optimal training parameters consists of the momentum rate, learning rate and number of neurons in first hidden layer and second hidden layer is selected in EP-ANN. The IEEE 14 bus system has been tested as a case study to validate the propose technique. The results show the reliable prediction of performance validated through MSE and Correlation Coefficient (R).
Hidden charged dark matter and chiral dark radiation
NASA Astrophysics Data System (ADS)
Ko, P.; Nagata, Natsumi; Tang, Yong
2017-10-01
In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.
TRIZ: A Bridge Between Applied and Industrial Physics
NASA Astrophysics Data System (ADS)
Savransky, Semyon
1997-03-01
TRIZ provides a methodology for creative engineering design. TRIZ was founded by Genrich S. Altshuller in Russia, whose with co-workers analyses about 1,500,000 worldwide patents. The major TRIZ principles are [1,2]: 1. All engineering systems have uniform evolution. Many other systems (economic, educational, etc.) have the same evolution trends. 2. Any inventive problem represents a conflict between new requirements and old system. TRIZ comprises various systematically techniques to find an quasi-ideal answer to the inventive problem through solve the conflict based on the knowledge of a system evolution. Usually the hidden root of technical problem is physical contradictions that is possible to resolve using the lists of effects. TRIZ experts use a knowledge base of applied physics to provide solutions of industrial problems . Many companies around the world cite a phenomenal increase in the producti-vity and quality of solutions to tough engineering problems through the use of TRIZ. [1]. G. S. Altshuller, B.L. Zlotin, A.V. Zusman and V.I. Filatov, The new ideas search: From intuition to technology. (in Russian) Kishinev, 1989, 381p. [2]. S.D. Savransky, and C. Stephan, TRIZ: Methodology of Inventive Problem Solving. The Indust-rial Physicist (December 1996).
Constructive autoassociative neural network for facial recognition.
Fernandes, Bruno J T; Cavalcanti, George D C; Ren, Tsang I
2014-01-01
Autoassociative artificial neural networks have been used in many different computer vision applications. However, it is difficult to define the most suitable neural network architecture because this definition is based on previous knowledge and depends on the problem domain. To address this problem, we propose a constructive autoassociative neural network called CANet (Constructive Autoassociative Neural Network). CANet integrates the concepts of receptive fields and autoassociative memory in a dynamic architecture that changes the configuration of the receptive fields by adding new neurons in the hidden layer, while a pruning algorithm removes neurons from the output layer. Neurons in the CANet output layer present lateral inhibitory connections that improve the recognition rate. Experiments in face recognition and facial expression recognition show that the CANet outperforms other methods presented in the literature.
Correlation Research of Medical Security Management System Network Platform in Medical Practice
NASA Astrophysics Data System (ADS)
Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang
Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.
Estimation of Faults in DC Electrical Power System
NASA Technical Reports Server (NTRS)
Gorinevsky, Dimitry; Boyd, Stephen; Poll, Scott
2009-01-01
This paper demonstrates a novel optimization-based approach to estimating fault states in a DC power system. Potential faults changing the circuit topology are included along with faulty measurements. Our approach can be considered as a relaxation of the mixed estimation problem. We develop a linear model of the circuit and pose a convex problem for estimating the faults and other hidden states. A sparse fault vector solution is computed by using 11 regularization. The solution is computed reliably and efficiently, and gives accurate diagnostics on the faults. We demonstrate a real-time implementation of the approach for an instrumented electrical power system testbed, the ADAPT testbed at NASA ARC. The estimates are computed in milliseconds on a PC. The approach performs well despite unmodeled transients and other modeling uncertainties present in the system.
[Internet research methods: advantages and challenges].
Liu, Yi; Tien, Yueh-Hsuan
2009-12-01
Compared to traditional research methods, using the Internet to conduct research offers a number of advantages to the researcher, which include increased access to sensitive issues and vulnerable / hidden populations; decreased data entry time requirements; and enhanced data accuracy. However, Internet research also presents certain challenges to the researcher. In this article, the advantages and challenges of Internet research methods are discussed in four principle issue areas: (a) recruitment, (b) data quality, (c) practicality, and (d) ethics. Nursing researchers can overcome problems related to sampling bias and data truthfulness using creative methods; resolve technical problems through collaboration with other disciplines; and protect participant's privacy, confidentiality and data security by maintaining a high level of vigilance. Once such issues have been satisfactorily addressed, the Internet should open a new window for Taiwan nursing research.
A look at scalable dense linear algebra libraries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dongarra, J.J.; Van de Geijn, R.A.; Walker, D.W.
1992-01-01
We discuss the essential design features of a library of scalable software for performing dense linear algebra computations on distributed memory concurrent computers. The square block scattered decomposition is proposed as a flexible and general-purpose way of decomposing most, if not all, dense matrix problems. An object- oriented interface to the library permits more portable applications to be written, and is easy to learn and use, since details of the parallel implementation are hidden from the user. Experiments on the Intel Touchstone Delta system with a prototype code that uses the square block scattered decomposition to perform LU factorization aremore » presented and analyzed. It was found that the code was both scalable and efficient, performing at about 14 GFLOPS (double precision) for the largest problem considered.« less